Hybrid Datacenters and Edge: How to protect data outside of main operations

20/01/2026

Modern IT infrastructure is no longer a closed world of several servers in a single data center. Today, companies combine cloud services, physical data centers, and increasingly, so-called Edge Computing – computing capacities and devices located close to the end user or production process. All this brings new security challenges.

Edge devices are typically industrial gateways, local servers in branches, IoT sensors or microcontrollers. They are created to reduce latency, ensure operation even without a connection to the cloud and quickly respond to local events.


However, these devices tend to be beyond the reach of conventional security tools. They are often "forgotten" - without updates, without central supervision, without access control.


Hybrid traffic risks

  • Lack of visibility over Edge locations
  • Different access rules between Core and Edge parts of the network
  • Potential for lateral attacker movement between locations
  • Low resistance to physical compromise

How to secure the Edge in practice


  • Visibility – Novicom ADDNET helps you get an up-to-date overview of network elements, their location, status and logical connections. Using automatic topology, you can also identify unauthorized devices.
  • Segmentation – Using VLAN and DACL, it is possible to separate Edge elements from other parts of the infrastructure. This way, the attacker cannot spread freely.
  • Monitoring – network monitoring can detect deviations in the behavior of Edge devices (e.g. when an IoT camera starts sending data to an unknown server). L2 monitoring can then notify you of a change in the device or a change in the location of an existing device.
  • Access control – the NAC layer limits who can connect the device and where it has access.

Practical example

A manufacturing company with several branches outside the headquarters began to deploy Edge infrastructure. However, without centralized management, incidents began to multiply: insufficiently secured gateways, unupdated routers or even fake WiFi APs. By deploying the Novicom ADDNET solution and the Novicom NADS service, the network was unified, dynamic access policies were introduced and a clear map of assets was created.

Edge Computing is therefore not only an advantage - it is also a security challenge. With increasing decentralization, the need for a unified overview, the possibility of intervention and regular monitoring increases. Systems such as Novicom ADDNET and the NADS service allow you to extend network security to the edge of the infrastructure - where it is most vulnerable.


Do you want to know more? And how can Novicom and its products help you with network protection in your organization?

Contact us, we will be happy to discuss your situation and propose a solution for complete cybersecurity for your company.


More articles in the Cyber ​​Security blog »