Data processing, analytics, and storage increasingly are taking place at the network edge, close to where users and devices need access to the information. Not surprisingly, edge computing is becoming a key component of IT strategy at a growing number of organizations.\nA recent report from Grand View Research predicted the global edge computing market will reach $3.24 billion by 2025, expanding at a \u201cphenomenal\u201d compound annual growth rate (CAGR) of 41% during the forecast period.\n\nLearn more edge computing\n\nWhat edge computing is and how it\u2019s changing the network\nHow edge networking and IoT will reshape data centers\nOvercoming barriers: An evolutionary approach to edge computing\nNo-latency edge computing will snowball\nLiving on the edge: 5 reasons why edge services are critical to your resiliency strategy\n\n\nOne of the biggest contributors to the rise of edge computing is the ongoing growth of the Internet of Things (IoT). The vast amounts of data created by IoT devices might cause delays and latency, Grand View says, and edge computing solutions can help enhance the data processing power, which further aids in avoiding delays. Data processing takes place closest to the source of the data, which makes it more feasible for business users to gain real-time insights from the IoT data devices are gathering.\nAlso helping to boost the edge market is the presence of high-connectivity networks in regions such as North America.\nEdge computing is used in a variety of industries such as manufacturing, IT and telecommunications, and healthcare. The healthcare and life sciences sector is estimated to see the highest CAGR between 2017 and 2025, Grand View says, because of the storage capabilities and real-time computing offered by edge computing tools that enable the delivery of reliable healthcare services in lesser time. The decision-making process is enhanced as network failures and delays are avoided.\nSupporting edge computing can be challenging for organizations because it involves a lot of moving parts and a change in thinking from the current IT environment dominated by data centers and cloud-based services. Here are some best practices to consider when building a strategy for the edge.\nCreate a long-term edge computing vision\nEdge computing involves a lot of different components, and it requires building an infrastructure with the capacity and bandwidth to ingest, transform, analyze, and act on enormous volumes of data in real time, says Matt Kimball, senior analyst, data center, at global technology analyst and advisory firm Moor Insights & Strategy.\nOn the networking side alone, it means deploying connections from devices to the cloud and to data centers. While companies might have a desire to ramp up their edge infrastructure as soon as possible in order to support IoT and other remote computing efforts, all of this is not going to happen overnight.\n\u201cThink big, act small\u00a0\u2013 meaning map out the long-term vision for edge deployments\u201d but don\u2019t be in a rush to implement edge technologies all over the place right away, Kimball says.\nThe speed at which edge technologies can be rolled out varies based on industry, deployment model, and other factors, Kimball says. But given the rapid pace of innovation in the edge market, \u201cit\u2019s easy to get swayed by technology that is very cutting edge but maybe doesn\u2019t contribute to an organization\u2019s needs,\u201d he says. \u201cSo, map out the vision and execute in small steps that are manageable.\u201d\nAs part of planning the edge strategy, develop a business plan that will help secure a budget.\n\u201cMost organizations say that cost is a top concern \u2013 even above data security,\u201d says Jennifer Cooke, research director, datacenter trends and strategies, at research firm International Data Corp. (IDC). \u201cObtaining budget is difficult and requires a solid plan for how edge IT is going to drive value for the business. Because cost is such a high concern, pay-per-use offerings will become increasingly sought after.\u201d\n\n\n\n\n\nAddress cultural issues: Edge computing involves IT and operations\nPutting processing power at the edge involves not just IT, but operational technology (OT) as well, and these are two separate organizations with different cultures and personalities, Kimball says.\n\u201cThe OT folks are different,\u201d Kimball says. \u201cThese are equally technical folks \u2013 in many cases, more technical \u2013 but focused on things like making sure a water treatment plant is operating properly through Supervisory Control And Data Acquisition (SCADA) process control systems.\u201d\nThese are the systems that make sure valves open at certain times, for example, and environmental conditions are within specified ranges, Kimball says. It\u2019s \u201cIT for the industrial environment. So, processes, tools, and the kinds of technologies deployed and managed are different between the two organizations,\u201d he says.\nBridging the two into one group that manages from the core data center out to the field or shop floor is a big challenge, but one that needs to be addressed. \u201cCulture matters. If an organization can\u2019t converge IT and OT at the organizational level, the convergence of technology will fall short,\u201d Kimball says.\nIT and operational teams must be equal partners, says Daniel Newman, principal analyst and founding partner at Futurum Research, a research and analyst firm. While edge computing is mainly driven by operational teams today, IT teams are responsible for managing these systems in more than two-thirds of enterprises, Newman notes in a 2018 study.\nFor edge computing to grow and increase its overall business value, IT must become more of a strategic collaborator with operational teams. It's not only managing edge computing resources, but also being involved in the long-term strategy, budgeting, and sourcing to ensure these systems are in line with larger, enterprise-wide strategic and transformational initiatives, Newman says.\nFind partners to help with edge computing technology deployments\nMany organizations say they lack the internal skills to support IT at the edge, Cooke says. \u201cFor this reason, we believe that many edge buildouts will happen through partnerships with collocation providers as well as vertical industry solutions through integrators,\u201d she says.\nIDC finds that many organizations are looking for a \u201cone-stop solution\u201d for delivering IT service at the edge. \u201cSystems integrators with vertical market expertise will be sought after to help organizations along their edge journey,\u201d Cooke says.\nFor example, a retail business might want to implement a solution, but is not interested in putting all the pieces together itself. Or it might want to derive insights from data on site at the edge and build the infrastructure to accomplish this, which can be complex.\n\u201cBeyond the software tools to analyze data, the solution needs connectivity as well as compute and storage infrastructure,\u201d Cooke says. \u201cConsiderations such as controlling the physical environment [including temperature and humidity], physical security, and protection of equipment are important considerations as well.\u201d An expert partner can help with all of this.\nDon\u2019t forget about edge computing security\nAs with any other aspect of IT, edge computing comes with its own set of cyber security threats and vulnerabilities. The InfoSec Institute, an organization that provides training for information security and IT professionals, in August 2018 noted a number of security issues related to the edge.\nThese risks include weak passwords for access to devices, which makes them easy targets for attackers; insecure communications, with data collected and transmitted by devices largely unencrypted and unauthenticated; physical security risks, because security is commonly acknowledged to be a low priority in the development of IoT and other edge devices; and poor service visibility, with security teams unaware of the services running on certain devices.\n\u201cIt\u2019s a top-of-mind issue,\u201d Kimball says. \u201cNot just security on the [device]. But security of the data that\u2019s transmitted, security of the servers that sit on the edge and perform the data transformation and analysis, and security of the data as it travels from the edge to the cloud to the core data center.\u201d\nInfoSec Institute recommends actions such as expanding corporate password policies to testing and enforcing strong passwords on edge devices; encrypting the data sent by devices or using virtual private networking (VPN) to encrypt traffic in transit between devices and its destination; taking steps to provide devices with physical security protections; and identifying and securing services provided by devices, including analysis of network logs to identify traffic from unknown devices within an organization\u2019s network perimeter.\nCompanies need to have a security strategy in place to properly secure both IoT and edge computing systems, Newman says, from a physical and logical perspective. That includes data that is processed and remains at the edge.\nPrepare for rapid IoT growth: Edge computing scalabilty required\nFor some sectors such as manufacturing, healthcare, utilities, and municipal government, the growth of the IoT will likely be dramatic over the coming years in terms of the number of connected devices and the volumes of data gathered and processed, so companies will need to build scalability into their edge computing plans.\n\u201cNot only are we anticipating an increase in the overall percentage of data generated at the edge being processed at the edge, but we see an ongoing increase in the volume of data being created throughout the enterprise, and particularly in the intelligent edge of the future,\u201d according to a 2018 Futurum report on the edge.\nAs edge computing expands to support operational IoT devices and data, the implementation of edge computing will make it easier to derive value from new IoT-based data sources, the report says. Without planning for the scalability of storage, data analytics, network connectivity, and other functions, companies will not be able to reap the full benefits of the edge or IoT.