Concerns at the #PhySec #Edge...
Tech. Environment that keeps us secure. (Courtesy: Shane A)

Concerns at the #PhySec #Edge...

Further to Mark Morrison 's post on managing complexities in our connected environment (to read follow link below)

The complexities in our environment has seen a quantum leap in recent years. Even something that we take for granted, in our everyday world, #physicalsecurity, has seen a huge change in technologies that are deployed to keep us all safe.

Learning from several professionals in the industry, from an edge infrastructure perspective, here's what we hear:

  1. That today’s #physicalsecurity technologies are complex and have different vendor interfaces to manage them – tracking if they are up / down, tracking their performance, constant maintenance to keep them running continuously has seen a huge evolution from earlier days...
  2. There is a heightened security need (in the components that offer security!!) complicated by sheer deployment numbers and highly advanced technologies getting into these #devices (silicon and AI to begin with) – integrating them holistically has become a challenge in itself...
  3. Finally, the ability to manage critical #edge components to keep them all patched clean and have an understanding of risk exposure at any point, is fast emerging as a CxO concern – already a CISO / CEO level compliance issue.

How do enterprises manage the complexity of above 3 basic concerns? Need an abstraction philosophy to view them holistically; which is what Mark Morrison is referring to...

#physicalsecurity, #edgecomputing, #edgesecurity. For you at the #edge: Arun Narayanaswamy , Sanjay Rajashekar , Bask Iyer , Nithin Shanbhag , Ajith Kumar Ravindranathan , Philip Jang , Skylar Mahr , Vineeth Pai , SmartHub.ai ...



Sarah Bernal

SEO Strategist | WordPress Developer | Executive Virtual Assistant

1 年

Thanks for sharing

回复
Avi Sakhalkar

ZPE-Legrand | Serving APJC

1 年

Excellent article Niranjan Maka

Philip Jang

The nerd with a word. 4IR practitioner (Views expressed are my own)

1 年

Thanks for posting this Niranjan Maka. Systems assurance is no longer limited to systems uptime, it now includes security patching, configuration monitoring, secure certificates and password hygiene. As our connected devices continue to provide value for centralized management, they become more available as targets for hackers. Segmentation does not equal secure. Lifecycle management from deployment to decommissioning should be managed, maintained, and monitored throughout. Ignoring this risk or pretending it doesn’t exist is a mistake we cannot afford to make.

要查看或添加评论,请登录

Niranjan Maka的更多文章

社区洞察

其他会员也浏览了