target audience: TECH SUPPLIER  Publication date: May 2023 - Document type: IDC Survey Spotlight - Doc  Document number: # US50588823

IDC Survey Spotlight: Organizations Turn to Edge Computing to Strengthen Data Security, Sovereignty, and Control

By: 

  • Jennifer Cooke Loading
  • Chris Drake Loading

Content

  • 2 slides


Get More

When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.



Related Links

Abstract


This IDC Survey Spotlight explores the importance that organizations attribute to edge computing as a way of enhancing their data security, sovereignty, and control. It includes data from IDC's EdgeView 2023 Survey. Survey respondents include global users of edge technologies and solutions who were asked whether they believe edge technologies can strengthen their data security and protect them against security breaches and how important security considerations are when selecting edge solution providers.

According to IDC's EdgeView 2023 Survey, "Over half of the organizations using edge IT solutions believe that investments in edge infrastructure enhance their data security. The figure is highest (62%) among manufacturing firms and financial services institutions. Both industries use edge resources to reduce security risk. For manufacturing and operating technology environments, edge enables local data analytics and action, reducing data transfer and location concerns. For the financial industry, edge provides a way to gather, analyze, and store data while adhering to data sovereignty and privacy regulations," said Jennifer Cooke, research director, Edge Strategies, and Chris Drake, senior research director, BuyerView research at IDC. "We expect security considerations to be increasingly important to decisions about the design, operation, and management of edge IT architectures (including vendor selection of edge solution providers). Organizations will focus on how edge solutions can deliver security capabilities and power security applications at the network edge."



Coverage


Do you have questions about this document
or available subscriptions?