This IDC PlanScape provides guidance on best practices for enabling security at the edge. It explains why edge security has become a critical component of enterprise security writ large, as well as the unique challenges that edge security presents. It also offers strategies and best practices for helping businesses manage edge security risks."It can be all too easy to overlook the edge when formulating enterprise security strategy — or to assume that the security controls in place for traditional resources will naturally suffice to protect edge resources too," says Chris Tozzi, adjunct research advisor for IDC's IT Executive Programs (IEP). "The reality is that securing the edge is a specialized domain, which requires specialized defenses."
IDC PlanScape Figure
Executive Summary
Why Is Security at the Edge Important?
What Is Security at the Edge?
Identify Edge Assets
Monitor Edge Assets
Secure Edge Applications
Monitor Edge Networks
Protect Edge Data
Enable Physical Security at the Edge
Who Are the Key Stakeholders?
How Can My Organization Take Advantage of Security at the Edge?
Define Edge Security Policies and Procedures
Centralize Security Across Traditional and Edge Infrastructure
Segment Edge Networks
Balance Cost and Performance with Security
Consider Moving Monitoring and Analytics to Datacenters