Agencies Gain Access to Unified, Cloud-Native Services
Edge computing inverts network and security service design patterns, shifting the focus to the secure interaction of users and data wherever they are — more often than not, outside of traditional enterprise perimeters.
As a result, the market must move from point products in the cloud to Secure Access Service Edge (SASE, pronounced “sassy”), a transformation Gartner predicts will happen by 2024. This emerging security and networking architecture model, introduced by Gartner last year, converges networking and network security into a single cloud-native service.
As edge computing breeds complexity, latency and the need to decrypt and inspect encrypted traffic, the demand for the consolidation will only increase. SASE is different from other approaches because of the security breadth it brings.
Combining web, network, app and data security into one provides visibility and control across the cloud, network and endpoints. Hybrid enforcement allows the same management and policies to be enforced from anywhere, which leads to increased speed, lower costs and uniformity.
MORE FROM FEDTECH: Find out more about smart building sensors.
Behavioral Analytics Can Protect Devices at the Edge
SASE also enables behavioral automation and risk-adaptive protection, which are particularly crucial as warfare evolves. There aren’t just more devices connected to the internet; those devices are growing in complexity and speed thanks to AI and machine learning, which have bolstered offensive and defensive capabilities.
It’s imperative for the military to protect technologies at the edge to ensure they aren’t manipulated and used against their forces. If, for example, military systems, communications, security cameras, IoT sensors or card readers get compromised, organizations must have the security in place to react quickly.
Organizations must leverage behavioral analytics for IoT devices communicating back to the cloud. Behavioral intelligence can be integrated into cloud-based security platforms to extend automated and risk-adaptive protection. This adaptively shapes and enforces security policies across enterprise endpoints or devices with no administrator intervention — and can do so across an agency’s entire on-premises and cloud infrastructure.
This allows organizations to gain insight into human and machine behavior, thus helping protect AI-fueled digital transformation efforts. On the human side especially, administrators should implement management and monitoring plans that focus on the individual, even in a widespread edge environment.
A highly targeted security approach, such as one that involves monitoring individual risk profiles and user behaviors, is preferable since security measures can be targeted at individuals without creating friction throughout the entire workforce.
MORE FROM FEDTECH: The Army is exploring smart city Internet of Things tools.
Edge Computing Requires New Security Controls
As edge computing is combined with cloud computing, it requires the same rigorous security considerations as with running in the cloud. That is a challenge for many organizations today, given their current security infrastructure.
As IoT and the tactical edge continue to grow, organizations will be forced to adapt. Agencies should begin to reconsider their current architecture to support the tactical edge now, embracing a cloud-native approach that can underpin simplified network and security administration down the line.
There is no question that SASE will play a leading role in this transformation, enabling greater cloud app performance, cutting the complexity of security hardware and connectivity, and increasing visibility and control, among other benefits. Only by investing in this foundation will organizations be able to realize the benefits, latency and bandwidth included, of edge computing.