This resource is no longer available
Protecting systems operating at the edge of the network poses several new and different security challenges when compared to delivering and securing services from a centralized cloud environment.
In this paper, examine 4 of the main security implications and challenges that must be overcome to embrace and reap the benefits of edge computing. Access the white paper after completing a brief survey.