Skip to contentRed Hat AI
  • Our approach

    • News and insights
    • Technical blog
    • Research
    • Live AI events
    • Explore AI at Red Hat
  • Our portfolio

    • Red Hat AI
    • Red Hat Enterprise Linux AI
    • Red Hat OpenShift AI
    • Red Hat AI Inference Server
  • Engage & learn

    • AI learning hub
    • AI partners
    • Services for AI
Hybrid cloud
  • Platform solutions

    • Artificial intelligence

      Build, deploy, and monitor AI models and apps.

    • Linux standardization

      Get consistency across operating environments.

    • Application development

      Simplify the way you build, deploy, and manage apps.

    • Automation

      Scale automation and unite tech, teams, and environments.

  • Use cases

    • Virtualization

      Modernize operations for virtualized and containerized workloads.

    • Digital sovereignty

      Control and protect critical infrastructure.

    • Security

      Code, build, deploy, and monitor security-focused software.

    • Edge computing

      Deploy workloads closer to the source with edge technology.

  • Explore solutions
  • Solutions by industry

    • Automotive
    • Financial services
    • Healthcare
    • Industrial sector
    • Media and entertainment
    • Public sector (Global)
    • Public sector (U.S.)
    • Telecommunications

Discover cloud technologies

Learn how to use our cloud products and solutions at your own pace in the Red Hat® Hybrid Cloud Console.

Products
  • Platforms

    • Red Hat AI

      Develop and deploy AI solutions across the hybrid cloud.

      New version
    • Red Hat Enterprise Linux

      Support hybrid cloud innovation on a flexible operating system.

    • Red Hat OpenShift

      Build, modernize, and deploy apps at scale.

    • Red Hat Ansible Automation Platform

      Implement enterprise-wide automation.

  • Featured

    • Red Hat OpenShift Virtualization Engine
    • Red Hat OpenShift Service on AWS
    • Microsoft Azure Red Hat OpenShift
    • See all products
  • Try & buy

    • Start a trial
    • Buy online
    • Integrate with major cloud providers
  • Services & support

    • Consulting
    • Product support
    • Services for AI
    • Technical Account Management
    • Explore services
Training
  • Training & certification

    • Courses and exams
    • Certifications
    • Red Hat Academy
    • Learning community
    • Learning subscription
    • Explore training
  • Featured

    • Red Hat Certified System Administrator exam
    • Red Hat System Administration I
    • Red Hat Learning Subscription trial (No cost)
    • Red Hat Certified Engineer exam
    • Red Hat Certified OpenShift Administrator exam
  • Services

    • Consulting
    • Partner training
    • Product support
    • Services for AI
    • Technical Account Management
Learn
  • Build your skills

    • Documentation
    • Hands-on labs
    • Hybrid cloud learning hub
    • Interactive learning experiences
    • Training and certification
  • More ways to learn

    • Blog
    • Events and webinars
    • Podcasts and video series
    • Red Hat TV
    • Resource library

For developers

Discover resources and tools to help you build, deliver, and manage cloud-native applications and services.

Partners
  • For customers

    • Our partners
    • Red Hat Ecosystem Catalog
    • Find a partner
  • For partners

    • Partner Connect
    • Become a partner
    • Training
    • Support
    • Access the partner portal

Build solutions powered by trusted partners

Find solutions from our collaborative community of experts and technologies in the Red Hat® Ecosystem Catalog.

Search

I'd like to:

  • Start a trial
  • Manage subscriptions
  • See Red Hat jobs
  • Explore tech topics
  • Contact sales
  • Contact customer service

Help me find:

  • Documentation
  • Developer resources
  • Skills assessments
  • Architecture center
  • Security updates
  • Support cases

I want to learn more about:

  • AI
  • Application modernization
  • Automation
  • Cloud-native applications
  • Linux
  • Virtualization
ConsoleDocsSupportNew For you

Recommended

We'll recommend resources you may like as you browse. Try these suggestions for now.

  • Product trial center
  • Courses and exams
  • All products
  • Tech topics
  • Resource library
Log in

Get more with a Red Hat account

  • Console access
  • Event registration
  • Training & trials
  • World-class support

A subscription may be required for some services.

Log in or register
Contact us
  • Home
  • Resources
  • The state of edge security report: An overview

The state of edge security report: An overview

August 3, 2023•
Resource type: Overview
Download PDF

Edge computing is evolving from limited use in a few industries to the next generation of decentralized infrastructure supporting digital transformation and latency-sensitive workloads that require powerful and localized computation. Despite its critical nature, maintaining a cohesive strategy and resilient security posture can be a challenge for large enterprises expanding their infrastructure footprint beyond the security of the datacenter environment. The State of Edge Security Report provides a benchmark for current edge deployments in terms of the scale of projects, investments, use cases and endpoints, as well as possible efficiencies from scaling edge initiatives effectively and security challenges from this immense and expanding attack surface area. The report addresses the top security threats facing the edge with comprehensive insights into the edge security stack required to support edge projects and the need to develop an edge ecosystem. 

    3 key findings 

    1. Edge deployments are increasing in scale across investments, projects, use cases, endpoints and types of endpoints. 
    2. Security is the top challenge cited by enterprises with edge deployments. 
    3. Risks to edge systems such as cyberattacks and from edge systems due to vulnerabilities and misconfigurations are on the rise. 

    Edge deployments are expanding and maturing quickly

    The edge is a strategic growth pillar for enterprises to generate new revenue and reduce costs. More than two-thirds (68%) of companies surveyed plan to increase their edge investments by “some” or “significant” amounts in the next 2 years. These investment dollars are funding growth for existing and new edge projects, use cases and endpoints. 

    Figure 1: Stead growth across the edge

    Figure 1: Stead growth across the edge

    Security is the top edge deployment challenge

    Our research further supports the notion that there is a paradox in edge security; it is deemed a massive technical challenge and threat for enterprises but also an opportunity. Maintaining a resilient cybersecurity posture with this edge infrastructure buildout creates challenges in both physical and digital systems. 

    Nearly half of decision-makers (47%) say that data, network and device physical and digital security are among their biggest challenges in edge deployments. As with broader IT, cybersecurity has become the top enterprise challenge in edge deployments as digitalization continues to open the attack surface. Enterprises are wrestling with a need to expand their infrastructure footprint and effectively focus on securing not only the infrastructure itself, but also the larger number of IoT endpoints that are connected to it. This is an area where many believe the adoption of new operational patterns, such as cloud-native and DevOps, can improve their security posture alongside their operational efficiency.

    Risks both to and from edge systems are on the rise

    Criminal organizations and attackers funded by nation-states see the industrial base, critical infrastructure and companies of all forms as highly valuable targets. Being composed of hundreds of remote servers and thousands of IoT devices, the edge presents an attractive target for cybercriminals to expand their armies of bots for activities such as denial-of-service attacks and crypto mining. The data itself is a valuable target, as is the ability to hold an operational control environment for ransom, potentially costing millions for recovery and impact on operational downtime.

    Figure 2. Edge system security incident risks

    Figure 2. Edge system security incident risks

    Many conventional edge systems are approaching the end of their life cycle or may not have the compute resources or cost efficiencies to support frequent software updates and patches. These older edge systems with outdated operating systems or vulnerable applications are a possible attack path for cybercriminals. Even short gaps in updates can expose vulnerabilities and misconfigurations because edge systems often have minimal access to central IT governance and policies. 

    Incorporating security earlier into the application development pipeline, or “shifting security left,” is a possible solution but also brings challenges. These include a lack of security gates at the development stage, meaning that security issues aren’t caught until an application is close to deployment, when it’s too late or too costly to fix (cited by 63% of respondents as a top-three challenge). Respondents are also concerned that developers are not equipped with security tools, and traditional tooling fails to protect cloud-native apps at the edge (61%). 

    Enterprises value a comprehensive set of edge security capabilities

    The emerging edge security stack boasts both new and existing security technologies purpose-built for this decentralized infrastructure. Six pivotal edge security areas for IT teams to consider are supply chain, data, network, threat detection, endpoint and device. When our survey asked for respondents’ priorities, there was minimal statistical significance across these six categories. This supports the notion that decision makers believe they all play a critical role and are required to safeguard a complex and growing edge infrastructure.

    To reiterate, the ever-growing and increasingly connected digital and physical supply chain presents a sizable risk to edge sites, such as those in close proximity to suppliers upstream or to customers downstream. Systems that maintain governance and access control are key to ensuring the integrity of digital and physical touchpoints across edge systems. The ability to provide device and data attestation across the supply chain can reduce the risk of tampering and mitigate configuration errors. Tools are emerging that better identify and manage vulnerabilities across networks and assets, which increasingly include parts from external software suppliers and open-source projects. The software bill of materials (SBOM) is an emerging concept being driven by federal mandates for companies to start understanding the linkage of vendor components that make up software they use and the associated risks from using it. Software build of materials (SBOMs) can help enterprises comprehend the full set of software components that are used in their environments and prioritize remediation when new vulnerabilities are identified.

    Figure 3. The edge of security stack

    Figure 3. The edge of security stack

    Conclusion

    Simply put, it takes an edge ecosystem to scale edge deployments and ensure a resilient security posture that can support it. As with an iceberg, enterprises can see what’s “above the water line” in terms of orchestrating internal stakeholders and necessary investments in their edge strategies. However, many overlook what’s “below the water line”: initial and ongoing investments in external partners and technologies that support scaling. Aligning with sound edge security principles, embedding repeatable processes and investing in best-in-class security capabilities from modern and trusted providers are necessary initial investments that will advance an even greater long-term effect when at scale.

    Discover more 

    Read the full report for more ideas to achieve better edge security

    Edge capabilities are being put into real-world use by organizations on a massive scale, presenting an opportunity that they can’t ignore. But this impetus comes with challenges, particularly in security, and that’s an area where organizations see the ability to use new, more efficient technologies, such as cloud-native, to gain a competitive advantage. Partnering with leading providers to help manage this rapidly expanding and critical edge environment is paramount to maintaining security across it. 

    Download the full survey results and key takeaways.

    Tags:Hybrid cloud, Containers, Edge computing, Security

    Red Hat logoLinkedInYouTubeFacebookX

    Platforms

    • Red Hat AI
    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    • See all products

    Tools

    • Training and certification
    • My account
    • Customer support
    • Developer resources
    • Find a partner
    • Red Hat Ecosystem Catalog
    • Documentation

    Try, buy, & sell

    • Product trial center
    • Red Hat Store
    • Buy online (Japan)
    • Console

    Communicate

    • Contact sales
    • Contact customer service
    • Contact training
    • Social

    About Red Hat

    Red Hat is an open hybrid cloud technology leader, delivering a consistent, comprehensive foundation for transformative IT and artificial intelligence (AI) applications in the enterprise. As a trusted adviser to the Fortune 500, Red Hat offers cloud, developer, Linux, automation, and application platform technologies, as well as award-winning services.

    • Our company
    • How we work
    • Customer success stories
    • Analyst relations
    • Newsroom
    • Open source commitments
    • Our social impact
    • Jobs

    Change page language

    Red Hat legal and privacy links

    • About Red Hat
    • Jobs
    • Events
    • Locations
    • Contact Red Hat
    • Red Hat Blog
    • Inclusion at Red Hat
    • Cool Stuff Store
    • Red Hat Summit
    © 2025 Red Hat

    Red Hat legal and privacy links

    • Privacy statement
    • Terms of use
    • All policies and guidelines
    • Digital accessibility