Security is central to Edge Computing

Aug 08, 201911

Enter social networks and talk to friends, access that online store, browse the categories and choose the ideal product. Sign in to YouTube or Netflix to watch your favorite channels and series. Interact with the virtual assistant to know the agenda of the day and the weather forecast for the weekend. In the connected car, turn on the GPS for the best route to work by voice command, and give the play in the playlist of the day. These are some of the activities that many do every day and that leave our fingerprints, generating data about everything and everyone, every day.

 

To get an idea, Intel estimates that, as of next year, each connected person will generate 1.5GB of information per day. Small number if we compare to what the computerization of many segments promises to produce. According to the company, the connected planes will produce 5 TB of data in a single day. The connected hospitals, 3 TB. And each connected car should produce 4 TB per day. And this production of scale information, aligned also with the arrival of 5G, tends to generate an uninterrupted flow of data between the cloud and devices.

 

But the big issue is the fluidity and speed of information. In a smart hospital, for example, there are no loopholes to delays in robotic surgery. In a standalone car this communication also needs to flow without interruptions, because seconds can mean the difference between a successful braking or a traffic accident. These are examples of when and where Edge Computing should be increasingly present.

 

In a nutshell, Edge Computing means treating the data in an environment as close as possible (physically even) from where the data was generated. For example, a smart camera can be the Edge Computing device, by handling the data before sending it to a central server, saving bandwidth on the local network and reducing the amount of data that needs to be sent to the cloud. This is extremely relevant when we start scaling applications. After all, imagine handling information from 100,000 cameras ... every mb saved makes a difference!

 

Another application of Edge Computing would be in industry 4.0. Imagine the data generated in an automobile factory, for example, first pass through this local server, which will use Artificial Intelligence and Machine Learning techniques to handle the data, and all information is filtered in a more agile way, rising to the cloud. , at the end of the day, is really relevant to the operation.

 

However, little is said about the security of these devices - which can be a Windows or Linux server, as in the case of a factory / industry, or IoT devices like the cameras mentioned above - that do require protection. When talking about security for these systems / devices, there is still a very big challenge, as it is not yet a mature market and we do not yet have highly established companies (so some manufacturers may discontinue the technology in the near future and no longer offer support, leaving devices vulnerable). And while they are connected to the network, they can create a cybersecurity breach that is a red carpet for attackers to access the cloud and sensitive information across the company.

 

However, despite the obstacles, the role of the cybersecurity market is to be alert to new threats and always hamper the attackers' actions. And there are already companies looking at Edge Computing, with particular attention to security products aimed at the market of IoT and industry, and also to analyze network traffic in search of malicious traffic without the need to install a security program directly on the device. In addition, layered protection - NGIPS, virtual patch, anti-malware and more - is another option to detect threats before they reach Edge Computing devices.

 

Working with agile information traffic will be critical with 5G and the increased data volume that will come through that technology - and Edge Computing brings just that fluidity to business. A fluid path for the operation of companies from different sectors, but also a path that must be followed without the hindrance of virtual threats.


Related Articles