Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Digital Transformation

Edge Computing Do’s and Don’ts

by Mav Turner
June 5, 2019
in Digital Transformation
Reading Time: 3 mins read
A A
edge computing
Share on FacebookShare on Twitter

Edge computing is here to stay and it’s no wonder. Edge computing provides federal IT pros with a range of advantages they simply do not have with more traditional computing environments.

First, edge computing brings memory and computing power closer to the source of data, resulting in faster processing times, lower bandwidth requirements, and improved flexibility. Edge computing has also become a critical enabler for the continued surge in Internet of Things (IoT) devices. And, finally, it can be a source of potential cost savings. With edge computing, data is processed in real time at the edge devices, therefore, it can help save computing cycles on cloud servers and reduce bandwidth requirements.

That said, while edge computing may bring advantages, it certainly introduces its share of challenges. Among the greatest challenges are visibility and security, based on the decentralized nature of edge computing.

Have no fear! Challenges are meant to be overcome, and there are certainly ways to overcome these in order to gain the benefits of edge computing.

Strategize

As with any technology implementation, start with a strategy. Remember, edge devices are under the purview of the government IT pro and are considered agency devices, not cloud devices, therefore they are the responsibility of the federal IT staff. Implementing edge devices should be treated the same as any new technology.

Include compliance and security details in the strategy, as well as configuration management. Create thorough documentation. And, standardize; create a uniform set of hardware and software for edge devices, wherever possible, to enhance consistency and ease manageability.

Visualization and Security

Once the strategy is in place, visualization and security are key.

Remember, accounting for all IT assets includes edge-computing devices, not just those devices in the cloud or on-premises. Be sure to choose a tool that not only monitors remote systems, but provides automated discovery and mapping so the federal IT pro has a complete understanding of all edge devices.

In fact, consider investing in tools that provide full-infrastructure visualization so the federal IT pro can have a complete picture of the entire network at all times. Add in full-network troubleshooting to be sure the team can monitor the complete network as well. Network, systems, and cloud management and monitoring tools will optimize results and provide protection across the entire distributed environment.

To help strengthen security all the way out to edge devices, be sure that all data—whether in-motion or at rest—is encrypted and be sure patch management is part of the security strategy. Strongly consider using automatic push update software that ensures software stays current and that vulnerabilities are addressed in a timely manner. This is an absolute requirement for ensuring a secure edge environment, as is an advanced Security Information and Event Management (SIEM) tool that will ensure compliance while mitigating potential threats.

A SIEM tool will also assist with continuous monitoring, which helps federal IT pros maintain an accurate picture of the agency’s security risk posture, providing near real-time security status. This is particularly critical with edge-computing devices which can often go unsecured.

Conclusion

The distributed nature of edge computing technology is increasing in complexity, with more machines, greater management needs, and a larger attack surface.

Luckily, as computing technology has advanced, so has monitoring and visualization technology that will help the federal IT pro realize the benefits of edge computing without additional management or monitoring pains.

Tags: digital transformationEdge computingEdge Computing SecurityInternet of Thingmav turnerSolarWinds. SIEM

RELATED POSTS

Enabling a Better Customer Experience with the Technology Modernization Fund
CX Service and Delivery

Enabling a Better Customer Experience with the Technology Modernization Fund

July 6, 2022
With a Funding Bonus, Department of Defense Has a Unique Opportunity to Invest in Digital Transformation
Defense & IC

With a Funding Bonus, Department of Defense Has a Unique Opportunity to Invest in Digital Transformation

June 29, 2022
Healthcare
Civilian

Delivering on the Next-Gen Healthcare

June 23, 2022

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5386 shares
    Share 2154 Tweet 1347
  • The Future for the Air Force Depends on Agility and Resilience at the Edge

    87 shares
    Share 35 Tweet 22
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    42 shares
    Share 17 Tweet 11
  • Design Secure Application Software That Transforms Government Agencies

    12 shares
    Share 5 Tweet 3

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us