Registered users can unlock up to five pieces of premium content each month.
Business on High Alert as Cyberattacks Continue to Be a Threat, Despite Technological Advancements |
NEWS |
Edge computing is an area that is rapidly growing, driven by the explosion of data generated at the edge, as well as the proliferation of edge data centers, edge gateways, and Internet of Things (IoT) devices. This fast growth brings the complexity of securing the edge environment. Edge computing involves many different components that need to be secured, including areas such as devices, data, networks, and software applications. Failure to have a strong security posture in all of these areas can lead to significant and long-term losses for businesses.
Optus, an Australian telecommunications service provider, was a victim of a cyberattack that resulted in stolen data on 10 million customers. The breach occurred because of an unprotected and publicly exposed Application Programming Interface (API). Rackspace Technology, an American cloud computing provider, suffered a ransomware attack, with hackers able to access customer data and forcing Rackspace to shut down its hosted Exchange email environment.
As technology advances and more business look toward shifting to a distributed computing environment, new types of cyberattacks using advanced technology, such as Artificial Intelligence (AI) and Machine Learning (ML) are likely to happen. The proliferation of IoT devices being deployed in the field, if not secured correctly, could lead to many sophisticated attacks by external hackers.
New Methods Needed to Combat Increasing Sophistication of Cyberattacks |
IMPACT |
The state of security maturity in edge computing will always be a work in progress, simply because this area is a constantly evolving market with new technology and innovation being introduced continuously. ABI Research believes there is a growing awareness of security risks in deploying edge computing solutions, and businesses look at several different types of security methods and frameworks when embarking on an edge computing journey.
Often, a large number of edge IoT devices are used in edge computing solutions. This also means that these devices form the starting point in building hardware Root of Trust (RoT) that can be used to secure the edge platform. Integrating a strong security posture starts at the processor level with security Intellectual Property (IP) blocks hosted on these IoT devices. For example, silicon IP producer Arm provides embedded security for Systems-on-Chip (SoCs) through its CryptoCell-700 family, while Intel’s built-in foundational security called Intel Security Essentials is available across all Intel processor lines, enabling security developers to protect and build applications in a secure environment.
Besides securing the core processor hardware, there are several ways that businesses can look into securing edge networks, including:
How Edge Computing Providers Can Help Businesses Secure the Edge |
RECOMMENDATIONS |
The edge computing market can be a complex and fragmented ecosystem. Not all edge solutions providers have the capability to provide a trusted edge security solution. However, articulating the importance of building and starting with a strong security posture at the beginning of the edge journey will be crucial in developing a long-lasting relationship with customers. Below are some areas where edge solutions providers can look to bring greater value to the edge computing market:
Edge computing providers are racing to grab a piece of the pie, but must remember that a unique value proposition coupled with a strong security focus will be crucial in guaranteeing success in this space. Applying confidential computing, SASE, zero trust, etc. together with an edge solution does not guarantee a successful product. Edge providers should look at the strengths and weaknesses of their edge solutions and figure out what would make the most sense for their customers, as well as for the business. Building with a strong security foundation in mind will be key to ensuring longevity and success in this market.