The state of edge security report

Issue 6 2023 News & Events, Infrastructure

Edge computing has grown from being a niche use case in a handful of industries to offering a major opportunity for enterprises across industries to spread computing power around the world. Edge computing slashes latency times by processing data where the data is being collected, or when it might otherwise be impossible to process because a workload or piece of hardware is disconnected from the network.

Security and data protection are always top of mind when considering any advanced technology. This is especially true for edge devices or systems that stretch the enterprise perimeter and cannot be as easily managed by network administrators as on-premises or cloud system.

Red Hat worked with S&P; Global Market Intelligence to survey industry experts to better understand where edge deployments are in terms of maturity, scale, and security challenges. The State of Edge Security Report provides insights and best practices to allow businesses to benchmark themselves against peers and make better decisions when considering edge computing and edge security.

This report is based on a survey of over 300 respondents of engineering and security professionals from around the world.

Some key findings from this year's survey include:

1. Security is a top challenge with edge deployments.

2. Edge deployments are increasing in scale across investments, projects, use cases, endpoints, and types of endpoints.

3. Attacks on edge systems through vulnerabilities and misconfigurations are rising.

Most respondents shared that they plan to invest in existing and new edge projects over the next few years. That is a great strategy considering the agility and data processing they plan to add to their organisations. With these investments, edge use cases will continue to expand, and we will see even more exciting case studies from all sectors.

What about edge security concerns?

Edge computing increases your attack surface. While this is certainly a major concern, a thoughtful and comprehensive edge strategy will not only account for business value at scale, but also security for your entire edge ecosystem.

The top-ranked challenge for respondents was about data, network and device security, and physical/digital security. This challenge highlights where respondents think their edge efforts may be hampered as they scale and try new ways of working.

Red Hat learned that the top three security related concerns dealt with cyberattacks (inside and outside attackers) and vulnerabilities. Enterprises recognise the growing risks of edge infrastructure expansion. However, investment in tools and processes that harden your edge systems against attacks – including shift-left security, software supply chain management, and intrusion detection – can limit those risks, while you continue to reap the business benefits of edge computing.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Service robot technology for residential complexes
Suprema AI & Data Analytics Infrastructure Residential Estate (Industry)
Suprema has signed a three-party memorandum of understanding (MOU) with Hyundai Motor Group Robotics LAB and Hyundai Engineering & Construction (Hyundai E&C) to collaborate on advancing residential complexes through service robot technology.

Read more...
AURA appoints Taryn Winer as global head of people
News & Events Security Services & Risk Management
Following its €13,5 million Series B funding round last year and accelerating international expansion, particularly across the United States, AURA has appointed Taryn Winer as global head of people.

Read more...
Gallagher Security releases new fence controllers
Perimeter Security, Alarms & Intruder Detection News & Events
Gallagher Security has announced the release of its new F5 and F6 Fence Controllers, marking the latest generation of enhanced-safety, monitored-pulse fence technology, designed to meet the demands of modern security environments.

Read more...
Paxton set to launch game-changing new system
Paxton Access Control & Identity Management News & Events
Access control is evolving fast. Installers and end users are looking for systems that are simple to install, easy to manage remotely, and flexible enough to scale. In response, Paxton is exploring how emerging technologies can reshape access control.

Read more...
AI projects are failing at alarming rates
AI & Data Analytics Infrastructure
As organisations around the world accelerate their investments in artificial intelligence, digital transformation and data analytics, a growing number of industry experts are warning that many companies are still approaching these initiatives in fundamentally flawed ways.

Read more...
The impact of misguided viral campaigns
News & Events Training & Education
For many years, traditional media have been perceived as slower, more inflexible, and less responsive compared to digital platforms. But in an ecosystem flooded with content, its value is becoming clearer: verification, context, and accountability.

Read more...
Gallagher Security strengthens KwaZulu-Natal presence
Gallagher News & Events Integrated Solutions
Gallagher Security has reinforced its commitment to the KwaZulu-Natal region with its Command the Future event. The full-day event welcomed over 100 channel partners, end users, and consultants, marking Gallagher’s third major event in Durban.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.