National Cyber Warfare Foundation (NCWF) Forums


Securing the edge: 5 best practices


0 user ratings
2020-09-14 10:15:46
milo
Digital Forensics / Incident Response (DFIR)

For a growing number of companies, the “edge” of the enterprise network is an increasing focal point of IT investments. This is where they are aiming to bolster data storage, processing, and analytics capabilities to generate business insights from data gathered from connected devices and systems.

Optical and photonic products manufacturer Lumentum has employed an edge strategy with local compute and storage arrays to deal with the large volume of data generated during the manufacturing and testing process.



“Edge computing allows us to process and store data coming off the line in real time,” says Ralph Loura, senior vice president and CTO. “We also employ an aggregation strategy to stream that data into public cloud platforms for data aggregation, processing, long-term storage, and secure partner access.”

To read this article in full, please click here



For a growing number of companies, the “edge” of the enterprise network is an increasing focal point of IT investments. This is where they are aiming to bolster data storage, processing, and analytics capabilities to generate business insights from data gathered from connected devices and systems.

Optical and photonic products manufacturer Lumentum has employed an edge strategy with local compute and storage arrays to deal with the large volume of data generated during the manufacturing and testing process.



“Edge computing allows us to process and store data coming off the line in real time,” says Ralph Loura, senior vice president and CTO. “We also employ an aggregation strategy to stream that data into public cloud platforms for data aggregation, processing, long-term storage, and secure partner access.”

To read this article in full, please click here



Source: csoOnline
Source Link: https://www.csoonline.com/article/3572338/securing-the-edge-5-best-practices.html#tk.rss_all


Comments
new comment
Nobody has commented yet. Will you be the first?
 
return to home



Copyright 2012 through 2020 - National Cyber Warfare Foundation - All rights reserved worldwide.