This evolving user expectation for high-performing, on-demand applications underpins a larger edge computing concern: security. While apps and services at the edge offer a way to streamline operations and improve the user experience, the growing number of disparate edge endpoints makes it impossible for traditional, perimeter-based authentication and access controls to keep pace.
Edge Security Best Practices
So what do edge security best practices look like in this evolving environment?
“On the connectivity side, an SD-WAN is a more intelligent, application-aware way to steer traffic,” says Granath. “For example, a corporate policy might include two frameworks: one for a user at a branch office who wants to use a trusted edge application, and a more stringent one with increased security inspection for less trusted apps.”
According to Granath, it’s also critical to avoid moving traffic from the edge to the data center before steering it to the cloud and back again. “Back when all apps were hosted in the data center, this made sense,” he says. “For applications hosted in the cloud, backhauling traffic to the data center adds unnecessary delay and slows down applications.”
To maximize efficiency, companies need to transform network and security architectures to connect users to applications closer to where staff are working, using local internet breakout to deliver a great end-user experience that combines IT efficiencies with robust security policy.
REGISTER: Learn more about securing your organization's infrastructure in the weekly CDW Tech Talk series. Click the banner below to register.