At the edge, new horizons for businesses:
Nearly 75% of organizations anticipate processing data at the “edge” by 2025 and for an increasing number of organizations, the edge of the network is a new hotspot for IT investments. Edge computing allows for organizations to enhance data storage, processing and analytics capabilities.
“We also employ an aggregation strategy to stream that data into public cloud platforms for data aggregation, processing, long-term storage and secure partner access,” writes one CTO.
From a security standpoint:
While edge computing retains tremendous potential, leaders must carefully configure edge environments and minimize security issues.
Security risks emerge with the transfer of data from network sources to the edge platforms. Local IT personnel may not have the know-how, discipline or tools to send the data to an edge platform securely. In addition, because hundreds of thousands of network-connected devices interact with the edge infrastructure, the edge serves as a prime target for hackers.
And when it comes to securing the edge itself, the diversity of IoT devices and systems located at the edge present security issues.
For improved edge security:
- Integrate edge security into your overall security strategy. Edge security should be as seamless as your email security, and it should fit in with all other security related operations.
- Take a Zero trust approach. Zero trust is a natural fit in relation to edge computing, as it provides the identity management that can help verify users and endpoints.
- As you begin to request proposals from edge product vendors, request for them to show security capabilities. Vendors build more secure products as clients introduce new security demands.
For in-depth information about edge computing, visit Cyber Talk’s glossary pages. Discover how edge presents a physical security risk. For an expanded set of edge security tips, visit CSO Online.