Cloud Security Perspectives and Insights

What are the Benefits of Edge Computing Security?

Colin Steele
Product Communications Specialist

As the complex functions that web applications and services perform move closer to users, there is increasing demand for the real-time processing, creation, and exchange of data. Enterprises need to perform the same types of computations at the edge that they traditionally did in the data center. With that comes the need to protect those workloads at the edge as well.

nick deshpandeEdge computing security takes traditional protections that are done on premises or in the cloud and implements them in proximity to where users interact with data and services. In this interview, Nick Deshpande, principal, product strategy at Oracle, discusses a few of the benefits of edge computing security.

What is the biggest advantage of the edge security approach?

One of the main benefits of edge computing security is the ability to secure a workload no matter where it is and scale with that workload no matter how big it gets. When Pokémon Go does its giant meetups, for example, users put a huge amount of strain on local networks. Edge security can scale up and down quickly with the demands of those workloads without contributing to that strain.

How exactly does this approach improve security?

Enterprises have visibility right up to the edge of the network. You're not waiting for the data to come back in to your data center or cloud and be processed by some server. You can deal with any potential threats upstream, where the trusted and un-trusted zones meet.

Are there any benefits of edge computing security when it comes to cloud migrations?

Edge security is also a great fit for the cloud lift-and-shift use case. Enterprises may be concerned that they're going to have to sacrifice one security posture for another or go without security for a certain amount of time as they get situated in a new environment. They may worry about trying to take a security profile from their on-premises data center and trying to match it to a cloud provider’s environment.

How do Oracle's edge services help with that?

With our edge computing security approach, enterprises can establish a security profile that moves with their applications and services, regardless of hosting environment. Users have a consistent security layer, whether it's in a hybrid, public or multi-cloud scenario. So if you've already achieved compliance, you’re not going to lose that when you move to the cloud.

With some cloud providers, everything is so baked in, it can be really tough to move workloads around or out of their cloud, or to work across multiple clouds when you need to. Being agnostic is a really big benefit.

Be the first to comment

Comments ( 0 )
Please enter your name.Please provide a valid email address.Please enter a comment.CAPTCHA challenge response provided was incorrect. Please try again.