Securing Edge Applications and Infrastructure: Top Considerations and Automated Approaches
Offered By: Red Hat Ansible Automation via YouTube
Course Description
Overview
Explore the critical security considerations for edge computing in this 40-minute talk from Red Hat Ansible Automation. Learn about the top security challenges faced when deploying applications and devices in distributed locations with limited IT resources. Discover recent findings from infrastructure managers, enterprise architects, and IoT specialists regarding their primary concerns for securing distributed infrastructure and applications. Examine Red Hat's approach to addressing these security issues and understand how an automated, consistent strategy for modernizing infrastructure can support edge use cases while minimizing attack surfaces and security risks. Gain valuable insights into scaling your edge computing initiatives securely and efficiently.
Syllabus
Thinking about edge? Think about security!
Taught by
Red Hat Ansible Automation
Related Courses
Mobile Devices in Everyday LifeTallinn University via EMMA Windows Support Essentials: Maintenance
Microsoft via edX Advanced IOT Applications
Indian Institute of Science Bangalore via Swayam Computer Fundamentals: Security
Pluralsight Integrating AWS IoT Core in Your Application
Pluralsight