| | APRIL 20228IN MY OPINIONBy Shrikant Navelkar, Director, Clover InfotechHOW CAN ENTERPRISES OVERCOME EDGE COMPUTING SECURITY CHALLENGES?loud computing be-came a popular IT buzzword since the pandemic. Enterprises started to frantical-ly move their busi-ness-critical workload to the cloud. While Cloud was making headlines, `Edge Computing' has subtly caught on. We can recognize edge com-puting as the natural progression to cloud computing. What is Edge Computing?Cloud computing operates through a centralized cloud where data is being sent for computation. This transfer of data results in latency and industries that need to crunch data and present results in real-time need a better solution. Hence, edge computing came into picture. In the edge, computing resources are brought closer to the edge of the network. In a nutshell, edge computing enables companies to process data closer to the source, instead of relying on a central cloud datacentre. Edge computing has gained popularity along with the proliferation of IoT and connected devices. It is changing the way IT architects modernize their infrastructures. In fact, the expansion to the edge is so pronounced that Gartner predicts that by 2025, 75 percent of enterprise data will be generated and processed outside the traditional datacentre or cloud. The unfortunate side-effect of this popularity is that it has attracted the attention of cyber threat actors and they are relentlessly trying to exploit the vulnerabilities of edge devices. Security Challenges of Edge Computing:Since edge devices are often deployed far outside a centralized data infrastructure or datacentre, they face magnified security risks from both a digital and physical security standpoint. Data Storage & Protection: Data that is being collected and processed at the edge lacks the hardened physical security usually found in data centres. It might be possible to steal an entire database simply by removing the disk from the edge computing resource, or by inserting a memory stick to copy information. In addition, edge computing infrastructures often have limited local storage options, which might make it difficult to back up critical files. Hence, it would be very difficult to restore this data in case of an incident or accident. Difficulty in Managing: Edge computing poses manageability challenges. More nodes would mean more monitoring, maintenance, and of course, more cyberattack attempts. In addition, edge computing enables quick collection and analysis of huge volume of data, which can hinder all data related processes such as backup, recovery, management, and storage. Data Sprawl: As companies deploy more and more edge devices to manage a wider array of operations, it gets harder to track and monitor. Over time, there are chances that devices may even outgrow boundaries of the edge, resulting in bandwidth overcrowding and endangering the end-point security of multiple devices. CShrikant Navelkar, Director
<
Page 7 |
Page 9 >