- Community Home
- >
- Servers and Operating Systems
- >
- Servers & Systems: The Right Compute
- >
- Zero trust and edge computing: protect your decent...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Receive email notifications
- Printer Friendly Page
- Report Inappropriate Content
Zero trust and edge computing: protect your decentralized enterprise
As organizations strive to bolster their defenses against cybersecurity threats, Zero Trust emerges as a critical strategy. Conversations around Zero Trust now represent about 20% of security discussions, with key insights highlighting that traditional perimeter-based security is no longer enough.
It will probably come as no surprise to you that the zero trust approach to security continues to dominate our conversations as many organizations look to harden their defenses against possible threats. To understand this better, I asked a colleague, Aravind Krish, Networking and Edge Expert from the HPE C2MI team, to analyze the top discussions found on the web.
This tool, which is represented by the graphic to the right, maps all the new stories on data security and analyzes data patterns through neural mapping to identify top insights.
So, what was the top takeaway? Zero trust represents approximately 20% of security discussions with these top trending subtopics:
- Traditional perimeter-based security is no longer effective
- AI for rapid detection and incident response
- Zero trust is essential for edge computing security
Edge computing and low-latency applications
Edge computing is the practice of processing data closer to the data sources, such as IoT devices and edge servers, rather than relying on centralized cloud services. This decentralized approach reduces latency, which is critical for applications requiring real-time processing. For example, autonomous vehicles using V2X technology require latency below 5 milliseconds to communicate effectively with nearby cars and infrastructure, while factory automation processes may need latency as low as 0.25 to 1 millisecond.
Embracing zero trust for edge security
Traditional centralized security measures often fall short in decentralized architectures with extensive estates. The projected explosion of connected IoT devices to 40 billion by 2030, expands the attack surface exponentially with each edge device. This poses potential multiple entry points for cyberattacks, making securing edge computing environments and adopting advanced security frameworks a survive-to-succeed imperative.
A key component of this survival tactic is the zero trust security model, which is based on the principle of least privilege, where users and devices are only granted the permissions necessary to perform their tasks. This model assumes that no user or device can be inherently trusted, even if they are within the corporate network. Over 60% of enterprises are currently planning or have already implemented zero trust network access (ZTNA) solutions as part of their cybersecurity strategy.
Key benefits of zero trust security at the edge
- Enhanced Security. Zero trust eliminates implicit trust and enforces strict access controls, significantly reducing the attack surface. This is crucial in environments with outdated Operational Technology (OT) devices that are vulnerable to cyberattacks. By continually verifying user identities and device security postures, organizations can prevent unauthorized access and lateral movement within networks, safeguarding critical systems and data.
- Improved visibility and control. Zero trust frameworks offer comprehensive visibility into user activities and device interactions. This oversight allows security teams to detect anomalies and respond swiftly to potential threats. In environments where multiple teams and external contractors may access systems, granular control over access is vital for maintaining operational integrity.
Getting started with zero trust security
- Assess critical assets and data. Begin by identifying the most critical assets and data within your environment. This includes OT systems, industrial control systems (ICS), and sensitive information requiring protection. Understanding these elements will guide the design of a tailored ZTNA architecture that provides appropriate security measures.
- Select a compatible ZTNA solution. Choose a ZTNA solution that integrates seamlessly with your existing infrastructure and workflows. Look for features such as Identity and Access Management (IAM), device posture assessment, to provide the ability to enforce granular access controls. This ensures the solution can adapt to the unique requirements of your processes without significant disruptions.
- Implement in phases. Adopt a phased implementation approach to ZTNA. Start with a pilot program focusing on a limited subset of users and services to test the system's effectiveness, and address any onboarding challenges. Gradually expand the deployment based on insights gained during the pilot, ensuring that security measures evolve alongside operational needs.
As edge computing continues to expand, securing these environments becomes increasingly complex yet essential. By adopting a zero trust approach, you can enhance security, improve visibility, and maintain control over your decentralized networks. The journey towards zero trust begins with understanding your critical assets and selecting compatible solutions that can be implemented in phases, ensuring minimal disruption and maximum protection.
To learn more about how HPE is engineering compute with a fundamental security approach to defend against increasingly complex threats, please check out HPE Compute Security, and for latest in edge server innovation be sure to check out the new HPE ProLiant DL145 Gen11 Server
Meet HPE Blogger Aaron Lamond, Worldwide Product Marketing, AI Solutions, HPE Compute Aaron is an experienced marketing manager with a demonstrated history of working in the information technology and services industries. He has deep expertise in enterprise software and infrastructure, and extensive experience in engineering and sales. Aaron is based in New Zealand.
Compute Experts
Hewlett Packard Enterprise
twitter.com/hpe_compute
linkedin.com/showcase/hpe-servers-and-systems/
hpe.com/servers
- Back to Blog
- Newer Article
- Older Article
- PerryS on: Explore key updates and enhancements for HPE OneVi...
- Dale Brown on: Going beyond large language models with smart appl...
- alimohammadi on: How to choose the right HPE ProLiant Gen11 AMD ser...
- ComputeExperts on: Did you know that liquid cooling is currently avai...
- Jams_C_Servers on: If you’re not using Compute Ops Management yet, yo...
- AmitSharmaAPJ on: HPE servers and AMD EPYC™ 9004X CPUs accelerate te...
- AmandaC1 on: HPE Superdome Flex family earns highest availabili...
- ComputeExperts on: New release: What you need to know about HPE OneVi...
- JimLoi on: 5 things to consider before moving mission-critica...
- Jim Loiacono on: Confused with RISE with SAP S/4HANA options? Let m...
-
COMPOSABLE
77 -
CORE AND EDGE COMPUTE
146 -
CORE COMPUTE
171 -
HPC & SUPERCOMPUTING
140 -
Mission Critical
88 -
SMB
169