Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore real-time security monitoring and observability strategies for edge computing environments in this 19-minute conference talk from Conf42 Observability 2025. Discover the fundamental concepts of edge computing and understand why traditional security approaches fall short in distributed edge architectures. Learn about the unique security challenges that arise when processing data closer to its source, including device vulnerabilities, network security concerns, and the complexities of managing distributed systems. Examine the critical role of observability in maintaining security posture across edge deployments, with practical insights into monitoring techniques and tools. Follow a detailed case study of an automotive manufacturing plant to see how real-world organizations implement edge security monitoring solutions. Gain actionable knowledge about securing edge devices through proper configuration, access controls, and continuous monitoring practices. Master the implementation of comprehensive monitoring and observability frameworks specifically designed for edge environments, including best practices for data collection, analysis, and alerting in resource-constrained edge scenarios.
Syllabus
00:00 Introduction and Speaker Background
00:36 The Rise of Edge Computing
03:22 Security Challenges in Edge Computing
08:10 Importance of Observability
10:14 Case Study: Automotive Manufacturing Plant
11:25 Securing Edge Devices
15:53 Implementing Monitoring and Observability
18:12 Conclusion and Final Thoughts
Taught by
Conf42