K
Kathleen Martin
Guest
Processing data at the network’s edge, whether it is on IoT devices, industrial equipment, or in nearby data centres, can reduce the latency of applications and enable richer, AI-powered functionality and user experiences. But edge computing introduces new security challenges which, analysts argue, require new approaches to securing devices and networks.
The centralisation of computing – in local area networks, in corporate data centres, and more recently in hyperscale clouds – has been good for security. It has allowed organisations to ‘hide’ their data behind layers of security defences, both virtual and physical.
Now, though, computing is once again being redistributed away from this secure core. One driver is the spike in remote working, which means employees are connecting to corporate networks through the internet. Another is the growing need for data processing to be located near users or devices at the edge of the network, to reduce latency and accelerate analysis. This means data is increasingly processed and stored on IoT devices, on industrial equipment in remote locations, or in local data centres close to the user.
Conventional models of IT security are not suited for this redistribution. As computing moves to the edge, these models risk exposing corporate data assets, holding back digital transformation, or both.
“Network security architectures that place the enterprise data centre at the centre of connectivity requirements are an inhibitor to the dynamic access requirements of digital business,” analyst company Gartner wrote in a report last year. “Digital business and edge computing have inverted access requirements, with more users, devices, applications, services and data located outside of an enterprise than inside. “
Continue reading: https://techmonitor.ai/technology/cybersecurity/security-challenges-of-edge-computing
The centralisation of computing – in local area networks, in corporate data centres, and more recently in hyperscale clouds – has been good for security. It has allowed organisations to ‘hide’ their data behind layers of security defences, both virtual and physical.
Now, though, computing is once again being redistributed away from this secure core. One driver is the spike in remote working, which means employees are connecting to corporate networks through the internet. Another is the growing need for data processing to be located near users or devices at the edge of the network, to reduce latency and accelerate analysis. This means data is increasingly processed and stored on IoT devices, on industrial equipment in remote locations, or in local data centres close to the user.
Conventional models of IT security are not suited for this redistribution. As computing moves to the edge, these models risk exposing corporate data assets, holding back digital transformation, or both.
“Network security architectures that place the enterprise data centre at the centre of connectivity requirements are an inhibitor to the dynamic access requirements of digital business,” analyst company Gartner wrote in a report last year. “Digital business and edge computing have inverted access requirements, with more users, devices, applications, services and data located outside of an enterprise than inside. “
Continue reading: https://techmonitor.ai/technology/cybersecurity/security-challenges-of-edge-computing