Opinion: How IoT Device Manufacturers Should Take Security To The Edge

Row of blue locked padlock icons with one red unlocked padlock

We’ve come a long way from the mainframe computing environments of the ’50s, and you don’t hear much complaining about it. Renting computing power back in the day required you to physically go to the mainframe — an impractical situation at best.

With the advent of distributed computing going mainstream in the ’90s, people all over the world could use networked computers to take advantage of the power of many. Today, Amazon Web Services, Google Cloud, Microsoft, and others are now the horsepower that everyone can tap into. While it seems easy for the end user, connecting to those data centers and then generating data that goes back to the user is actually quite intensive and requires lots of computing power. Enter edge computing.