genderequalitygoals

genderequalitygoals

Tuesday, 1 August 2023

[New post] Protecting edge data in the era of decentralization

Site logo image India CSR posted: " Cyberattacks can exacerbate existing security issues and expose new gaps at the edge, presenting a series of challenges for IT and security staff. Infrastructure must withstand the vulnerabilities that come with the massive proliferation of devic" India CSR

Protecting edge data in the era of decentralization

India CSR

Aug 1

Ripu Bajwa, Director and General Manager, Data Protection Solutions, Dell Technologies India.

Cyberattacks can exacerbate existing security issues and expose new gaps at the edge, presenting a series of challenges for IT and security staff. Infrastructure must withstand the vulnerabilities that come with the massive proliferation of devices generating, capturing and consuming data outside the traditional data center. The need for a holistic cyber resiliency strategy has never been greater — not only for protecting data at the edge, but for consolidating protection from all endpoints of a business to centralized datacenters and public clouds. 

But before we get into the benefits of a holistic framework for cyber resiliency, it may help to get a better understanding of why the edge is often susceptible to cyberattacks, and how adhering to some tried-and-true security best practices can help tighten up edge defenses.

The impact of human error

Human error can be the difference between an unsuccessful attack and one that causes application downtime, data loss or financial loss. More than half of new enterprise IT infrastructure will be at the edge by 2023, according to IDC. 

With so much data coming and going from the endpoints of an organization, the role humans play in ensuring its safety is magnified. 

Perhaps the biggest challenge is that edge environments are typically not staffed with IT administrators, so there is lack of oversight to both the systems deployed at the edge as well as the people who use them.

While capitalizing on data created at the edge is critical for growth in today's digital economy, how can we overcome the challenge of securing an expanding attack surface with cyber threats becoming more sophisticated and invasive than ever?

A multi-layered approach

It may feel like there are no simple answers, but organizations may start by addressing three fundamental key elements for security and data protection: Confidentiality, Integrity and Availability (CIA).

In addition to adopting CIA principles, organizations should consider applying a multi-layered approach for protecting and securing infrastructure and data at the edge. This typically falls into three categories: the physical layer, the operational layer and the application layer.

Physical layer

At the edge, servers and other IT infrastructure are likely to be housed beside an assembly line, in the stockroom of a retail store, or even in the base of a streetlight. This makes data on the edge much more vulnerable, calling for hardened solutions to help ensure the physical security of edge application infrastructure.

Best practices to consider for physical security at the edge include:

  • Controlling infrastructure and devices throughout their end-to-end lifecycle, from the supply chain and factory to operation to disposition.
  • Preventing systems from being altered or accessed without permission.
  • Protecting vulnerable access points, such as open ports, from bad actors.
  • Preventing data loss if a device or system is stolen or tampered with.

Operational layer

Edge environments tend to lag in specific security software and necessary updates, including data protection. The vast number of devices being deployed and lack of visibility into the devices makes it difficult to secure endpoints vs. a centralized data center.

Best practices to consider for securing IT infrastructure at the edge include:

  • Ensuring a secure boot spin up for infrastructure with an uncompromised image.
  • Controlling access to the system, such as locking down ports to avoid physical access.
  • Installing applications into a known secure environment.

Application layer

Once you get to the application layer, data protection looks a lot like traditional data center security. However, the high amount of data transfer combined with the large number of endpoints inherent in edge computing opens points of attack as data travels between the edge, the core data center and to the cloud and back.

Best practices to consider for application security at the edge include:

  • Securing external connection points.
  • Identifying and locking down exposures related to backup and replication.
  • Assuring that application traffic is coming from known resources.

Recovering from the inevitable

While CIA and taking a layered approach to edge protection can greatly mitigate risk, successful cyberattacks are inevitable. Organizations need assurance that they can quickly recover data and systems after a cyberattack. Recovery is a critical step in resuming normal business operations. 

By vaulting data on the edge to a regional data center or to the cloud through an automated, air-gapped solution, organizations can ensure its immutability for data trust. Once in the vault, it can be analyzed for proactive detection of any cyber risk for protected data. Avoiding data loss and minimizing costly downtime with analytics and remediation tools in the vault can help ensure data integrity and accelerate recovery.

Backup-as-a-service

Organizations can address edge data protection and cybersecurity challenges head-on by deploying and managing holistic modern data protection solutions on-premises, at the edge and in the cloud or by leveraging Backup as-a-Service (BaaS) solutions. Through BaaS, businesses large and small can leverage the flexibility and economies of scale of cloud-based backup and long-term retention to protect critical data at the edge — which can be especially important in remote work scenarios.

As part of a larger zero trust or other security strategy, organizations should consider a holistic approach that includes cyber security standards, guidelines, people, business processes and technology solutions and services to achieve cyber resilience.

The threat of cyberattacks and the importance of maintaining the confidentiality, integrity and availability of data require an innovative resiliency strategy to protect vital data and systems — whether at the edge, core or across multi-cloud.

About the Author

(Ripu Bajwa, Director and General Manager, Data Protection Solutions, Dell Technologies India)


Unsubscribe to no longer receive posts from India CSR.
Change your email settings at manage subscriptions.

Trouble clicking? Copy and paste this URL into your browser:
https://indiacsr.in/protecting-edge-data-era-decentralization/

WordPress.com and Jetpack Logos

Get the Jetpack app to use Reader anywhere, anytime

Follow your favorite sites, save posts to read later, and get real-time notifications for likes and comments.

Download Jetpack on Google Play Download Jetpack from the App Store
WordPress.com on Twitter WordPress.com on Facebook WordPress.com on Instagram WordPress.com on YouTube
WordPress.com Logo and Wordmark title=

Automattic, Inc. - 60 29th St. #343, San Francisco, CA 94110  

at August 01, 2023
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

A Quick Update From ASUN

Autistic Substance Use Network ͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏   ...

  • [New post] “You Might Go to Prison, Even if You’re Innocent”
    Delaw...
  • Autistic Mental Health Conference 2025
    Online & In-Person ͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏     ­͏    ...
  • [Blog Post] Principle #16: Take care of your teacher self.
    Dear Reader,  To read this week's post, click here:  https://teachingtenets.wordpress.com/2025/07/02/aphorism-24-take-care-of-your-teach...

Search This Blog

  • Home

About Me

GenderEqualityDigest
View my complete profile

Report Abuse

Blog Archive

  • January 2026 (32)
  • December 2025 (52)
  • November 2025 (57)
  • October 2025 (65)
  • September 2025 (71)
  • August 2025 (62)
  • July 2025 (59)
  • June 2025 (55)
  • May 2025 (34)
  • April 2025 (62)
  • March 2025 (50)
  • February 2025 (39)
  • January 2025 (44)
  • December 2024 (32)
  • November 2024 (19)
  • October 2024 (15)
  • September 2024 (19)
  • August 2024 (2651)
  • July 2024 (3129)
  • June 2024 (2936)
  • May 2024 (3138)
  • April 2024 (3103)
  • March 2024 (3214)
  • February 2024 (3054)
  • January 2024 (3244)
  • December 2023 (3092)
  • November 2023 (2678)
  • October 2023 (2235)
  • September 2023 (1691)
  • August 2023 (1347)
  • July 2023 (1465)
  • June 2023 (1484)
  • May 2023 (1488)
  • April 2023 (1383)
  • March 2023 (1469)
  • February 2023 (1268)
  • January 2023 (1364)
  • December 2022 (1351)
  • November 2022 (1343)
  • October 2022 (1062)
  • September 2022 (993)
  • August 2022 (1355)
  • July 2022 (1771)
  • June 2022 (1299)
  • May 2022 (1228)
  • April 2022 (1325)
  • March 2022 (1264)
  • February 2022 (858)
  • January 2022 (903)
  • December 2021 (1201)
  • November 2021 (3152)
  • October 2021 (2609)
Powered by Blogger.