The state of edge security report

Issue 6 2023 News, IT infrastructure

Edge computing has grown from being a niche use case in a handful of industries to offering a major opportunity for enterprises across industries to spread computing power around the world. Edge computing slashes latency times by processing data where the data is being collected, or when it might otherwise be impossible to process because a workload or piece of hardware is disconnected from the network.

Security and data protection are always top of mind when considering any advanced technology. This is especially true for edge devices or systems that stretch the enterprise perimeter and cannot be as easily managed by network administrators as on-premises or cloud system.

Red Hat worked with S&P; Global Market Intelligence to survey industry experts to better understand where edge deployments are in terms of maturity, scale, and security challenges. The State of Edge Security Report provides insights and best practices to allow businesses to benchmark themselves against peers and make better decisions when considering edge computing and edge security.

This report is based on a survey of over 300 respondents of engineering and security professionals from around the world.

Some key findings from this year's survey include:

1. Security is a top challenge with edge deployments.

2. Edge deployments are increasing in scale across investments, projects, use cases, endpoints, and types of endpoints.

3. Attacks on edge systems through vulnerabilities and misconfigurations are rising.

Most respondents shared that they plan to invest in existing and new edge projects over the next few years. That is a great strategy considering the agility and data processing they plan to add to their organisations. With these investments, edge use cases will continue to expand, and we will see even more exciting case studies from all sectors.

What about edge security concerns?

Edge computing increases your attack surface. While this is certainly a major concern, a thoughtful and comprehensive edge strategy will not only account for business value at scale, but also security for your entire edge ecosystem.

The top-ranked challenge for respondents was about data, network and device security, and physical/digital security. This challenge highlights where respondents think their edge efforts may be hampered as they scale and try new ways of working.

Red Hat learned that the top three security related concerns dealt with cyberattacks (inside and outside attackers) and vulnerabilities. Enterprises recognise the growing risks of edge infrastructure expansion. However, investment in tools and processes that harden your edge systems against attacks – including shift-left security, software supply chain management, and intrusion detection – can limit those risks, while you continue to reap the business benefits of edge computing.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Paxton opens first experience centre in South Africa
Paxton News Access Control & Identity Management
The new Paxton Experience Centre in Johannesburg is now open and welcoming security installers and end users who want to see Paxton’s products in action.

Read more...
Paratus signs re-seller agreement with Starlink for Africa
News IT infrastructure
Pan-African telco and network services provider Paratus Group announced it has entered an agreement as a distributor for Starlink’s high-speed services across the African continent, available immediately in Mozambique, Kenya, Rwanda and Nigeria.

Read more...
4IR is opportunity
News
In South Africa, digitalisation remains ‘at a nascent stage’ which means significant work still has to be done when it comes to addressing skills development around 4IR in the country.

Read more...
Five ways to reduce your cyber insurance premiums
Security Services & Risk Management News
With the global costs of cybercrime expected to soar to $13 trillion within the next five years, cyber insurance is booming as organisations try to mitigate the risk of financial losses.

Read more...
Client satisfaction boosted by 85% at Thungela Mine
Thorburn Security Solutions News Security Services & Risk Management Mining (Industry)
Thorburn Security, a division of Tsebo Solutions Group, has announced its recent collaboration with Kwa-Zulu Natal security company, Ithuba Protection Services, as part of its Enterprise Supplier Development (ESD) initiatives across Africa.

Read more...
Fidelity SecureFire steps into critical fire response space
News Fire & Safety
With the majority of fire stations around the country being crippled by a lack of resources to offer effective responses, Fidelity Fire Solutions has launched its own ‘first responder’ model, Fidelity SecureFire.

Read more...
CHI selects NEC XON as trusted cybersecurity partner
News Cyber Security Industrial (Industry)
CHI Limited, Nigeria's leading market player in fruit juices and dairy products, has engaged in a strategic cybersecurity partnership with NEC XON, a pan-African ICT systems integrator.

Read more...
Collaboration delivers integrated and holistic security
Guardian Eye CCTV, Surveillance & Remote Monitoring News Integrated Solutions
Guardian Eye and Lytehouse have partnered to integrate their speciality solutions and provide a holistic security offering that overcomes the fragmentation of security systems and services.

Read more...
Manage security systems remotely
Hikvision South Africa CCTV, Surveillance & Remote Monitoring IT infrastructure Products
Hikvision launched a new generation of smart managed switches that, in conjunction with the Hik-Partner Pro mobile app, enable installers to remotely deploy and configure security systems with comprehensive operation and maintenance capabilities.

Read more...
Kaspersky appoints new GM for Africa
News Cyber Security
Kaspersky has announced the appointment of Andrew Voges as the new General Manager for Africa to boost regional market positioning and enterprise protection.

Read more...