Special Offer from Cutter Consortium

Fog Computing: Securing the Intelligent Edge in Next-Generation Networks

by Frank Michaud and John K. Zao

In this article, Frank Michaud and John K. Zao take an in-depth look at the role of fog computing — specifically fog architecture — in cybersecurity protection for today’s “connected-everything/data-everywhere” systems. The authors explain fog node–centric security, provide some real-world examples, and delve into physical security of the fog nodes, end-to-end security within the device-fog-cloud continuum, and security monitoring and management among the hardware/software entities present in the continuum.

Download your complimentary copy of Fog Computing: Securing the Intelligent Edge in Next-Generation Networks when you fill out our special offer form below.

Already a Cutter client? Read it now.

Fog Computing: Securing the Intelligent Edge in Next-Generation Networks is one of five articles in the report, Fog/Edge Computing: Opportunities, Case Studies, ChallengesClick here for more information. 

Don't miss another issue — subscribe to the monthly Cutter Business Technology Journal today!

Subscribe Now! Use Coupon Code CBTJ50!