Intelligent CIO North America Issue 14 | Page 35

EDITOR ’ S QUESTION

McKinsey recently advised that Edge Computing would represent a potential value of US $ 175 billion to US $ 215 billion in hardware by 2025 . And , according to Verified Market Research , the Global IoT market size was valued at US $ 212.1 billion in 2018 and is expected to grow 25.68 % between 2019 – 2026 and reach US $ 1,319.08 billion by 2026 .

Edge Computing can actually introduce even greater security risk , if not managed properly .
most cases , Edge Computing can actually introduce even greater security risk , if not managed properly .
This is because Edge Computing has proven itself invaluable in its ability to overcome a multitude of IT issues , thereby enabling organizations to make faster ,
Therefore , as organizations move forward with their Edge Computing strategy , they must seek solutions that are designed specifically for those architecting IoT deployments , that need secure and discreet network connectivity between the Edge devices , data center and cloud .
The solution should answer the call for a single costeffective network connectivity solution that scales from Edge devices to the largest data center servers and cloud platforms and is simple to configure and manage . more efficient and effective use of the volumes of data generated from IoT and other smart devices .
With such undeniable benefits , it is clear that organizations must adopt an Edge Computing strategy . However , it is critical that as they do so they address the one issue that Edge Computing has not been able to solve for IoT , which is security . In fact , in
With such a solution in hand , for the first time , organizations will be freed from traditional IoT connectivity solutions that use VPNs , SD-WANs or open ports which require in-depth networking knowledge , are expensive and tedious to configure , and create large and dangerous attack surfaces . And instead , they will be able to build and manage secure , dynamic end-to-end data tunnels between Edge device services , data center and cloud hubs , creating a Zero Trust network architecture that virtually eliminates any attack surface . p
DON BOXLEY , CEO AND CO-FOUNDER , DH2I
www . intelligentcio . com INTELLIGENTCIO NORTH AMERICA 35