Professional Documents
Culture Documents
Strategies To Improve Security at The Edge
Strategies To Improve Security at The Edge
Improve Security
Posture and Agility
at the Edge
THIS EBOOK EXPLORES THE SINGLE MOST
DANGEROUS SECURITY RISK TODAY
ATTACKS CAN HAPPEN
ANYWHERE, AT ANY TIME
01
WHAT IS THE SINGLE MOST DANGEROUS EDGE
SECURITY RISK TODAY? COMPLACENCY OR INACTION.
Complacency or inaction arises from numerous and varied factors, like insufficient
resources, lack of expertise and competing priorities.
1 2 3
Assume the next attack will happen, Don’t just design for today, Continually evaluate every connectivity
because it will. design for the future. component, and plan for periodic updates.
a. Treat the edge of the edge as public. a. Only deploy infrastructure management components a. Every component of a network, no matter how
with local encryption and other security features. small or seemingly insignificant, introduces risk.
b. Apply a layering tactic using different independent
Replace connectivity hardware at the edge that does
methods of protection. b. Plan for future cryptographic algorithms that will
not promote security, only offers an outdated or
require increases in memory and CPU capacity.
c. Design security redundancy into the system in the unsupported security tool, or has limited memory
event a security control fails, or a vulnerability is c. Configure for auto updates of firmware to address and disk space to run the latest security updates.
exploited. future security requirements.
b. Only deploy the latest industry leading network
d. Enhance physical security measures at the edge with d. Design systems with security that can scale. components, with security measures enabled and
access controls and surveillance, to reduce chances configured to the most secure settings possible,
of theft or unwanted access. When this is not feasible, right out of the box.
use hardened and secure encrypted devices.
03
FIVE PROACTIVE STRATEGIES
IMPROVE SECURITY POSTURE AND AGILITY AT THE EDGE
4 5
Proactively increase agility to react Proactively build security into all
to security threats. connectivity solutions.
04
A USB-OVER-IP PLATFORM THAT MEETS
ALL FIVE PROACTIVE STRATEGIES
Digi AnywhereUSB® Plus - Industry Leading USB Connectivity
More Speed, More Power and More Security
Digi AnywhereUSB Plus with Digi TrustFence built-in and combined with Digi Remote Manager
meets all five proactive strategies to improve security posture and agility at the edge.
05
DIGI ANYWHEREUSB PLUS PROVIDES RELIABLE DATA
TRANSFER AND USB DEVICE CHARGING
The TLS certificate-based security of Digi AnywhereUSB Plus • Selectively enable and disable network services such as
is uniquely encrypted to protect sensitive financial, personal mDNS, HTTP/HTTPS, and SSH
and technical data across a network. Digi TrustFence is built • Encrypted access to AnywhereUSB Plus traffic: Access to the
in. Designed for mission-critical applications, Digi TrustFence USB-over-IP traffic is encrypted and authenticated by default
serves as a foundation that enables you to easily integrate and cannot be disabled
device security, device identity, and data privacy capabilities • Manage Digi AnywhereUSB Plus remotely and securely
into your network of USB devices. Digi TrustFence designs with Digi Remote Manager, a comprehensive IoT device
management application
security into IoT devices that can grow and adapt with new
and evolving threats. • Protected by the Digi TrustFence® framework
07
LICENSE DONGLES CAN DATA CENTER OR LAN CLOSET
Workstation requiring
authorization key fob to
access critical software
08
CONFIGURE, DEPLOY
AND MANAGE REMOTE
USB-OVER-IP ASSETS
SECURELY
09
LET'S CONNECT
United States Matt.Propes@digi.com
Canada Chris.DeHoog@digi.com
EMEA Jean-Marie.Dubois@digi.com
Other Businessdevelopment@digi.com
While every reasonable effort has been made to ensure that this information is accurate, complete and up-to-date, all information is provided “AS IS” without warranty of any kind. 10
We disclaim liability for any reliance on this information. All registered trademarks or trademarks are property of their respective owners.