66% of IT teams see edge computing as a ‘threat’ to their organisations

66% of IT teams see edge computing as a ‘threat’ to their organisations

-

Two thirds (66%) of IT teams see edge computing as a ‘threat’ to their organisation, despite the potential advantages its adoption could bring to enterprises. That’s according to a recent survey of 270 US and UK based IT decision makers by Kollective, exploring the challenges of incorporating IoT devices into business ecosystems.

Keeping edge devices secure is the main concern for IT teams, with 52% of respondents claiming that they will encounter difficulties ensuring full security across all edge devices. At the same time, although edge computing is perceived to bolster connection speed, 36% of IT teams expressed doubt about overcoming latency issues when communicating from cloud to edge.

These concerns help explain why only 24% of businesses have implemented edge networks to date. However, the recognition of the benefits of edge computing, can be seen in the 50% of IT decision makers who recognise the need to invest in hardware to overcome these latency concerns, and the 47% that claim to have already initiated planning for investment in software solutions.

These findings are detailed in a new report, “Distributed Devices”. The report also investigates what IT professionals can do to ensure that all devices at the edge of their networks are reached effectively, securely, and at speed.

Commenting on the research findings, Kirk Wolfe, VP of Corporate Development at Kollective said, “There is a clear recognition from IT leaders that investment in new software will allow for more computing at the edge, but there remain legitimate concerns over the cost of implementation, connection speeds and security.

“In particular, there are numerous network concerns to overcome to keep networks safe and avoid potential attacks. For businesses choosing not to update all of the devices on a regular basis, the outcome could be disastrous, affecting employees, customers and the business as a whole. A peer to peer technology platform such as a Software-Defined Enterprise Content Delivery Network (SD ECDN) can address these issues of latency, cost and security; distributing files, video and patches to edge networks on a large scale.”

To download Kollective’s full Distributed Devices research report, along with a related infographic, visit https://go.kollective.com/distributed-devices-wp.html

IoT For All
IoT For All
IoT For All is an initiative to build a valuable resource for all stakeholders in the IoT industry. Our goal is to bring together the smartest minds in IoT to share knowledge through various forms of content, all aimed at educating the people who are implementing and enabling IoT.

Trending

AI Can Solve Our Driving Dependence — If We Don’t Mess It Up

Today, one only has to step out onto a New York street or fly over LA’s tangled highways to see the problems: auto-clogged roads, low-lying vehicle-fume smog, and barely-moving lines of single drivers sitting in multi-passenger cars. Some (mistakenly) cast luxurious self-driving cars as a means to turn the frustrations of a daily commute into a valuable period of relaxation or productivity. In this piece, I explain why that strategy won’t just be ineffective and worsen our commutes, but will also ultimately compel consumers to embrace the very transport philosophy that made us traffic-beleaguered in the first place. I also make a case for why using self-driving cars as public transport can be used as a means to eradicate driving dependence in the long term.

Why Robotic Process Automation Is the Way Forward for the Smart Data Center

This article looks at the role of RPA in the data center of the future, the so-called 'smart data center.' We explore why data centers need to smarten up, what types of RPA are available, how RPA can be integrated into the data center and the benefits of doing so.

AI in IoT Security: Friend or Foe?

Unfortunately, some of the difficulties facing AI in cybersecurity can be exploited by hackers. AI can be used for IoT security, or it can be used against it.
A hand holding a smart phone on a background of cameras

Video: The Heart of an IoT Strategy

When relevant data is properly incorporated into a holistic system, it can reinforce a host of other business efficiencies and security protocols before and after an incident.
the text "IoT" on a colorful background

Street Light Solutions to Save Cities on Utility Costs

Smart technology provides remote lighting control that can more accurately adjust, modify and monitor the amount of time the lights are turned on and to what extent.