
How Edge Computing Aligns Connectedness and Trust
Description
How Edge Computing Aligns Connectedness and Trust
This IDC Perspective discusses how secure, scalable access anywhere and anytime is one of the goals and outcomes of the connected enterprise. As enterprises adopt the edge to enhance application performance and improve business agility, trusted connectivity requires that organizations take a multifaceted and expanded approach to security that extends across the cloud, network, and application levels. "The edge brings new capabilities and performance benefits to the enterprise when secure connectivity is established," commented Paul Hughes, research director, Future of Connectedness at IDC." As organizations adopt and leverage more applications and compute benefits at the edge, building a secure and trusted edge strategy will require a singularly managed but multipronged strategy that maps locations, connectivity, suppliers, and architectures together."
Please Note: Extended description available upon request.
This IDC Perspective discusses how secure, scalable access anywhere and anytime is one of the goals and outcomes of the connected enterprise. As enterprises adopt the edge to enhance application performance and improve business agility, trusted connectivity requires that organizations take a multifaceted and expanded approach to security that extends across the cloud, network, and application levels. "The edge brings new capabilities and performance benefits to the enterprise when secure connectivity is established," commented Paul Hughes, research director, Future of Connectedness at IDC." As organizations adopt and leverage more applications and compute benefits at the edge, building a secure and trusted edge strategy will require a singularly managed but multipronged strategy that maps locations, connectivity, suppliers, and architectures together."
Please Note: Extended description available upon request.
Table of Contents
12 Pages
- Executive Snapshot
- Situation Overview
- Trusted Pervasive Edge Computing: The Next Step for Connectedness
- The Democratization of Edge Compute
- The Creation of the Edge Cloud
- Risks and Benefits
- Edge-to-Cloud Security Considerations for the Connected Enterprise
- Addressing Edge Device Security
- Addressing Cloud Security
- Addressing Network Edge Security
- Addressing Application Security
- Building a Secure Trusted Edge
- Advice for the Technology Buyer
- Learn More
- Related Research
- Synopsis
Pricing
Currency Rates
Questions or Comments?
Our team has the ability to search within reports to verify it suits your needs. We can also help maximize your budget by finding sections of reports you can purchase.