The state of edge security report

Issue 6 2023 News & Events, Infrastructure

Edge computing has grown from being a niche use case in a handful of industries to offering a major opportunity for enterprises across industries to spread computing power around the world. Edge computing slashes latency times by processing data where the data is being collected, or when it might otherwise be impossible to process because a workload or piece of hardware is disconnected from the network.

Security and data protection are always top of mind when considering any advanced technology. This is especially true for edge devices or systems that stretch the enterprise perimeter and cannot be as easily managed by network administrators as on-premises or cloud system.

Red Hat worked with S&P; Global Market Intelligence to survey industry experts to better understand where edge deployments are in terms of maturity, scale, and security challenges. The State of Edge Security Report provides insights and best practices to allow businesses to benchmark themselves against peers and make better decisions when considering edge computing and edge security.

This report is based on a survey of over 300 respondents of engineering and security professionals from around the world.

Some key findings from this year's survey include:

1. Security is a top challenge with edge deployments.

2. Edge deployments are increasing in scale across investments, projects, use cases, endpoints, and types of endpoints.

3. Attacks on edge systems through vulnerabilities and misconfigurations are rising.

Most respondents shared that they plan to invest in existing and new edge projects over the next few years. That is a great strategy considering the agility and data processing they plan to add to their organisations. With these investments, edge use cases will continue to expand, and we will see even more exciting case studies from all sectors.

What about edge security concerns?

Edge computing increases your attack surface. While this is certainly a major concern, a thoughtful and comprehensive edge strategy will not only account for business value at scale, but also security for your entire edge ecosystem.

The top-ranked challenge for respondents was about data, network and device security, and physical/digital security. This challenge highlights where respondents think their edge efforts may be hampered as they scale and try new ways of working.

Red Hat learned that the top three security related concerns dealt with cyberattacks (inside and outside attackers) and vulnerabilities. Enterprises recognise the growing risks of edge infrastructure expansion. However, investment in tools and processes that harden your edge systems against attacks – including shift-left security, software supply chain management, and intrusion detection – can limit those risks, while you continue to reap the business benefits of edge computing.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
From the editor's desk: Showtime for Securex
Technews Publishing News & Events
We have once again reached the time of year when the security industry focuses on Securex. This issue includes a short preview, with more coming online and via our special Securex Preview news briefs. ...

Read more...
Chubbsafes celebrates 190 years
Gunnebo Safe Storage Africa News & Events Security Services & Risk Management
Chubbsafes marks its 190th anniversary in 2025 and as a highlight of the anniversary celebrations it is launching the Chubbsafes 1835, a limited edition 190th-anniversary collector’s safe.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
New law enforcement request portal
News & Events Security Services & Risk Management
inDrive launches law enforcement request portal in South Africa to support safety investigations. New portal allows authorised South African law enforcement officials to securely request user data related to safety incidents.

Read more...
Igniting standards, powering protection
Securex South Africa News & Events Fire & Safety
Fire safety is more than compliance, it is a critical commitment to protecting lives, assets, and infrastructure. At Firexpo 2025, taking place from 3 to 5 June at Gallagher Convention Centre, that commitment takes centre stage.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
The rise of AI-powered cybercrime and defence
Information Security News & Events AI & Data Analytics
Check Point Software Technologies launched its inaugural AI Security Report, offering an in-depth exploration of how cybercriminals are weaponising artificial intelligence (AI), alongside strategic insights defenders need to stay ahead.

Read more...
From the editor's desk: We’ve only just begun
Technews Publishing News & Events
The surveillance market has expanded far beyond the analogue days of just recording and/or monitoring screens. The capabilities of surveillance technology today extend to black screen monitoring with ...

Read more...
SAFPS issues SAPS impersonation scam warning
News & Events Security Services & Risk Management
The Southern African Fraud Prevention Service (SAFPS) is warning the public against a scam in which scammers pose as members of the South African Police Service (SAPS) and trick and intimidate individuals into handing over personal and financial information.

Read more...