Edge Security: How to Secure the Edge of the Network

SEAN MICHAEL KERNER | December 13, 2019

article image
Edge computing is a term that is becoming increasingly popular not just as a buzzword but as a way of understanding and modeling IT infrastructure in an era of pervasive cloud computing. With the rise of edge computing has come a need for edge security. Edge security isn't just about securing edge computing though; it's also potentially a new approach to defining user and enterprise security in the cloud-connected world. While there are no shortage of meaningless buzzwords in IT, edge computing isn't an abstract concept and neither is edge security. For both edge computing and edge security, there is an emerging set of definitions and standards.

Spotlight

ITS InfoCom

ITS InfoCom is the first Latin American multinational in the field of Information Technologies. Specialized in RIM services. The architectures we offer are: Borderless Networks, Convergence, Unified Collaboration, Cloud Computing, Security and Business Contact Center.

OTHER ARTICLES

As Edge Applications Multiply, OpenInfra Community Delivers StarlingX 5.0, Offering Cloud Infrastructure Stack for 5G, IoT

Article | June 2, 2021

StarlingX—the open source edge computing and IoT cloud platform optimized for low-latency and high-performance applications—is available in its 5.0 release today. StarlingX combines Ceph, OpenStack, Kubernetes and more to create a full-featured cloud software stack that provides everything carriers and enterprises need to deploy an edge cloud on a few servers or hundreds of them.

Read More

Cyber security best practice in mission critical SCADA systems

Article | April 6, 2020

Due to lack of reporting many businesses still underestimate the threat of cyber-attacks and the scale of damage that can ensueWith cyber-attacks fast becoming the weapon of choice to compromise critical infrastructures, the need for a proactive approach to cyber security in SCADA systems has become imperative. Security is a much larger issue than often realized, as many cyber-attacks on SCADA system still going un-reported. There are several reasons why many cyber-attacks are swept under the carpet, including to protect brand reputation or to avoid highlighting vulnerabilities that could attract further attacks. However, due to lack of reporting many businesses still underestimate the threat of cyber-attacks and the scale of damage that can ensue.

Read More

SASE as a Business Continuity Solution

Article | April 9, 2020

As offices worldwide sit abandoned, many of the millions of employees ordered to stay home are actually keeping hard at work, taking advantage of residential broadband connections, VPNs, email, video conferencing, and instant messaging applications to do their jobs. Thank the corporate world’s willingness to let employees occasionally work from home for the necessary IT infrastructure. However, as much as we’d like this alone to solve the business continuity challenges, enabling a handful of employees to work from home once a week is trivial compared to ensuring all of a company’s employees can do so for months on end.

Read More

PEWC Makes Easy Transition to SAP HANA with Cisco HyperFlex

Article | April 20, 2020

Pacific Electric Wire & Cable Co. (PEWC) is a manufacturer in Taiwan with subsidiaries in China, Singapore, Thailand, and Australia. Like many companies, they had been facing the looming change over to SAP HANA. They were ready to switch over from their older SAP software and take advantage of SAP HANA apps and databases. They also had a goal of speeding up operational analytics and insights. But with the change to HANA, they needed all new infrastructure, certified by SAP, to support it.

Read More

Spotlight

ITS InfoCom

ITS InfoCom is the first Latin American multinational in the field of Information Technologies. Specialized in RIM services. The architectures we offer are: Borderless Networks, Convergence, Unified Collaboration, Cloud Computing, Security and Business Contact Center.

Events