Edge Security Essentials: Edge Security & How Dell NativeEdge Can Help

This technical white paper describes how vulnerable edge locations and industrial computer systems are to attacks by malicious actors and how critical public functions are thereby jeopardized.

Security investments are rising, but the attack surface is also getting bigger and the understanding for many enterprises as not being “if”, but more “when” a breach happens.

Security incidents in operational technology and other industrial control systems have three main motivations for the attackers: actual harm, commercial vandalism (reduced output), and reputational vandalism. The effect of breaches against these systems can result in reputational damage.

In the US, Executive Order 14028 introduced new regulations for companies supplying products or services containing software to U.S. government agencies and the Cybersecurity Act currently under development strengthens the EU Agency for Cybersecurity. Both pieces of legislation establish a cybersecurity certification framework for products and services that reduce damage to consumers and enterprises.

This white paper introduces the key features and design considerations needed to enhance security for edge assets. It explains how Dell Technologies is approaching edge security in designing Dell NativeEdge—an edge operations software platform. This white paper explains how Dell NativeEdge will comply with industry standards and legislation to reduce customers vulnerability to security breaches and threats.

Your download is sponsored by Dell Technologies.