Securing the edge in a world of IOT and cloud

Edge computing will be the power behind the next industrial revolution, forever altering the way manufacturing and services are carried out, says Tsholofelo Montshioa, business development manager for Supermicro at Axiz.

Johannesburg, 05 Mar 2020

Tsholofelo Montshioa, business development manager for Super Micro at Axiz, says edge computing, or the analysis of data and development of solutions at the site where it is generated, is bringing the power of the cloud to mobile and IOT devices, and is being used by businesses to create smarter buildings, cities, workspaces, retail experiences, among many other applications.

Montshioa adds that the edge is crucial because it is driving new ways to increase operational efficiency, maximise performance and safety, and minimise unplanned downtime, which is all vital in today’s digital, always-on operations.

And with the rise of the Internet of things (IOT), particularly the industrial Internet of things (IIOT), edge computing is one of the foundations of innovation and is opening up new and exciting ways of doing business. Furthermore, edge computing will be the power behind the next industrial revolution, forever altering the way manufacturing and services are carried out.

The future of business

Not only does the edge power the collection of data in real-time, but it is also the portal to optimising that data, to glean actionable insights from it instantly.

“Edge computing is both scalable and flexible, and can be up and running far more quickly than centralised computing, enabling businesses to respond to shifting business needs more rapidly. It is more cost-effective and efficient, as processing data in real-time removes latency as well as the associated costs with sending data to and from the various clouds and servers."

However, along with all its benefits, edge computing is also driving a massive paradigm shift in the way data needs to be managed and secured.

“There’s no doubt the edge, and particularly edge devices, have fallen into the crosshairs of many threat actors and cyber criminal groups, which is why organisations need to raise the bar when it comes to securing the edge,” she says. Adding: “The shift to the IOT and the emergence of the edge will have tremendous potential when it comes to improving smart technologies across the board, but they also bring a slew of new cyber security challenges.”

Montshioa says considering the enormous amount of unsecured IOT devices today, many of these were not designed with security in mind from the bottom up, only tacked on as an afterthought, if at all. This is seeing IOT devices become extremely vulnerable to attacks.

“Moreover, most IOT devices have a very limited capability when it comes to running standard encryption, authentication and access control algorithms, and they are far more vulnerable when it comes to DDOS attacks. Similarly, they are at a greater risk of physical tampering, and are vulnerable to a range of attacks that could compromise data integrity."

Montshioa adds the plethora of IOT devices that are connected to the Internet will also generate massive amounts of data, and will do this at a very rapid pace. Since it is unfeasible to store all this data in a centralised location for processing, it will need to be stored at the edge computing notes, or in edge clouds, which will mean the way its privacy is protected will need to change too, because decentralised edge clouds are far more vulnerable to, and not as well defended from, a variety of attacks and breach attempts.

Businesses will need to find a way to provide appropriate data privacy and security from the multiple layers that go hand in hand with the intelligent edge, including the perception layer, the transport layer and the application layer. Improving data privacy and security better protected in such a decentralised edge computing environment has been a major challenge.

Supermicro’s network security edge solutions are ideal for use in unified threat management (UTM), next-generation firewall (NGFW), deep packet inspection (DPI) and other network security applications.

Share