Unified, automated, and ready to turn data into intelligence.
Discover how to unlock the true value of your data.
March 16-19 | Booth #935
San Jose McEnery Convention Center
Edge computing security reflects a modern network architecture that secures access to organizational assets at the point of access. With increasingly distributed assets, many organisations don’t simply operate in a physical location. Instead, they operate on the internet, which means that they can be accessed worldwide whether they like it or not.
That expansive access is rife for abuse by cybercriminals and other bad actors. Without edge security, traditional security solutions have difficulty protecting access afield of more traditional premises or asset-based controls.
In this article, we’ll define what edge security is, some of the key aspects of edge security, and some aspects of implementing an edge security reference architecture.
Edge security refers to the conceptual security model where protection is applied to mitigate risks at the edge of a network. That edge is where organizational assets, like mobile devices, internet of things devices (IoT), endpoints, and applications have access to the internet.
The benefits of edge security are acutely felt in distributed environments. Traditionally, when organisations were reliant on centralized data centers and on-premises corporate networks, perimeter firewalls and intrusion prevention systems were key to safeguarding corporate assets. That made sense since corporate assets were largely in a physical place.
Distributed computing environments have complicated what constitutes a “corporate network.” It’s no longer sufficient for most businesses to protect their data centre and on-premises networks because employees are working afield of those areas, leveraging environments that don’t sit in those areas.
Edge security provides a layer of defense to that more ephemeral perimeter. It’s designed to prevent unauthorized access to and manipulation of corporate assets sitting within that extended environment.
Edge security focuses on the same core risks upon which traditional security focuses: identity, device, and network to protect data. It typically layers on top of traditional security solutions to protect that data outside of what can be thought of as traditional security’s core safeguards.
When it comes to identity, edge security leverages identity management to ensure that the user or device has authenticated appropriately and has the appropriate authorization to access the specific resource. Some would argue that the push to single sign-on (SSO) and federated identity are attempts to create an extended trust fabric to facilitate more straightforward access to disparate systems.
With respect to devices, edge security looks to push data and identity-based protections more heavily to the device. Behavioral monitoring, data tagging, and data management are a few aspects of edge computing that are increasingly being applied and enforced at the device level. That layers on traditional EDR protections, which are also now less reliant on external appliances for operation.
Network safeguards are also key to a comprehensive edge security architecture. Secure access service edge (SASE) solutions provide comprehensive cloud access and perimeter traversal security. These solutions typically layer on top of physical and virtual firewalls to provide seamless user, asset, and data traversal between network segments.
Much like a more traditional network security architecture, an edge security architecture requires strategic planning and an understanding of the environment being secured. It can be simplified, though, to give an idea of how to implement it.
If it helps, think of the secure edge like the outside of a building. Once inside that building, each room has a secure edge. Those secure edges may be open doors, allowing unfettered access, or locked to limit access. Security cameras observe migration of people and data throughout.
With that analogy in place, there are a few considerations you should think about when implementing an edge security architecture.
Related reading: What is a resiliency architecture?
Everpure provides multiple solutions to maintain and recover your distributed environment. Solutions like Purity//FA help you seamlessly manage storage whether it’s on premises or in the cloud. Purity//FA provides resilient and scalable management tools to ensure that data is appropriately managed within your secure edge.
If the worst should occur, Everpure Protect Service //DRaaS™ provides an immutable and resilient cloud recovery solution that gets you back on your feet fast. It guarantees clean recovery to anywhere you need it.
The secure edge is a novel concept in the sense that it takes safeguards for more traditional technology infrastructure and expands them to meet more expansive environmental needs. Where computing and business are increasingly distributed, it’s never been more important to be able to secure that environment.
Everpure can help. We provide solutions that keep your distributed environment operating and can recover some or all of it at a moment’s notice.
Mark your calendars. Registration opens in February.
Access on-demand videos and demos to see what Everpure can do.
Charlie Giancarlo on why managing data—not storage—is the future. Discover how a unified approach transforms enterprise IT operations.
Modern workloads demand AI-ready speed, security, and scale. Is your stack ready?