TPU Inference Servers for Efficient Edge Data Centers - DOWNLOAD

HUB Security, Trilogy Networks bring Zero Trust edge security to Rural Cloud Initiative

HUB Security, Trilogy Networks bring Zero Trust edge security to Rural Cloud Initiative

Hub Security recently announced a partnership with Trilogy Networks to join the Rural Cloud Initiative (RCI), a unique coalition of over 70 network, technology and applications providers committed to promoting and accelerating the digital transformation of rural America.

“Rural America represents the home of the majority of advanced technology assets associated with critical infrastructure like the oil and gas industry,” explains Eyal Moshe, Hub’s CEO. “These networks have never had more significant security exposure than today. Critical to both commercial and national security these networks require new, innovative and extremely secure security paradigms and platforms. Next-generation applications and services offered by 5G, AI, and the Internet of Things will bring massive operational and economic advantages to the rural markets, but further drive the concern. Securing the edge of the network is paramount which is why we are so excited to work with Trilogy and the RCI.”

“Agriculture and its two million U.S. farms are increasingly using these emerging technologies to drive autonomous trackers, drones for observation or spraying, automated irrigation further defines the need for secure, cloud native edge networks and underscores the value of working with the RCI,” adds Andrey Laremenko, CTO of HUB.

“HUB security’s zero-trust confidential computing approach for edge computing will deliver protection to support these critical assets,” notes George Woodward, Trilogy CEO. “Building security into the edge, allows for a robust, fast, high performance, cloud native network allowing industry to capitalize on the value of these emerging technologies while minimizing the opportunity for catastrophic attacks. This relationship represents a winning combination to the RCI and the rural markets.”

The recent ransom attack on the Colonial Pipeline that forced the closure of the main fuel artery in the Eastern US resulted from a single compromised password. Likewise, an attack on a Florida water treatment plant earlier this year aimed to adjust chemicals to dangerous concentrations, underscoring cybersecurity requirements throughout every element in the network.

Article Topics

 |   |   |   |   |   | 

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Featured Edge Computing Company

Edge Ecosystem Videos

Latest News