Securing the edge: 5 best practices

Securing the edge: 5 best practices

For a growing number of companies, the “edge” of the enterprise network is an increasing focal point of IT investments. This is where they are aiming to bolster data storage, processing, and analytics capabilities to generate business insights from data gathered from connected devices and systems.

Optical and photonic products manufacturer Lumentum has employed an edge strategy with local compute and storage arrays to deal with the large volume of data generated during the manufacturing and testing process.

[ Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan. | Sign up for CSO newsletters. ]

Tech Spotlight: Edge Computing


4 essential edge computing use cases (Network World)
Edge computing's epic turf war (CIO)
Securing the edge: 5 best practices (CSO)
Edge computing and 5G give business apps a boost (Computerworld)
Amazon, Google, and Microsoft take their clouds to the edge (InfoWorld)

“Edge computing allows us to process and store data coming off the line in real time,” says Ralph Loura, senior vice president and CTO. “We also employ an aggregation strategy to stream that data into public cloud plat ..

Support the originator by clicking the read the rest link below.