close By using this website, you agree to the use of cookies. Detailed information on the use of cookies on this website can be obtained on OneSpin's Privacy Policy. At this point you may also object to the use of cookies and adjust the browser settings accordingly.

From Cloud to Cloudlets

By: Ed Sperling

Why the intersection of 5G and the edge is driving a new compute model.

On the flip side, the value of decentralized data is lower, making it less rewarding to hack into a cloudlet. “While it’s more accessible — it’s not Fort Knox, like some of the cloud systems — you cannot compromise the integrity of all the pieces,” said John Hallman, product manager for trust and security at OneSpin Solutions. “The smaller pieces are more vulnerable, but the opportunity to improve security is there, too. So while it may be easier to hack into the individual pieces, it may be harder to get at the individual pieces that you want to protect.”

[...]

At the very least, cloudlet providers — which will range from on-premises IT departments to off-premises data centers — will have to make some tradeoffs involving security.

Back

Related Links