Just as security has become a major focus of cloud computing, it will also become a major priority in edge computing, which by definition expands the risk surface.
“ benefits to users, but at the cost of fundamental security issues,” said Christopher Sestito, CEO of HiddenLayer.
Like the cloud, the edge itself is not less secure than a centralized environment. It just requires leadership priority—and some updated strategies—to build robust defenses.
Security experts say that in edge environments, a granular approach—at the user or host level—is critical. “Access control is even more important here, and multifactor authentication should be used whenever possible,” says Sestito.
Security automation (such as XDR and EDR tools) plays an ghana mobile database role, as does careful consideration of how data is exposed or moved between network devices.
If you’re not already using a zero trust model, deploying an edge might be a good reason to start. “Using Zero Trust Security design principles is quickly becoming a trusted standard for well-segmented, well-protected enterprise assets,” says Ron Howell, managing architect of enterprise networks at Capgemini Americas.
Properly prioritized edge security can actually strengthen an organization’s overall position in an increasingly distributed IT reality. Leaders and teams that already take a layered approach to cloud and container security should feel right at home at the edge.
“Industry leaders are realizing that not all IT and business networking requirements can be met with enterprise cloud architecture alone,” Howell says. “Cloud computing services will be enhanced and complemented by edge computing, edge security and the right network.”
Edge computing brings fantastic
-
- Posts: 533
- Joined: Mon Dec 23, 2024 3:15 am