How Edge Computing Aligns Connectedness and Trust

How Edge Computing Aligns Connectedness and Trust

This IDC Perspective discusses how secure, scalable access anywhere and anytime is one of the goals and outcomes of the connected enterprise. As enterprises adopt the edge to enhance application performance and improve business agility, trusted connectivity requires that organizations take a multifaceted and expanded approach to security that extends across the cloud, network, and application levels. "The edge brings new capabilities and performance benefits to the enterprise when secure connectivity is established," commented Paul Hughes, research director, Future of Connectedness at IDC." As organizations adopt and leverage more applications and compute benefits at the edge, building a secure and trusted edge strategy will require a singularly managed but multipronged strategy that maps locations, connectivity, suppliers, and architectures together."

Please Note: Extended description available upon request.


Executive Snapshot
Situation Overview
Trusted Pervasive Edge Computing: The Next Step for Connectedness
The Democratization of Edge Compute
The Creation of the Edge Cloud
Risks and Benefits
Edge-to-Cloud Security Considerations for the Connected Enterprise
Addressing Edge Device Security
Addressing Cloud Security
Addressing Network Edge Security
Addressing Application Security
Building a Secure Trusted Edge
Advice for the Technology Buyer
Learn More
Related Research
Synopsis

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook

Other tasks

Cookie Settings