IDC PlanScape: Security at the Edge

IDC PlanScape: Security at the Edge


This IDC PlanScape provides guidance on best practices for enabling security at the edge. It explains why edge security has become a critical component of enterprise security writ large, as well as the unique challenges that edge security presents. It also offers strategies and best practices for helping businesses manage edge security risks."It can be all too easy to overlook the edge when formulating enterprise security strategy — or to assume that the security controls in place for traditional resources will naturally suffice to protect edge resources too," says Chris Tozzi, adjunct research advisor for IDC's IT Executive Programs (IEP). "The reality is that securing the edge is a specialized domain, which requires specialized defenses."


IDC PlanScape Figure

Executive Summary

Why Is Security at the Edge Important?

What Is Security at the Edge?

Identify Edge Assets

Monitor Edge Assets

Secure Edge Applications

Monitor Edge Networks

Protect Edge Data

Enable Physical Security at the Edge

Who Are the Key Stakeholders?

How Can My Organization Take Advantage of Security at the Edge?

Define Edge Security Policies and Procedures

Centralize Security Across Traditional and Edge Infrastructure

Segment Edge Networks

Balance Cost and Performance with Security

Consider Moving Monitoring and Analytics to Datacenters

Expect, and Plan for, Network Outages

Advice for Technology Buyers

Related Research

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook

Other tasks

Cookie Settings