Global - English
Error!
To utilize the site to its fullest capabilities please enable javascript. If you have trouble submitting forms please call us and we will be happy to help you!
Viewing 14 of 186 Perle resources
Resource Type
Products Categories
Industries
Interests
Revolutionizing Commuter Transit with IRG Cellular Routers
Discover how 4G LTE and 5G routers increase ad revenue, deliver real-time updates, and optimize power management.
OCI Containers for Edge Computing
Perle IRG Routers, with native support for OCI Containers, enable users to optimize edge computing processing capabilities by deploying lightweight applications tailored to suit unique or evolving use cases with low latency and real-time responsiveness.
Network Computing Editorial Review of the IRG7440 5G Router: An independent product review testing the capabilities of our enterprise-class edge 5G Router
An independent product review testing the capabilities of the enterprise-class edge IRG7440 5G Router.
Deciphering the Hype & Integrating 5G Wireless Network Connectivity
Enterprise Networking Magazine interviews Alex Pirvulescu, Director of Product Management to decipher the hype surrounding 5G wireless network connectivity.
Ahr Valley First Responders use Perle IRG5500 LTE Routers in Flood Response & Recovery efforts
Ahr Valley First Responders use Perle IRG LTE Routers which uses two T-Mobile unlimited SIM cards and functions as an LTE router, Ethernet switch, and Wi-Fi access point. It is ruggedized for shock and vibration resistance, and is housed in an IP54 enclosure for dust and water ingress. It serves as the main connectivity hub for creating a VAN for flood relief.
Greenville Electric use Perle IRG LTE Routers to remotely monitor equipment
Greenville Electric Service Office uses IRG LTE Routers to provide reliable, independent, and flexible cellular-based setup for the dedicated remote access method into the Cummins generators.
Eli Controls use Perle IRG5000 LTE Routers to provide Communication Gateway between Surveillance Cameras and Cloud Services
Eli Controls was delighted by the Perle IRG LTE Router's Verizon compatibility and capacity for multiple HD feeds, which make it a reliable and flexible surveillance solution.
Winning Strategies integrate Perle IRG LTE Routers to provide LTE coverage when WiFi is unavailable
Winning Strategies ITS uses Perle IRG5000 LTE Routers, as the routers offer WiFi and cellular routing for reliable security surveillance. Provides primary WiFi with LTE backup during outages.
Deploy and Manage your Network from the Cloud
Perle's cloud-based centralized management solution puts all your network and IT infrastructure into a single application. It offers secure, reliable access and visibility for normal operations and critical network failures.
Using IEEE 802.1x and Port Security
Perle products use IEEE 802.1x and Port Security to control network access by limiting and identifying MAC addresses. Any violations trigger actions like sending SNMP trap messages and shutting down ports.
Password Strength Checking: Enforcing the use of strong password attributes
Perle products, which have password strength checking enabled, will ensure that passwords meet the strong password requirements specified by the NERC CIP-007-3 standard.
Using Management Access Control Lists (ACL)
Perle supports Management Access List (ACL) for restricting access to the management interface of their devices. Administrators can specify allowed IP addresses, effectively blocking unauthorized workstations from attempting access.
Quality of Service: Defining it and identifying its impact on high-priority applications
Perle Products offer Quality of Service (QoS) features for prioritizing traffic and managing bandwidth. This ensures smooth operation of VoIP, video collaboration, networked video security, and remote monitoring applications.
SSH, SNMPv3 and HTTPS Secure Management Sessions
To protect enterprise infrastructure, proper authentication methods and encrypted sessions are essential when accessing networking equipment. Perle Products support secure management sessions, ensuring enhanced security for network administrators and users.
Hi!
Have a Question? Chat with a live Product Specialist!
We can provide more information about our products or arrange for a price quotation.
Send us an Email