Highest security for edge assets
From the Cloud to the Edge — New Potentials and New Threats
The expansion of edge computing structures will enable a wide range of new potentials to be unlocked. However, this development does not exclude new challenges and dangers. We offer you a solution to ensure your IT security even for decentralized locations.
The challenge of decentralization
With the emerging paradigm of edge computing, data processing is done closer to the end user to reduce the risk of latency issues. Resources are made available where they are actually needed, instead of in large data centers as has been the case in the past. Therefore, edge computing involves decentralized computing and storage resources at a large number of distributed locations.
Edge computing challenges
- Increased physical attack surface
- Distributed edge, distributed processing and storage, aggregation, local data analysis
- Autonomous real-time decision making (e.g. dodging to avoid an object)
- Common intelligence/situational awareness (e.g. nodes sharing critical security information, e.g., about non-autonomous ground or air vehicles)
Increased attack potential
In addition to low latency, however, distribution across many locations also creates a larger attack surface. Classic servers in data centers are secured against unauthorized physical access by the security measures of the data center itself. In the case of distributed edge devices, such protection is not possible from an economic point of view.
However, protection of the hardware components is an elementary component of the protection concept and is required in standards and certifications such as FIPS 140–2, ISO27001 and the IT basic protection catalogs of the BSI.
Protection of many small sites
These decentralized physical locations need special protection because they are more likely to be exposed to unauthorized physical access. The compromise of just one application could easily spread to the rest of the network.
To protect systems operating at the edge of the network, PHYSEC’s remote integrity verification solution assesses the physical state and provides a traffic light function to the orchestrator. PHYSEC’s remote readout module can be retrofitted to virtually any micro data center (MDC), enclosure, or even individual compute and storage systems, if not already integrated by the manufacturer.
Let us convince you of our solutions for edge computing
React to the rising security threats and prevent the attacks of tomorrow. We at PHYSEC will gladly answer your questions. Talk directly to our executives now.
Dr. Christian Zenger, CEO
Dr. Heiko Koepke, CFO