{"id":967,"date":"2018-02-14T09:06:55","date_gmt":"2018-02-14T02:06:55","guid":{"rendered":"https:\/\/simenteknindo.com\/news\/?p=967"},"modified":"2018-02-14T09:06:55","modified_gmt":"2018-02-14T02:06:55","slug":"security-via-the-edge","status":"publish","type":"post","link":"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/","title":{"rendered":"Security Via the Edge"},"content":{"rendered":"<div id=\"awbs-main-content\" class=\"row\">\n<div class=\"col-md-12 awbs-body-text short\">\n<p>The cybersecurity advantages offered by edge computing are increasing with the development of new technologies and industry partnerships aimed at reducing network entry points and adding security capabilities.<\/p>\n<p>Edge computing has moved to the forefront of discussions around digital manufacturing and the Industrial Internet of Things over the past few years because of its ability to bring the data storage and analysis capabilities of the cloud into the facility. In many cases, edge computing devices can be co-located with the equipment whose data it is responsible for managing.<\/p>\n<p>Beyond the location convenience and reduced bandwidth requirements of edge computing, some technology providers are also touting its security advantages. Cisco, for example, points to its industrial switching and routing products and accompanying management applications, such as its IOx application environment for lifecycle management)\u00a0as examples of how edge computing can boost industrial cybersecurity efforts.<\/p>\n<section id=\"block-block-70\" class=\"block block-block clearfix\"><\/section>\n<p>\u201cBy moving compute resources closer to end devices, there is an opportunity for organizations to leverage those resources to bolster their security posture,\u201d says Dan Behrens, technical marketing engineer, IoT connectivity, at Cisco. \u201cMore specifically edge and fog computing (clusters of edge computing devices deployed where multiple computing resources are required) could be used to reduce the reach of insecure protocols, reduce the number of workstations needed in the environment, reduce or eliminate the need for out-of-band resources for passive network monitoring and remove identifying information prior to sending to upstream applications such as cloud solutions.\u201d<\/p>\n<p>Behrens says that, with IOx for example, users can run workstations on the networking equipment the devices are already connected to, thereby reducing the need for workstations. This is a key aspect to improving industrial cybersecurity because \u201creducing the number of workstations can simplify patch management, OS updates and remove physical entry points,\u201d he adds.<\/p>\n<section id=\"block-dfp-native\" class=\"block block-dfp clearfix\">\n<div id=\"dfp-ad-native-wrapper\" class=\"dfp-tag-wrapper\"><\/div>\n<\/section>\n<p>Providing an example of how this works in industrial applications, Behrens notes that users can run Telit Devicewise inside IOx on Cisco\u2019s 829 routers and IE4000 switches. He adds that OSISoft is developing software connectors for IOx\u00a0and that Cisco and Amazon Web Services have enabled the AWS Greengrass core in a secure container hosted in a Cisco IoT gateway. \u201cWhen these gateways are enabled with the Cisco Kinetic IoT platform they can provide secure, zero-touch deployment and simplified cloud management of IoT gateways, and enforcement of data distribution policies on the network,\u201d he says.<\/p>\n<p>From a security perspective, \u201canytime we can remove plant floor workstations, we are reducing the scope of devices we need to protect and reducing one of the possible vectors that a threat could be brought in on, such as via USB ports,\u201d adds Behrens.<\/p>\n<p>IOx also allows for passive monitoring to be conducted on the network without adding hardware and networking equipment to eliminate the impact of replicating traffic or deploying TAPs (test access ports). \u201cWith the ability to run software sensors, directly on the networking equipment the traffic is already passing through, an organization can deploy a passive security monitoring solution without adding additional hardware or complexity to the network,\u201d says Behrens. \u201cSoftware sensors receive the replicated traffic internal to the routers and switches, and send only the required information to an application.\u201d<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The cybersecurity advantages offered by edge computing are increasing with [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":968,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,9],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Via the Edge - SIMENTEK News<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Via the Edge - SIMENTEK News\" \/>\n<meta property=\"og:description\" content=\"The cybersecurity advantages offered by edge computing are increasing with [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/\" \/>\n<meta property=\"og:site_name\" content=\"SIMENTEK News\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PtSimenteknindo\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-14T02:06:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2018\/02\/891621914.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Wimpy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@simenteknindo\" \/>\n<meta name=\"twitter:site\" content=\"@simenteknindo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wimpy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/\"},\"author\":{\"name\":\"Wimpy\",\"@id\":\"https:\/\/simenteknindo.com\/news\/#\/schema\/person\/524d37c7e448b5855c7499cd6356fa3e\"},\"headline\":\"Security Via the Edge\",\"datePublished\":\"2018-02-14T02:06:55+00:00\",\"dateModified\":\"2018-02-14T02:06:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/\"},\"wordCount\":527,\"publisher\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/#organization\"},\"image\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2018\/02\/891621914.jpg\",\"articleSection\":[\"Industry News\",\"Tech News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/\",\"url\":\"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/\",\"name\":\"Security Via the Edge - SIMENTEK News\",\"isPartOf\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2018\/02\/891621914.jpg\",\"datePublished\":\"2018-02-14T02:06:55+00:00\",\"dateModified\":\"2018-02-14T02:06:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/#primaryimage\",\"url\":\"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2018\/02\/891621914.jpg\",\"contentUrl\":\"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2018\/02\/891621914.jpg\",\"width\":640,\"height\":427},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/simenteknindo.com\/news\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Via the Edge\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/simenteknindo.com\/news\/#website\",\"url\":\"https:\/\/simenteknindo.com\/news\/\",\"name\":\"SIMENTEK News\",\"description\":\"Distributor SIEMENS Indonesia\",\"publisher\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/simenteknindo.com\/news\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/simenteknindo.com\/news\/#organization\",\"name\":\"PT. SIMENTEKNINDO\",\"url\":\"https:\/\/simenteknindo.com\/news\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/simenteknindo.com\/news\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2016\/06\/simentek-logo.png\",\"contentUrl\":\"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2016\/06\/simentek-logo.png\",\"width\":400,\"height\":400,\"caption\":\"PT. SIMENTEKNINDO\"},\"image\":{\"@id\":\"https:\/\/simenteknindo.com\/news\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PtSimenteknindo\/\",\"https:\/\/x.com\/simenteknindo\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/simenteknindo.com\/news\/#\/schema\/person\/524d37c7e448b5855c7499cd6356fa3e\",\"name\":\"Wimpy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/simenteknindo.com\/news\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2020\/07\/wimpy-96x96.jpg\",\"contentUrl\":\"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2020\/07\/wimpy-96x96.jpg\",\"caption\":\"Wimpy\"},\"description\":\"www.linkedin.com\/in\/wimpynf\",\"sameAs\":[\"www.linkedin.com\/in\/wimpynf\"],\"url\":\"https:\/\/simenteknindo.com\/news\/author\/wnf\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Via the Edge - SIMENTEK News","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/","og_locale":"en_US","og_type":"article","og_title":"Security Via the Edge - SIMENTEK News","og_description":"The cybersecurity advantages offered by edge computing are increasing with [&hellip;]","og_url":"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/","og_site_name":"SIMENTEK News","article_publisher":"https:\/\/www.facebook.com\/PtSimenteknindo\/","article_published_time":"2018-02-14T02:06:55+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2018\/02\/891621914.jpg","type":"image\/jpeg"}],"author":"Wimpy","twitter_card":"summary_large_image","twitter_creator":"@simenteknindo","twitter_site":"@simenteknindo","twitter_misc":{"Written by":"Wimpy","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/#article","isPartOf":{"@id":"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/"},"author":{"name":"Wimpy","@id":"https:\/\/simenteknindo.com\/news\/#\/schema\/person\/524d37c7e448b5855c7499cd6356fa3e"},"headline":"Security Via the Edge","datePublished":"2018-02-14T02:06:55+00:00","dateModified":"2018-02-14T02:06:55+00:00","mainEntityOfPage":{"@id":"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/"},"wordCount":527,"publisher":{"@id":"https:\/\/simenteknindo.com\/news\/#organization"},"image":{"@id":"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/#primaryimage"},"thumbnailUrl":"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2018\/02\/891621914.jpg","articleSection":["Industry News","Tech News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/","url":"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/","name":"Security Via the Edge - SIMENTEK News","isPartOf":{"@id":"https:\/\/simenteknindo.com\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/#primaryimage"},"image":{"@id":"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/#primaryimage"},"thumbnailUrl":"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2018\/02\/891621914.jpg","datePublished":"2018-02-14T02:06:55+00:00","dateModified":"2018-02-14T02:06:55+00:00","breadcrumb":{"@id":"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/simenteknindo.com\/news\/security-via-the-edge\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/#primaryimage","url":"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2018\/02\/891621914.jpg","contentUrl":"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2018\/02\/891621914.jpg","width":640,"height":427},{"@type":"BreadcrumbList","@id":"https:\/\/simenteknindo.com\/news\/security-via-the-edge\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/simenteknindo.com\/news\/"},{"@type":"ListItem","position":2,"name":"Security Via the Edge"}]},{"@type":"WebSite","@id":"https:\/\/simenteknindo.com\/news\/#website","url":"https:\/\/simenteknindo.com\/news\/","name":"SIMENTEK News","description":"Distributor SIEMENS Indonesia","publisher":{"@id":"https:\/\/simenteknindo.com\/news\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/simenteknindo.com\/news\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/simenteknindo.com\/news\/#organization","name":"PT. SIMENTEKNINDO","url":"https:\/\/simenteknindo.com\/news\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/simenteknindo.com\/news\/#\/schema\/logo\/image\/","url":"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2016\/06\/simentek-logo.png","contentUrl":"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2016\/06\/simentek-logo.png","width":400,"height":400,"caption":"PT. SIMENTEKNINDO"},"image":{"@id":"https:\/\/simenteknindo.com\/news\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PtSimenteknindo\/","https:\/\/x.com\/simenteknindo"]},{"@type":"Person","@id":"https:\/\/simenteknindo.com\/news\/#\/schema\/person\/524d37c7e448b5855c7499cd6356fa3e","name":"Wimpy","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/simenteknindo.com\/news\/#\/schema\/person\/image\/","url":"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2020\/07\/wimpy-96x96.jpg","contentUrl":"https:\/\/simenteknindo.com\/news\/wp-content\/uploads\/2020\/07\/wimpy-96x96.jpg","caption":"Wimpy"},"description":"www.linkedin.com\/in\/wimpynf","sameAs":["www.linkedin.com\/in\/wimpynf"],"url":"https:\/\/simenteknindo.com\/news\/author\/wnf\/"}]}},"_links":{"self":[{"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/posts\/967"}],"collection":[{"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/comments?post=967"}],"version-history":[{"count":1,"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/posts\/967\/revisions"}],"predecessor-version":[{"id":969,"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/posts\/967\/revisions\/969"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/media\/968"}],"wp:attachment":[{"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/media?parent=967"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/categories?post=967"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/simenteknindo.com\/news\/wp-json\/wp\/v2\/tags?post=967"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}