Key Findings:

The variety of use cases and requirements can lead to a sprawl of first-of-a-kind edge computing deployments, without any synergy and complicating efforts to secure and manage them.The scale of distributed computing and storage required by edge computing, as well as deployment locations that usually have no IT staff, combine to create new management challenges.With processing and storage placed outside traditional information security visibility and control, edge computing creates new security challenges that need to be addressed in depth.Edge computing creates a sprawling data footprint across a distributed architecture that needs to be governed, integrated and processed.

Source: Gartner Reprint