Article Details

Scrape Timestamp (UTC): 2024-01-16 20:17:35.668

Source: https://www.theregister.com/2024/01/16/locking_down_the_edge/

Original Article Text

Click to Toggle View

Locking down the edge. Watch this webinar to find out how Zero Trust fits into the edge security ecosystem. Commissioned Edge security is a growing headache. The attack surface is expanding as more operational functions migrate out of centralized locations and into distributed sites and devices. Youtube Video And with increasing numbers of organizations choosing to host data at their fringes, the network edge is more vulnerable than ever without the right protection. Just think how many more risks data faces in, say, an airport, a factory, a power plant or a hospital compared with a heavily defended datacenter backed by robust access controls. Long supply chains which also span edge locations, perhaps involving multiple partners and contractors, can create added risk. And while many vertical sectors such as healthcare, energy and manufacturing present edge-related security vulnerabilities, they can simultaneously lack the expert and dedicated IT security professionals usually resident in head offices and centralized hosting facilities. Any serious data breach at the edge has the potential to result in a heavy price for the organization affected. Edge breaches can also have an immediate negative impact on ordinary people's lives, perhaps more so than with other types of security incident, due to the instant disruption to their data flow. With additional regulatory and data protection implications to consider, it's clear that edge locations need a high level of cyber security protection. If you want to learn about these challenges and possible solutions in more detail, Dell Technologies has developed a webinar presented by Jeroen Mackenbach, Technical Staff with the company's Infrastructure Solutions Group Edge Portfolio. Mackenbach describes a need to reimagine edge protection, outlining a Zero Trust approach where nothing and nobody is automatically trusted, and all devices must be constantly verified. He believes that edge security must operate at massive scale, while a successful Zero Trust strategy needs complete visibility of all data and devices at all times. Automation is equally key to maintaining adequate protection and keeping the security management overhead to a minimum. The webinar maps out the role of Dell's NativeEdge platform in restoring trust at the edge, reducing attack surfaces and bringing that visibility and automation to the party. You can watch it by clicking here. Commissioned by Dell.

Daily Brief Summary

CYBERCRIME // Enhancing Edge Security with Zero Trust Solutions Webinar

The expanding attack surface presents new challenges in protecting the network edge as more processes migrate to distributed sites.

Traditional, centralized data centers with robust controls are more secure than distributed edge locations.

Long supply chains and the lack of dedicated IT security professionals at the edge increase risks, especially in sectors like healthcare, energy, and manufacturing.

Data breaches at the edge can have immediate and significant impacts on daily operations and regulatory compliance.

Dell Technologies' webinar, featuring Jeroen Mackenbach, highlights the need for a Zero Trust security approach at the edge, with continuous verification of devices.

The webinar explains that visibility and automation are critical components of a successful Zero Trust strategy to manage and mitigate cybersecurity threats.

Dell's NativeEdge platform offers a solution to address edge security challenges by reducing attack surfaces and enhancing visibility and control.