ChannelLife New Zealand logo
Industry insider news for New Zealand's technology resellers
Story image

D-Link launches new router and cloud IoT management solution

Thu 26 Nov 2020
FYI, this story is more than a year old

D-Link A/NZ has launched a new router, the DWM-315, a 4G LTE M2M VPN router designed for remote Machine-to-Machine (M2M) deployments that can be utilised across multiple IoT scenarios. 

It has also launched its new Edge Cloud IoT Management Solution, D-ECS, which is an advanced EaaS (Edge as a Service) cloud computing platform.

DWM-315 router 

The router features a dedicated Gigabit Ethernet port and Dual-SIM 4G LTE mobile broadband connectivity for redundancy and flexibility, as well as VPN tools and remote management for both individual or large-scale deployments.

The router’s integrated VPN Client and Server supports almost any VPN policy. 

It supports IPSec, PPTP, L2TPv2 and GRE protocols in Server mode, while handling passthrough traffic as well. 

The hardware engine supports and manages multiple advanced VPN options including key management, negotiation modes, multiple encryption and authentication options including VPN authentication using an internal user database.

It has an industrial-grade casing for reliable connectivity in extreme conditions. 

Its corrosion-resistant zinc-plated steel case and wide operating temperature and humidity tolerance mean that the DWM-315 is ready for the most demanding M2M applications in virtually any environment, while its flexible power input allows the router to utilise any convenient power source.

Key features:

            • Dual SIM design

            • Cat. 6 LTE with up to 300 Mbps

            • Telstra 4GX and Optus 4G Plus support (Band 28)

            • LTE Bands: B1, B3, B5, B7, B8, B20, B28, B32, B38, B40, B41

            • Ethernet WAN port with failover support

            • GPS support with external antenna connector

            • Robust industrial grade enclosure

            • Wide operating temperature range

            • Advanced VPN support: Client and Server

            • IPsec, PPTP, L2TPv2, GRE support

            • Bridge mode support

            • SMS management, TR-069, SNMP support

            • DIN Rail mounting kit included

The DWM-315 is available now with a RRP of AU$999.95 / NZ$1099.99.

D-ECS Edge cloud IoT management solution 

D-ECS is an advanced EaaS (Edge as a Service) cloud computing platform designed to help MSP’s, SMB’s and enterprises manage a variety of M2M and IoT devices via a wide spectrum of supported protocols, including SNMP for network monitoring, TR069 and TR098 for CPE and ACS communication, Eclipse MQTT broker for M2M device communication, GPX metadata for GPS routing info and ONVIF Profile S for basic IP Camera configuration.

The D-ECS portal is compatible with D-Link IoT and M2M devices, including the new DWM-315, and allows device owners the ability to easily deploy, configure, monitor and manage multiple IoT networks remotely.

Multi-Tenant Access and Role-Based Administration allows MSPs to set up virtual customer profiles with zero-touch deployment of devices. 

They can also provide a secure platform for their customers to manage their own fleets of devices, whilst being continually supported by the MSP in a little or as much of a management capacity as required.

D-ECS features automatic failure detection and alerts to resolve network issues quickly and efficiently, and is able to support a virtually unlimited number of edge devices, as well as real-time monitoring and status reports provided by D-ECS which enables a comprehensive view of network infrastructure at a glance and all edge device locations are conveniently shown in an integrated Google map display.

The D-ECS software platform utilises 5G-native architecture, which allows integration of other upcoming 5G devices, enabling operators to deploy, configure, monitor, troubleshoot, and manage multiple networks, both with 4G devices, as well as future-proofing with a scalable platform for long-term needs.

Related stories
Top stories
Story image
Sustainability
NZ's Catalyst Cloud attains Toitū net carbonzero certification
The Toitū net carbonzero certification involved working with Toitū Envirocare to measure carbon emissions, setting mitigation and reduction targets.
Story image
Awards
OHI Data Navigator recognised by IDC for APAC contribution
IDC has chosen OHI Data Navigator as the best Asia Pacific Smart City project under its 2022 Smart City Asia/Pacific Awards (SCAPA) category under the Public Health and Social Services category.
Story image
Omnichannel
UNIQLO operator chooses Adyen for multiple market payments
The operator of UNIQLO, Fast Retailing, has selected Adyen to power payments for its in-store and online checkout in multiple markets.
Story image
ABI Research
75% of 5G networks to advance to 5G-Advanced by 2030
5G-advanced is set to launch in 2025, and 75% of 5G networks will upgrade by 2030, according to ABI Research. 
Story image
Artificial Intelligence
Vectra AI named as AWS security competency partner
Threat detection and response company Vectra AI has announced that it has become an Amazon Web Services Security Competency Partner.
Story image
Infrastructure
Video: 10 Minute IT Jams - An update from Paessler
Sebastian Krüger joins us today to discuss how unified infrastructure monitoring enables MSPs to seamlessly deliver services to their clients.
Story image
Artificial Intelligence
Siemens expands NVIDIA partnership for industrial metaverse
Siemens is expanding its partnership with NVIDIA to enable the industrial metaverse and increase the use of AI-driven digital twin technology.
Story image
Microsoft
Digital innovation could shape the future of NZ - Microsoft
With cloud technologies available to more people around the world than ever before, it is not only businesses who will benefit from using them.
Story image
MSP
Video: 10 Minute IT Jams - An update from CyberArk
Olly Stimpson joins us today to discuss the importance of MSP programmes and how MSP partners are experiencing success with CyberArk.
Story image
Ransomware
Businesses unprepared to defend against ransomware attacks
Ransomware attacks continue to impact organisations worldwide with high costs, but businesses are still largely unprepared.
Story image
Microsoft
Azure-based technology asBuilt signals better BIM outcomes in NZ
The Microsoft Azure-based asBuilt intelligence hub is helping Kiwi businesses accelerate their building information management potential.
Story image
Internet of Things
ManageEngine wins big in IDC MarketScape assessment
ManageEngine's Endpoint Central service has been recognised as a leader by IDC MarketScape in several categories including Internet of Things device deployments and UEM software for SMEs.
Story image
Financial results
Margins & revenues up at New Zealand arm of Acer Computer
We look at the local financial statements of Taiwanese manufacturer Acer Computer Inc.
Story image
Identity and Access Management
Ping Identity named a Leader in Access Management
Ping Identity has been named a leader in the 2022 KuppingerCole Leadership Compass report for Access Management. 
Story image
Artificial Intelligence
Dynatrace extends automatic release validation capabilities
Dynatrace has extended its platform release validation capabilities to improve user experience at every stage of the software development lifecycle.
Story image
Electrical
Up to $2.4 million shortfall in the collapse of IndeServe
We delve into the liquidators first report on long-standing networking service provider IndeServes collapse.
Story image
Design
Hands-on review: Phillips Hue starter kit
The set-up was one of the simplest I have ever had to do. It is also where the products shine. I was able to connect the bridge, the three lightbulbs and the strip within 10 min.
Story image
Tech job moves
Tech job moves - Bitdefender, Cohesity, Fortinet & MODIFI
We round up all job appointments from June 27-30, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Dark web
Cybercrime in Aotearoa: How does New Zealand law define it?
‘Cybercrime’ is a term we hear all the time, but what exactly is it, and how does New Zealand define it in legal terms?
Story image
Artificial Intelligence
Eight top DevSecOps trends to support IT innovation in 2022
The use of DevSecOps practices is growing, as it is increasingly seen as the best way to produce high-quality and secure code. So what are the current trends?
Story image
Web Development
Whitecliffe fosters careers for the future of tech
Do you want a career in Information Technology, Networking, Web Development, Software Development, or are you looking to upskill?
Story image
WatchGuard Technologies
Ransomware volume doubled 2021 total by end of Q1 2022
Ransomware detections in the first quarter of this year doubled the total volume reported for 2021, according to a new report. 
Story image
Cybersecurity
Without trust, your security team is dead in the water
The rise of cyberattacks has increased the need for sound security that works across any type of business, but with any change, buy-in is essential. Airwallex explains why.
Story image
Digital Transformation
Retailers must invest in new tech to keep up with online shopping demand
There's a higher demand for more purchasing opportunities at our fingertips, as well as greater expectations when it comes to the online customer experience."
Story image
Dicker Data
EXCLUSIVE: Why women in IT makes good business sense - Dicker Data
The Federal government wants to bolster female participation in the tech industry to at least 40% by 2030. Here's how one homegrown Australian company has already reached that goal.
Story image
Cloudian
Cloudian, Vertica to deliver on-premise data warehouse platform
"We’re enabling our customers to capitalise on a leading object storage platform and maximise the value of their digital assets.”
Story image
Cybersecurity
How organisations can mitigate IoT and IIoT security risks
IoT and IIoT come with inherent risks because they are often deployed faster than they can be secured, putting organisations in danger of cyber threats. Here are tips on how to mitigate those risks.
Story image
Internet of Things
Large enterprises propel 5G industrial IoT market
Large enterprises are propelling the 5G industrial Internet of Things market, according to a recently published report from Future Market Insights.
Story image
Samsung
Monitors are an excellent incentive for getting employees back
The pandemic has taught us that hybrid working is a lot easier than we would’ve thought, so how can the office be made to feel as comfortable as home? The answer could be staring you in the face right now.
Story image
Southern Cross Cable
Southern Cross Cable launches the SX NEXT cable to connect NZ to the world
The new Southern Cross NEXT fibre cable (SX NEXT) is set to connect Australasia to the US and further enhance connectivity between New Zealand, Australia, and the US.
Story image
Cloud
BT builds on Equinix partnership with new cloud offering
BT has launched a next-generation cloud connectivity offering extending its global network into strategic carrier-neutral facilities (CNFs) and building on its existing partnership with Equinix.
Story image
Cybersecurity
Online bullying, harassment skyrockets since COVID outbreak
Harmful content reports have risen by over 25% since the outbreak of the COVID pandemic, according to Netsafe.
Story image
Review
Hands-on review: GoDice
In a world where we’re more connected than ever to our smart devices, startup company Particula believes that its innovative product GoDice is the answer to getting everyone reconnected with one another - by turning that smart device into an interactive board game.
Story image
Cybersecurity
FIDO Alliance releases guidelines for optimising UX with FIDO Security Keys
The new guidelines aim to accelerate multi-factor authentication deployment and adoption with FIDO security keys.
Story image
Ransomware
Examining the future of ransomware threats with Vectra’s CTO
As customers' valuable data move to the cloud, so will ransomware. What is the current landscape and what do we need to know?
Story image
Hybrid Cloud
Advent One acquires Layer 8 Networks, complements hybrid cloud offering
The acquisition comes at a time of surging demand in hybrid cloud, network virtualisation and network security.
Story image
Cyber Criminal
Identity and access: the fight is on
Blue team defenders are used to protecting our data, applications, and users with access controls and other security mechanisms, which is why attacks like this are especially challenging when they target identity and access control systems.
Story image
Supply chain
Supply chains continue to be disrupted, enterprises embrace circular economy
“Businesses urgently need to find a solution that can help them to manage this disruption, and transition to a circular economy."
Story image
Review
Hands-on review – CleanMyMac X utility for macOS
We get hands-on with a useful utility that macOS users never thought they needed but probably do.
Story image
Gaming
Sony releases a new gaming gear brand for PC gamers
Sony has unveiled INZONETM, a new gaming gear brand for PC gamers that makes gaming more immersive and offers greater gaming ability.
Story image
Aspire
NEC expands Open RAN ecosystem with Aspire Tech acquisition
With its agreement to acquire Aspire Technology, NEC Corporation has further increased its capacity to deliver End-to-End Open RAN ecosystems.
Story image
Data Protection
How secure is accounting software data in Aotearoa?
A recent Xero study found ICT spending for NZ businesses has increased 25% compared to pre-pandemic levels, so how safe is accounting software?
Story image
Microsoft
ASI Solutions named finalist of Microsoft Surface Partner of the Year
"ASI Solutions has a strong Microsoft focus, building value by helping customers maximise investment in modern workplace solutions."
Story image
Cybersecurity
Tech and data’s role in the changing face of compliance
Accenture's study found that 93% of respondents agree or strongly agree new technologies such as AI and cloud make compliance easier.