NEWS: 公告在東京證券交易所JASDAQ標準市場新上市



Government Cybersecurity Challenges at the Edge

出版商 IDC 商品編碼 980249
出版日期 內容資訊 英文 11 Pages
邊緣運算上政府的網路安全課題 Government Cybersecurity Challenges at the Edge
出版日期: 2020年12月28日內容資訊: 英文 11 Pages

當運算移至邊緣時,傳統的安全問題仍然適用,但是新的問題與攻擊面的擴展以及多個設備的物理安全性有關。 即使許多安全工具相似,保護邊緣資料和系統也變得越來越複雜。 這意味著邊緣安全性是 "相同,但是不同" ,因為需要從物理安全性和改進的系統存取控制開始,採用更詳細的安全性方法。




  • 軟體定義網路和UTM的邊緣運算的擴張
    • UTM和邊緣運算
  • 邊緣安全和大規模網路(及網路安全)的關係
    • 終端安全-感測器設備
    • 從感測器到網路連接
    • 安全的存取服務-透過網路資料中心或雲端
    • 平台,儲存,及應用
    • AI和分析所扮演的角色
  • 關於邊緣運算的安全性
  • 邊緣運算的物理性安全



  • 相關調查
  • 摘要
Product Code: US45994420

This IDC Perspective examines how government agencies approach security as part of their ongoing edge computing efforts.When computing moves to the edge, traditional security concerns still apply, but new concerns emerge related to sprawling attack surfaces and the physical security of multiple devices. Protecting both edge data and systems is becoming more complicated, even though many security tools are similar. This means edge security is "the same, only different," in that it requires a more detailed approach to security, starting with physical security and improved system access control."Edge computing has different security needs, but government edge systems still must be maintained and protected in a unified way," said Shawn P. McCarthy, research director, Government IT Infrastructure at IDC. "This includes moving toward a zero-trust connection capability while still supporting unified threat management platforms and enterprisewide SD-WAN technologies."

Executive Snapshot

Situation Overview

  • Software-Defined Networks and Extending UTM to the Edge
    • UTM and Edge Computing
  • How Edge Security Relates to the Larger Network (and Network Security)
    • Endpoint Security - Sensor Devices
    • Sensor-to-Network Connections
    • Secure Access Services - Through the Network to Datacenter or Cloud
    • Platforms, Storage, and Applications
    • The Role of AI and Analytics
  • Is Edge Computing Always Less Safe?
  • The Physical Security of Edge Computing

Advice for the Technology Buyer

Learn More

  • Related Research
  • Synopsis