wp header logo 541

The risks of edge computing – TechRepublic

Breaking News Trending

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.
We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.
Invalid email/username and password combination supplied.
An email has been sent to you with instructions on how to reset your password.
By registering, you agree to the Terms of Use and acknowledge the data practices outlined in the Privacy Policy.
You will also receive a complimentary subscription to TechRepublic’s News and Special Offers newsletter and the Top Story of the Day newsletter. You may unsubscribe from these newsletters at any time.
All fields are required. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).
The risks of edge computing
Your email has been sent
Edge computing opens organizations up to some security risks, but they can be mitigated with the proper planning.
With the explosive growth of IoT devices and the accompanying deluge of data, businesses are under more pressure than ever to find ways to decrease latency and improve performance. This is why edge computing, the technology that brings computation and data storage closer to the devices that generate the data, continues to grow in popularity.
According to a recent study by Research and Markets, the global edge computing market is expected to grow from $11.24 billion in 2022 to $155.9 billion by 2030, at a compound annual growth rate of 38.9%.
SEE: Don’t curb your enthusiasm: Trends and challenges in edge computing (TechRepublic)
But as with any new technology, there are risks inherent in adopting edge computing.
One of the most significant risks of edge computing is security. Adopters are aware of this, as demonstrated in a recent AT&T survey that sampled 1,500 companies. The survey found that companies expect to spend between 11% and 20% of their edge investment on security.
Security is a major risk for several reasons:
Consequently, proper physical, network and cloud security measures such as Secure Access Service Edge must be in place to protect data processed at the edge. Otherwise, the risk of a security breach will outweigh the benefits of deploying edge computing.
Cost is one of the primary considerations when assessing the viability of edge computing. While the potential benefits of deploying an edge network are significant, the costs associated with managing and maintaining an edge environment can quickly become prohibitive. This is especially true if the edge deployment is not carefully planned, executed and managed. For example, as new IoT endpoints proliferate, managing them effectively from a centralized location can become increasingly complex.
In addition, because edge computing requires hardware and software, businesses must carefully consider the total cost of ownership before deploying an edge solution. The hardware cost can be significant because companies often need to purchase new devices or upgrade existing ones to support edge computing. For example, enterprises may need to buy new routers, switches and servers to support an edge deployment. In addition, they may need to upgrade their network infrastructure and bandwidth to accommodate the increased traffic generated by edge devices.
The software cost can also be high because businesses often need to purchase or develop new applications specifically for edge devices. These applications must be able to operate in a distributed environment, manage the data generated by edge devices and integrate with the rest of the organization’s IT infrastructure.
One way to help control costs is to partner with a managed services provider that offers comprehensive support for edge deployments. This can help to ensure that the deployment is successful and that any cost issues that arise are quickly resolved.
The sheer scale of data generated by edge devices can also pose a challenge for businesses. Edge devices generate large amounts of data, which must be stored, processed and analyzed. As a result, businesses need to have the infrastructure in place to support this data growth and be able to manage and utilize the data effectively. Companies unprepared for this influx of data may find themselves overwhelmed, with little visibility into what is happening at the edge of their network.
Another challenge that businesses face when deploying edge computing is fitting the new edge components into their existing legacy network architectures. Edge devices are often deployed in remote locations, and they need to be able to communicate with the rest of the organization’s IT infrastructure. This can be a challenge because many existing network architectures were not designed to accommodate edge devices. As a result, businesses may need to make significant changes to their network architecture or purchase new networking equipment to support an edge deployment.
Edge computing is growing in popularity as more and more businesses are looking to take advantage of its benefits despite the risks. While these risks can seem daunting, they can be effectively mitigated by taking a careful and considered approach to deployment.
Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices.
The risks of edge computing
Your email has been sent
Your message has been sent
TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project.
Looking for the best payroll software for your small business? Check out our top picks for 2022 and read our in-depth analysis.
Next year, cybercriminals will be as busy as ever. Are IT departments ready?
Coursera offers a variety of training options for the growing data professional. Explore top data science courses from Coursera now.
Organize a number of different applicants using an ATS to cut down on the amount of unnecessary time spent finding the right candidate.
Whether you are a Microsoft Excel beginner or an advanced user, you’ll benefit from these step-by-step tutorials.
This policy provides guidelines for secure and effective cloud computing operations to ensure the integrity and privacy of company-owned information. From the policy: The list of advantages to cloud computing includes lowered operational costs, greater technological flexibility, and the ability to rapidly implement new systems or services. Gains in business continuity are an especially noteworthy …
For SMBs, hiring a service to handle payroll calculation, processing and documentation can save valuable time and resources. This comparison chart with sample information provides a framework for comparing potential services. More on choosing a service: Payroll services The are several basic payroll services that all vendors should offer regardless of cost or additional services …
Employees who work from home often use company-supplied systems and devices, which helps ensure that they have consistent, state-of-the-art equipment to do their work. However, organizations should provide usage guidelines, such as this policy, covering the responsibilities of IT staff and employees. From the policy: For an organization to properly implement this policy it is …
Virtualization platforms are available from a number of vendors, but it’s still critical to maintain your virtualization environment to avoid unnecessary resource consumption, out of-compliance systems or applications, data loss, security breaches and other negative outcomes. This policy defines responsibilities for both end users and the IT department to ensure that the virtualized resources are …

source

Leave a Reply

Your email address will not be published. Required fields are marked *