Why Soracom
Versatile Hardware Needs Versatile Connectivity
Though these gateways can be connected to the cloud via Ethernet backhaul, this won’t be an option in many settings. This makes Soracom’s wireless connectivity solutions the ideal complement to Cassia’s Bluetooth gateways. By using Soracom’s Onyx dongle to act as a cellular modem, Cassia’s gateways can take advantage of Soracom’s wide range of integrated connectivity technologies.
Soracom and Cassia are both IoT solutions created with scalability and flexibility in mind. Soracom’s User Console, for example, provides users with full control over every SIM or eSIM managed within a deployment from a single, customizable dashboard. This allows users to control their fleet – and its connectivity – down to the individual SIM, making the Soracom console a natural partner for Cassia’s IoT AC allowing for remote monitoring at scale.
This works nicely alongside Soracom Beam, a protocol converter that can help convert each gateway’s MQTT data into encrypted MQTTS to be sent to an IoT broker like AWS IoT. Offloading this encryption onto the cloud lets the gateways use less data-intensive protocols reducing both cellular data usage and power drain on each device. With Beam, users can even control their data endpoints in the cloud to simplify the management of large-scale fleets.
Zan Compute also uses Soracom Peek, a managed packet capture service, to monitor the network behavior of individual devices without setting up any servers to mirror or inspect traffic. This, in turn, works well with the Soracom Virtual Private Gateway (VPG) to provide more thoroughly secure communication between servers and devices, or even between individual devices.
Users who want to access their gateways more securely can also utilize Soracom Napter. This on-demand networking service allows devices using Soracom SIMs to securely access Cassia’s gateways remotely, simplifying remote maintenance and troubleshooting via Cassia’s web-based interface. This is all accomplished under a randomized IP address and port, securing these devices from the risks of connecting with a public IP.