Edge computing extends 5G’s low-latency performance to more devices in more places. That’s a game changer because, while a 5G Radio Access Network (RAN) reduces latency between mobile devices and cell towers, it does not reduce latency on other networks. That’s why running edge computing—whether in an enterprise network, service provider network, or even homes and vehicles—together with 5G is so crucial.
“The idea is to provide compute and storage closer to devices to take advantage of low-latency RAN,” says Jean-Luc Bouthemy, Principal Engineer, Cybersecurity at T-Mobile.
Edge computing unlocks new capabilities with the potential to boost the value and impact for your business. This includes process automation, next-generation applications, accelerated analytics, and the reduced likelihood of disruptions caused by cloud outages—all of which can help you be more agile and efficient.
At the same time, edge computing also “creates a significant shift in security,” Bouthemy says. “Security needs to be a shared responsibility among the different parties providing the solution.”
According to ETSI, the “heterogeneity” of the different systems that must be integrated for edge computing requires that everyone involved give appropriate attention to security, trust, and privacy. “Edge computing environments are by nature characterized by a complex multi-vendor, multi-supplier, multi-stakeholder ecosystem of equipment, including both hardware and software devices,” ETSI summarized in a white paper.