
Hybrid Datacenters and Edge: How to protect data outside of main operations
Modern IT infrastructure is no longer a closed world of several servers in a single data center. Today, companies combine cloud services, physical data centers, and increasingly, so-called Edge Computing – computing capacities and devices located close to the end user or production process. All this brings new security challenges.

Hybrid traffic risks
- Lack of visibility over Edge locations
- Different access rules between Core and Edge parts of the network
- Potential for lateral attacker movement between locations
- Low resistance to physical compromise
How to secure the Edge in practice
- Visibility – Novicom ADDNET helps you get an up-to-date overview of network elements, their location, status and logical connections. Using automatic topology, you can also identify unauthorized devices.
- Segmentation – Using VLAN and DACL, it is possible to separate Edge elements from other parts of the infrastructure. This way, the attacker cannot spread freely.
- Monitoring – network monitoring can detect deviations in the behavior of Edge devices (e.g. when an IoT camera starts sending data to an unknown server). L2 monitoring can then notify you of a change in the device or a change in the location of an existing device.
- Access control – the NAC layer limits who can connect the device and where it has access.
Practical example
Edge Computing is therefore not only an advantage - it is also a security challenge. With increasing decentralization, the need for a unified overview, the possibility of intervention and regular monitoring increases. Systems such as Novicom ADDNET and the NADS service allow you to extend network security to the edge of the infrastructure - where it is most vulnerable.
Do you want to know more? And how can Novicom and its products help you with network protection in your organization?
Contact us, we will be happy to discuss your situation and propose a solution for complete cybersecurity for your company.
