The state of edge security report

Issue 6 2023 News & Events, Infrastructure

Edge computing has grown from being a niche use case in a handful of industries to offering a major opportunity for enterprises across industries to spread computing power around the world. Edge computing slashes latency times by processing data where the data is being collected, or when it might otherwise be impossible to process because a workload or piece of hardware is disconnected from the network.

Security and data protection are always top of mind when considering any advanced technology. This is especially true for edge devices or systems that stretch the enterprise perimeter and cannot be as easily managed by network administrators as on-premises or cloud system.

Red Hat worked with S&P; Global Market Intelligence to survey industry experts to better understand where edge deployments are in terms of maturity, scale, and security challenges. The State of Edge Security Report provides insights and best practices to allow businesses to benchmark themselves against peers and make better decisions when considering edge computing and edge security.

This report is based on a survey of over 300 respondents of engineering and security professionals from around the world.

Some key findings from this year's survey include:

1. Security is a top challenge with edge deployments.

2. Edge deployments are increasing in scale across investments, projects, use cases, endpoints, and types of endpoints.

3. Attacks on edge systems through vulnerabilities and misconfigurations are rising.

Most respondents shared that they plan to invest in existing and new edge projects over the next few years. That is a great strategy considering the agility and data processing they plan to add to their organisations. With these investments, edge use cases will continue to expand, and we will see even more exciting case studies from all sectors.

What about edge security concerns?

Edge computing increases your attack surface. While this is certainly a major concern, a thoughtful and comprehensive edge strategy will not only account for business value at scale, but also security for your entire edge ecosystem.

The top-ranked challenge for respondents was about data, network and device security, and physical/digital security. This challenge highlights where respondents think their edge efforts may be hampered as they scale and try new ways of working.

Red Hat learned that the top three security related concerns dealt with cyberattacks (inside and outside attackers) and vulnerabilities. Enterprises recognise the growing risks of edge infrastructure expansion. However, investment in tools and processes that harden your edge systems against attacks – including shift-left security, software supply chain management, and intrusion detection – can limit those risks, while you continue to reap the business benefits of edge computing.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
From the editor's desk: We’ve only just begun
Technews Publishing News & Events
The surveillance market has expanded far beyond the analogue days of just recording and/or monitoring screens. The capabilities of surveillance technology today extend to black screen monitoring with ...

Read more...
SAFPS issues SAPS impersonation scam warning
News & Events Security Services & Risk Management
The Southern African Fraud Prevention Service (SAFPS) is warning the public against a scam in which scammers pose as members of the South African Police Service (SAPS) and trick and intimidate individuals into handing over personal and financial information.

Read more...
Strong industry ties set Securex South Africa apart
News & Events Training & Education
Securex South Africa, co-located with A-OSH EXPO, Facilities Management Expo, and Firexpo, is a meeting place of minds, where leading security, safety, fire, and facilities professionals come together, backed by strong ties with the industry’s most influential bodies.

Read more...
Connected commercial drone market to reach US$37.3 billion
News & Events Commercial (Industry) IoT & Automation
The global market for connected commercial drones is forecast to grow from US$18.6 billion in 2024 at a compound annual growth rate (CAGR) of 15% to reach US$37.3 billion in 2029

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
Fully-integrated browser AI
News & Events
Opera Mini now provides all its smartphone users with its own free built-in browser AI, Aria, including AI chat, Ask Aria and image generation. According to an Opera survey, 80% of South Africans want AI tools integrated into their browser.

Read more...
Amendments to the Private Security Industry Regulations
Technews Publishing Agriculture (Industry) News & Events Associations
SANSEA, SASA, National Security Forum, CEO, TAPSOSA, and LASA oppose recently published Amendments to the Private Security Industry Regulations regarding firearms.

Read more...
Local innovation driving excellence in FM
Securex South Africa News & Events
As organisations seek cost-effective, sustainable, and high-quality solutions, home-grown facilities management innovation is proving to be a critical driver of operational efficiency and long-term success.

Read more...
A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...