ChannelLife New Zealand logo
Industry insider news for New Zealand's technology resellers
Story image

Aruba research: Value from data depends on the edge

Fri 6 Nov 2020
FYI, this story is more than a year old

The ability of organisations to realise business value from data increasingly depends on their capacity to collect, process, store and analyse it at the edge, suggests new research from HPE’s Aruba.

According to the global study of 2,400 IT decision-makers (ITDMs), 72% of Australian ITDMs are already actively using edge technologies to deliver new outcomes, with another 16% planning to do so in the next year. 

There is also a growing recognition (78%) of the urgency around the need to implement integrated systems to handle data at the edge.  

Moreover, the maturity of a company’s deployment at the edge is strongly correlated with its ability to derive value from the data collected from devices. 

Globally, 78% of ITDMs in production deployment with edge technologies said they were in a position to use this data to improve business decisions or processes. 

That compares with just 42% of ITDMs who are only at the pilot stage and 31% who are planning pilots in the next year.   

“With massive volumes of data generated from user and IoT devices, this research shows that Australian IT leaders are seeking better ways of handling and learning from their data at the edge. Companies today need an edge infrastructure that unifies all network domains into a single management pane, automates and self-heals network issues, as well as monitors all devices on the network to ensure they remain secure," says Aruba APAC solutions and systems engineering product director Mark Verbloot.

"Harnessing insights at the edge is an opportunity for businesses to revolutionise their approach to data and unlock its value. Backed by an AI-based problem resolution to automatically and continuously optimise network performance, organisations can process, store and analyse data at the edge and will be able to use that data to develop innovative products, services and experiences that will not only augment but transform their offerings for customers and employees." 

The survey findings form part of a report entitled, At the Edge of Change: Navigating the New Data Era, that assesses the implications of the shift in data processing from cloud to edge, how ITDMs are responding to this trend, the opportunities the edge presents for a number of major industries and the critical role networking plays in this transformation.

Key findings reveal

Drowning in data

The benefits of edge technologies are becoming increasingly important as ITDMs grapple with the growing amounts of data generated within their networks and look towards the cost and latency advantages of storing and processing it at the edge.

  • 34% of Australian ITDMs said “there is too much data for our systems to handle” and 32% stated that “we don’t have a way to integrate so many different data formats.”
     
  • Locally, over a quarter also highlighted problems with poor data quality (30%), ability to quickly process data in order to take decisive action (30%) and not possessing the skills to analyse the data/build and deploy analytical models (27%).
     
  • More than half (58%) of ITDMs in Australia recognise “serious issues faster” as a result of optimising machine learning and Artificial Intelligence (AI) on their networks. 

Efficiency, new experiences rank at top

ITDMs cite a variety of benefits from capturing and analysing data at the edge, from operational efficiencies to the opportunity to create new products, services and revenue streams.  

  • 57% of Australian ITDMs highlighted “improving workforce productivity” as one of the biggest benefits of capturing and acting upon data from user devices, closely followed by 56% citing “improved operational efficiency and costs”.
     
  • In parallel, 49% of Australian respondents believe the data increases security measures, 44% cited the opportunity to improve agility and 44% highlighted the potential for personalised service delivery.
     
  • ITDMs are focused on utilising the edge to improve safety, visibility and customer experience. By sector in Australia, the most popular edge use cases were allowing secure machine, employee, and contractor access over one commonly shared network in industrial (88%), allowing payment via multiple devices in retail (60%) and improving campus safety with location-aware and IoT solutions in education (50%).

Cost, skill and security concerns

While ITDMs show a growing interest in processing and analysing data at the edge, they are also concerned about various barriers to adoption.

  • 37% of Australian ITDMs pointed to a lack of agility in current IT systems and difficulty integrating with legacy technologies with regard to edge technologies as top concerns.
     
  • Locally, analytic skills (44%) ranked highest in terms of areas of expertise that companies are lacking, closely followed by the need of AI and Machine Learning skills (38%) in order to unlock and maximise the true value of data.  |
     
  • Overall, there were mixed feelings about the security implications of the edge. While 66% of Australian ITDMs said that connecting IoT or user devices at the edge had made or would make their businesses more vulnerable, 49% identified improved security as one of the biggest benefits of capturing data from user devices.

Edge to cloud

As businesses continue to increase their dependence upon data, it is critical that it is analysed and processed at the source of collection reliably and securely. Traditional network architectures and operational processes built to support the cloud and mobility era need to adapt to these new requirements.

As organisations move ahead to build an edge infrastructure, there are a few key concepts to keep in mind for a successful implementation:

  • Unify – The edge incorporates all network domains including wired, wireless and SD-WAN; and all locations including Campus, Branch, Data Center and Remote Worker environments. Network operations teams should only consider solutions that can manage all domains and locations from a cloud-native, single pane of glass that can centralise and correlate all cross-domain events and operations.
     
  • Automate – Network uptime and performance are critical at the edge. Network operations teams should only consider solutions that provide reliable, highly accurate and specific AI-powered insights, and automation that can resolve issues more quickly – before they impact the business or users.
     
  • Protect – The proliferation of IoT devices generating the data that fuels new business outcomes also presents new security challenges. Network operations teams should consider solutions that use AI to detect, classify and continuously monitor these devices and work seamlessly with access control solutions to automatically place devices in centralised policies that ensure they remain secure and only communicate with predetermined resources.
Related stories
Top stories
Story image
Red Sift
Entrust expands strategic partnership with Red Sift
Entrust has expanded its strategic partnership with Red Sift to make it easier for businesses to adopt Brand Indicators for Message Identification (BIMI) standards for email identification and security.
Story image
Phishing
Vishing attacks reach all time high - Agari and PhishLabs
"Hybrid vishing campaigns continue to generate stunning numbers, representing 26.1% of total share in volume so far in 2022."
Story image
Hybrid Cloud
Barracuda expands cloud-native SASE platform
"The expansion of Barracuda's cloud-native SASE platform for hybrid deployment models and IIoT environments solves a number of challenges."
Story image
Cybersecurity
 Asia Pacific plagued by sophisticated bad bots - report
The three most common bot attacks were account takeover, content or price scraping, and scalping to obtain limited-availability items.
Story image
Cloud Security
Aqua Security createa unified scanner for cloud native security
“By integrating more cloud native scanning targets into Trivy, such as Kubernetes, we are simplifying cloud native security."
Story image
Sustainability
Legrand unveils Nexpand, a data center cabinet platform
Legrand has unveiled a new data center cabinet platform, Nexpand, to offer the necessary scalability and future-proof architecture for digital transformation.
Story image
Ransomware
CERT NZ releases first Cyber Security Insights for 2022
CERT NZ has released Quarter One: Cyber Security Insights 2022, which offers an overview of reports about cybersecurity incidents affecting New Zealanders.
Story image
Sony
Sony launches LinkBuds S - the latest model in the series
Sony says the LinkBuds S will give users a unique sound experience through sensor and spatial sound technology, even in AR games.
Story image
Manhattan Associates
Shortening the click-to-customer cycle through smart technologies
Speed of delivery without accuracy is a dealbreaker for consumers. How can retailers operating in an omnichannel environment overcome the challenge of click-to-customer cycle times.
Story image
Training
Delinea enhances partner experience with new training initiatives
Delinea has announced a range of training and certification initiatives to help scale the capacity of VARs, System Integrators, MSPs and MSSPs to meet the demand for PAM solutions.
Story image
Gaming
Hands-on review: WD_Black SN770 NVMe SSD Game Drive
Western Digital expands its WD_Black range of NVMe solid-state drives with the WD_Black SN770 Game Drive.
Story image
Vectra AI
Vectra’s inaugural Partner of the Year Awards revealed
APAC companies Baidam, Firmus, ShellSoft and Macnica have been recognised in Vectra AI's inaugural Partner of the Year Awards.
Story image
Ransomware
Alarming surge in Conti Ransomware Group activity - report
A new report has identified a 7.6 per cent increase in the number of vulnerabilities tied to ransomware in Q1 2022.
Story image
Digital Transformation
Pluralsight and Ingram Micro Cloud team up on cloud initiative
Pluralsight has teamed with Ingram Micro Cloud to build upon cloud competence and maturity internally, and externally support partners’ capabilities.
Story image
Cybersecurity
Cybersecurity prompts upgrade for 1.3 billion electricity meters
ABI Research finds Advanced Metering Infrastructure (AMI) and cybersecurity concerns are prompting the upgrade of 1.3 billion electricity meters by 2027.
Story image
Cybersecurity
Comcast to use ThreatQuotient for cybersecurity operations
Comcast, the parent company of NBC Universal and SKY Group, has chosen ThreatQ Platform and ThreatQ Investigations to meet their cybersecurity needs.
Story image
Lightspeed
Lightspeed launches all-in-one marketing platform in A/NZ
ECommerce provider, Lightspeed has launched a new all-in-one marketing solution, Lightspeed Marketing & Loyalty in Australia and New Zealand.
Story image
Training
Infosec unveils role-guided cybersecurity training roadmaps 
Infosec Skills Roles maps hands-on training and certifications to the 12 most in-demand cybersecurity roles to maximise training efficiency.
Story image
Omnichannel
Lexmark launches A/NZ first with retail publishing solution
Lexmark, a global imaging and IoT solutions leader, launched its Publishing Platform for Retail (PPR) in Australia and New Zealand.
Story image
SaaS
Maintaining secure systems with expectations of flexible work
Most office workers feel they've proved they can work successfully from home, and as much as employers try, things aren't going back to the way they were anytime soon.
Story image
Ransomware
APAC ranks third-highest region targeted by ransomware
Asia Pacific has ranked the third-highest region globally to be targeted by ransomware, according to cybersecurity firm Group-IB.
Booster
Booster Innovation Fund. A fund of Kiwi ingenuity – for Kiwi investors.
Link image
Story image
Employment
Tech job moves - Forcepoint, Malwarebytes, SolarWinds & VMware
We round up all job appointments from May 13-20, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Wireless
Hands-on review: Technics EAH-A800 Noise Cancelling Wireless Headphones
Designed in Osaka, Japan, these headphones just exude quality. They aren’t heavy, but they feel well built and solid.
Story image
Cybersecurity
NCSC advisory highlights poor security configurations
The GCSB's National Cyber Security Centre (NCSC) has released a cyber security advisory identifying commonly exploited controls and practices.
Story image
Digital Signage
MAXHUB's Digital Signage range to bolster boardroom productivity
The new MAXHUB Digital Signage technology is purpose-built to make every kind of team meeting more effective.
Story image
Artificial Intelligence
SAS announces new products amid cloud portfolio success
Analytics and AI company SAS is deepening its broad industry portfolio with offerings that support life sciences, energy, and martech.
Story image
Silver Peak
The path to an adaptive, modern network
Managing and securing the network looks different than it did just two years ago—especially given that most of these networks are made up of multi-generations of infrastructure stitched together over time.
Story image
Data Protection
Barracuda launches new capabilities for API Protection
"Every business needs this type of critical protection against API vulnerabilities and automated bot attacks," Barracuda says.
Story image
Sift
Sift shares crucial advice for preventing serious ATO breaches
Are you or your business struggling with Account Takeover Fraud (ATO)? One of the latest ebooks from Sift can provide readers with the tools and expertise to help launch them into the new era of account security.
Story image
Cybersecurity
Noname Security partners with Netpoleon to target API issues
Specialist API security firm Noname Security has appointed Netpoleon as its distributor in Australia and New Zealand.
Story image
Data Protection
Information management capabilities to meet privacy requirements
Organisations with customers or operations across more than one country face a spate of new and proposed privacy and data protection laws.
Story image
Amazon Web Services / AWS
RedShield leverages AWS to scale cybersecurity services
"Working with AWS gives RedShield the ability to mitigate significant application layer DDoS attacks, helping leaders adopt best practices and security architectures."
Story image
Nozomi Networks
Nozomi Networks, Siemens reveal software integration
Nozomi Networks and Siemens have extended their partnership by embedding Nozomi Networks’ software into the Siemens Scalance LPE local processing engine.
Story image
Artificial Intelligence
Frost & Sullivan recognises Genesys as leader in new reports
Frost & Sullivan has recognised Genesys as a leader in the cloud contact centre market for its robust cloud and digital capabilities.
Story image
Surveillance
Motorola Solutions acquires Videotec S.p.A for security portfolio
Motorola Solutions has acquired Italian ruggedised video security company Videotec S.p.A, along with its portfolio of highly versatile cameras.
Story image
Digital Marketing
Similarweb acquires SEO and rank tracking company Rank Ranger
Digital intelligence company Similarweb, which specialises in analysing web traffic, has acquired Rank Ranger, a market leader in SEO and rank tracking.
Story image
Vectra AI
Understanding the weight on security leader’s shoulders, and how to shift it
Millions of dollars of government funding and internal budgets are being funnelled into cybersecurity to build resilience against sophisticated threats, indicating how serious this issue has become.
Story image
Microsoft
Global cybersecurity insurance market worth $11.5b this year
Future Market Insights finds the cybersecurity insurance market is expected to reach USD$11.5 billion in 2022, growing to $61.2 billion in 10 years.
Story image
Mobility
Tyson Beckford partners with Element Case on new AppleWatch band
Celebrity Tyson Beckford has collaborated with STM Brands' Element Case brand to create a rugged new accessory.
Story image
Cybersecurity
BlackBerry offers Kaspersky replacement cybersecurity for the channel
BlackBerry advises that users of Kaspersky software in Australia and New Zealand undertake a rigorous risk analysis of their current security posture.
Story image
Vodafone
Vodafone NZ buys remaining stake in retail joint venture
Vodafone New Zealand has purchased the remaining 50% stake in the specialist joint venture (JV) with private equity company Millennium Corp.
Story image
ChildFund
ChildFund launches new campaign to protect children online
ChildFund says WEB Safe & Wise aims to protect children from sexual exploitation and abuse online while also empowering them to become digitally savvy. 
Story image
GapMaps
GapMaps Live to improve brand decisions on physical locations
GapMaps has released its latest service GapMaps Live, giving more insights and features to help brands make better decisions about physical locations.