Cradlepoint
Overview
Review items below — quantities update pricing automatically.
Overview
The Cradlepoint BXS3-PISONET is a purpose-built permanent internet isolation appliance designed to create and enforce persistent network segmentation for enterprise security architectures. Unlike temporary air-gap solutions or software-only isolation, the BXS3-PISONET (often searched as BXS3 PISONET) deploys as a dedicated hardware node that physically isolates critical network segments from untrusted external connectivity—a critical requirement for organizations protecting SCADA networks, industrial control systems, secure data enclaves, or compliance-sensitive infrastructure.
This device functions as a hardware enforcement boundary rather than a traditional firewall. It enables security teams to maintain strict isolation policies while preserving the ability to configure controlled, unidirectional data flows where business logic demands them. Deployment by security integrators benefits from the appliance's role as a deterministic network partition device, eliminating reliance on complex software policies or trust assumptions.
The BXS3-PISONET is positioned as a core component of defense-in-depth strategies for industrial control networks, classified data environments, and mission-critical infrastructure. It complements traditional firewalls and intrusion detection by providing a hardware-enforced boundary that eliminates the assumption that network perimeter defenses will hold under sustained attack or sophisticated lateral movement.
Typical deployment scenarios include isolation of SCADA gateways, enclave protection for classified or high-value intellectual property, quarantine of legacy systems that cannot be updated, and enforcement of strict air-gapping in environments where data exfiltration or ransomware propagation poses existential business risk. The device operates as a network security anchor point within broader industrial automation or enterprise infrastructure designs.
For IT architects evaluating network segmentation strategies, the BXS3-PISONET represents a hardware-enforced alternative to software-only segmentation and to manual air-gap processes. It reduces operational overhead compared to personnel-driven isolated network transfers while maintaining the security properties of true isolation.
If your requirement is temporary isolation, emergency containment, or lab-based testing, consider whether a Cradlepoint network appliance with configurable isolation policies might suit your timeline better. If isolation is needed at the application layer rather than the network layer, or if you require frequent, high-volume data transfer between isolated and non-isolated zones, the cost and operational friction of hardware isolation may outweigh the security benefit—consult a security architect to evaluate the tradeoff between isolation strength and business continuity.
Q: What is the difference between the BXS3-PISONET and a traditional firewall?
A: A firewall filters traffic based on rules; the BXS3-PISONET physically enforces isolation by design. It prevents misconfiguration or bypass of segmentation policies, making it suitable for zero-trust or high-assurance isolation requirements where rule-based filtering is considered insufficient.
Q: Can the BXS3-PISONET transfer data between isolated segments?
A: Yes, it can be configured to enforce unidirectional or tightly scoped data flows where required. This allows controlled data movement (e.g., logs or configuration updates) while maintaining the isolation boundary.
Q: Does the BXS3-PISONET require cloud management or external policy servers?
A: No. It operates as a standalone node with persistent enforcement policies, eliminating dependencies on external connectivity for isolation enforcement. This reduces risk in air-gapped or highly restricted network environments.
Q: Is the BXS3-PISONET suitable for SCADA and industrial control network protection?
A: Yes. It is specifically designed for isolation of OT networks, control systems, and critical infrastructure from corporate networks and untrusted external sources.
Q: What skills are required to deploy the BXS3-PISONET?
A: Network segmentation and security integration experience is recommended. The device is designed for deployment by security integrators and IT teams familiar with air-gap enforcement and network boundary design.

The BXS3-PISONET is not a firewall replacement; it's a hardware isolation enforcer for environments where network compromise is an existential risk. I deploy these in SCADA-adjacent networks, classified data tiers, and scenarios where a single misconfiguration or policy rule could cascade into catastrophic breach. The device itself becomes the trust boundary rather than the network policies running on top of it.
Technical Highlights:
Deployment Considerations:
Deploy the BXS3-PISONET when your isolation requirement is non-negotiable and your threat model includes sophisticated lateral movement or persistent network-level intrusion. It's the right choice for industrial control protection, classified enclaves, and zero-trust segmentation in environments where rule-based filtering is considered insufficient.
Review items below — quantities update pricing automatically.
Support services and planning resources for commercial surveillance, access control, and infrastructure deployments.
Fixed scope • Fixed price