The rise of cloud technology enabled organizations to shift computing-power and data storage from private data centers to public cloud environments. The transition to the cloud facilitated vast amounts of data to be accumulated and manipulated in a centralized way; however, widespread use of the Internet of Things (IoT) has created new data processing requirements. It does not make sense to centralize massive amounts of raw data gathered by IoT sensors, so edge computing seeks to fill this need by decentralizing and distributing computing resources.
As enterprises modernize their IT infrastructure to meet evolving business demands the conversation of security is always top of mind. More and more companies are now managing a distributed enterprise, with remote offices and branches that are forcing them to move away from a highly centralized IT model to one that extends to the edge. How will your security strategy have to evolve to meet these new security demands as you’re now securing more than just the perimeter? As one of the emerging leaders in SD-WAN technology, we looked at some tips from Fortinet on this topic. Check out these key requirements for distributed enterprise firewall security.
One of the reasons why IoT is so vulnerable to attacks is the lack of visibility in what is truly happening in your environment. This is where edge computing comes in. Edge computing is about keeping compute proximal to the physical environment where it is collected in the first place, rather than forwarding everything to the cloud (particularly processing and storage). In the same way that the client/server computing model replaced the mainframe, enterprises are beginning to realize the benefit of a distributed computing model when it comes to IoT. Client/server architecture put processing power in physical proximity of the end user. Edge computing provides a local segmented processing network for IoT devices.
If your career centers on enterprise architecture, then you are literally watching history repeat itself in real time. Decades ago, enterprise resources and processing power were concentrated within the mainframe and users had to work in close approximation of it. But then, users from the outer perimeters started demanding more capabilities, which translated into more resources where they were—at the edge. This introduced the PC, which decentralized enterprises and transitioned in the era of the client server model that users loved. Once again, the technology cycle is about to repeat itself.