BrandPost: Outlining the Ingredients for a Successful Edge Security Strategy

Share on facebook
Share on twitter
Share on linkedin
As companies continue their digital transformation journeys, they are moving more IT resources out of the data center and closer to end users, making security even more critical and complicated. In fact, 77% of organizations associate edge computing with security concerns. [1]It’s a given that security must be integrated and embedded with network, compute and storage systems to be most effective. But that’s a challenge in an edge computing ecosystem.“Instead of securing a majority of resources in a handful of core locations, the distributed nature of edge computing means that infrastructure, data, and applications could be spread across hundreds or thousands of locations,” says Dave McCarthy, a research director with IDC's worldwide infrastructure practice focusing on edge strategies, in CSOonline.com.To read this article in full, please click here

This post was originally published on this site

Source: CIO Magazine On:

Read On

As companies continue their digital transformation journeys, they are moving more IT resources out of the data center and closer to end users, making security even more critical and complicated. In fact, 77% of organizations associate edge computing with security concerns. [1]

It’s a given that security must be integrated and embedded with network, compute and storage systems to be most effective. But that’s a challenge in an edge computing ecosystem.

“Instead of securing a majority of resources in a handful of core locations, the distributed nature of edge computing means that infrastructure, data, and applications could be spread across hundreds or thousands of locations,” says Dave McCarthy, a research director with IDC’s worldwide infrastructure practice focusing on edge strategies, in CSOonline.com.

To read this article in full, please click here

About the author: CIO Minute
Tell us something about yourself.

Leave a Comment

CIO Portal