Subscribe to our blog

The Red Hat Shares newsletter helps IT leaders navigate the complicated world of IT―the open source way.


FROM THE EDITOR

Securing your edge infrastructure

Edge security is becoming increasingly important as more organizations turn to edge computing to benefit from the flexibility of hybrid cloud computing and deliver faster, more reliable services at a lower cost.

When we surveyed IT decision makers in 2021 for our 2022 Global Tech Outlook report about what emerging technologies they were most likely to consider using in the next year, or are currently using, 28% said edge computing (up from 25% in 2020). Furthermore, a July 2022 report from 451 Research reveals that “large organizations will significantly expand edge computing infrastructure in two years.”1

In edge computing, an increase in data and processing outside the traditional datacenter creates potential risk to organizations. Reduced physical security, a limited compute footprint, lower cost expectations and remote management are often compounded by a lack of IT personnel. These issues combine to create relaxed standards for security and policy and expand the attack surface.

However, there are ways edge resources can improve security. For example, IDC says “63% of organizations report using edge resources to enhance cybersecurity through monitoring networks.” IDC also says “replicating data [using edge resources] across multiple locations” can “reduce [the] impact of ransomware attacks.”2

Red Hat provides trusted open source software that helps organizations implement a layered security approach across infrastructure, the application stack and the life cycle for better security on site, in cloud environments or at edge sites.

In this issue of Red Hat Shares, learn about security considerations for edge implementations, key edge security issues for CIOs, how Red Hat helped a customer reduce its edge deployment time while enhancing its infrastructure security and more. Plus, just for fun, we threw in a video from our “In the Clouds” series about how edge computing is being used to solve problems on the International Space Station.


5 security considerations for edge implementations

Learn about some of the primary security threats edge deployments face and how Red Hat technologies can help mitigate them.


Edge computing: 4 key security issues for CIOs to prioritize

The Enterprisers Project suggests considering the expert advice in this article to address security concerns before implementing an edge computing strategy.

 

You may also be interested in “Beat these common edge computing challenges.”


A deep dive on edge and security

Global analyst firm Futurum Research addresses common edge computing security challenges, Red Hat’s approach to security at the edge and more.


Boost security, flexibility, and scale at the edge with Red Hat Enterprise Linux

Find out how Red Hat Enterprise Linux can help you extend your datacenter capabilities to the edge with confidence.

 

You may also be interested in “What’s new in Red Hat Enterprise Linux 9 for edge computing.”


CUSTOMER SPOTLIGHT

Edge computing flexibility enables critical defense and security advantages

See how Red Hat helped Mamram―the Israel Defense Forces’ central computing system unit―reduce its edge deployment time from weeks to hours while enhancing its infrastructure security and compliance.


In the Clouds: Edge Computing in Space

In this episode of our video series, IBM Distinguished Engineer and CTO Space Tech Naeem Altaf explains how, together with NASA, cloud and edge computing services and technologies are being used to solve problems on the International Space Station.

 

You may also be interested in “Edge computing in action: Space.”


AnsibleFest: Shape the present and future of automation

Oct. 18-19, 2022

Chicago, Illinois

Get discounted pricing through Oct. 17.


Did you miss our special July edition recapping Red Hat Summit 2022? Check it out. Or browse all past issues of Red Hat Shares.

 

저자 소개

The Red Hat Shares team comprises content strategists who work with lots of smart subject matter experts. Together, we curate content on emerging tech topics your enterprise needs to learn about to stay competitive.

Read full bio

채널별 검색

automation icon

오토메이션

기술, 팀, 환경을 포괄하는 자동화 플랫폼에 대한 최신 정보

AI icon

인공지능

고객이 어디서나 AI 워크로드를 실행할 수 있도록 지원하는 플랫폼 업데이트

cloud services icon

클라우드 서비스

관리형 클라우드 서비스 포트폴리오에 대해 더 보기

security icon

보안

환경과 기술 전반에 걸쳐 리스크를 감소하는 방법에 대한 최신 정보

edge icon

엣지 컴퓨팅

엣지에서의 운영을 단순화하는 플랫폼 업데이트

Infrastructure icon

인프라

세계적으로 인정받은 기업용 Linux 플랫폼에 대한 최신 정보

application development icon

애플리케이션

복잡한 애플리케이션에 대한 솔루션 더 보기

Original series icon

오리지널 쇼

엔터프라이즈 기술 분야의 제작자와 리더가 전하는 흥미로운 스토리