To ensure edge device security, software updates, asset management and technology deployment, IT and end users need to collaborate to align policies and procedures, writes Mary Shacklett, president of consulting firm Transworld Data , on InformationWeek .
Networking, integration, failover, asset management, and security—IT has a lot of work to do to support Edge Computing. Here are 10 key areas:
Zero Trust Networking and Security: Password sharing has long been a common practice on manufacturing floors, leaving containers designed to protect equipment open, and this is inevitable when most business users (and their managers) are not IT savvy. IT professionals are another matter: they are responsible for managing security across the enterprise, including at the network edge. As one approach, enterprises should consider implementing zero trust networks, which automatically verify IP addresses and authenticate users both inside and outside the corporate perimeter. They are well suited as an everyday security management tool because they are independent of end users. For physical security, video cameras placed around equipment containers and technology deployment points can be useful;
Collaboration with business specialists. The germany whatsapp data of production, engineering and operations managers is directly related to the quality of the services they provide, and not how well they understand IT. But this does not change the fact that the periphery needs appropriate security, management, integration, data processing and communications systems. IT specialists need to do this work, and they also need to provide technology support for the systems. This should be done in a spirit of cooperation and mutual support, and not in a forced manner. The more harmoniously IT and end users work, the better the situation will be on the technology front;
How to Properly Deploy Edge Computing
-
- Posts: 542
- Joined: Mon Dec 23, 2024 3:13 am