The following is a list of general industry terms, as well as ZEDEDA-specific terms, which may have a slightly different meaning in the context of configuring the ZEDEDA solution.
| Term | Definition |
| air gapped |
An air-gapped network is physically isolated from the rest of the networks, including from the internet. In ZEDEDA's context, while the ZEDEDA Cloud is internet-connected for management, edge devices can operate in air-gapped environments. This ensures critical operational technology (OT) remains secure, with updates and policies managed through secure, manual transfer methods, enhancing overall security. To learn more about managing your edge nodes in an air-gapped environment, see Edge Sync. |
| AMD64 |
AMD64, also known as x86-64, is a 64-bit processor architecture developed by AMD. It extends the x86 architecture to support 64-bit computing, allowing for more memory and enhanced performance. AMD64 is widely used in desktops, laptops, servers and high-performance computing applications. It provides backward compatibility with 32-bit software while offering the benefits of 64-bit processing, such as increased addressable memory space and improved computational capabilities. This architecture is supported by major operating systems, including Windows, Linux, and macOS.
|
| API-first |
API-first means an application's primary interface is designed around its Application Programming Interface. For ZEDEDA, an API-first approach ensures that all functionalities available through the UI are also accessible programmatically via our API. This allows for seamless integration with existing IT and OT systems, enabling automation of device onboarding, application deployment, and policy management. To try ZEDEDA’s API to configure your network assets, see How to use ZEDEDA API. |
| ARM64 |
ARM64, also known as AArch64, is a 64-bit architecture developed by ARM Holdings. It extends the ARM architecture, allowing for more memory and computational power compared to the 32-bit ARM architecture. ARM64 is designed for high-performance and energy-efficient computing, making it ideal for mobile devices, embedded systems, and servers. It supports a wide range of applications, from smartphones and tablets to data centers and edge computing devices, providing a balanced mix of performance and power efficiency.
|
| attestation | See remote attestation in this glossary. |
| Bash |
Bash (Bourne-Again SHell) is a popular command-line interpreter used on Unix-like operating systems. It provides a text-based interface for users to interact with the EVE operating system, run scripts, and execute commands. Bash is crucial for performing low-level operations, troubleshooting, and custom scripting on edge devices. |
| cluster |
A cluster is a group of interconnected computers or servers that work together as a single unified system. These machines, often called nodes, share computing resources, distribute workloads, and coordinate tasks between themselves. The main purposes of clustering include improving performance through parallel processing, ensuring high availability by providing redundancy if one node fails, and enabling horizontal scalability by adding more nodes when needed. Clusters are commonly used in data centers, cloud computing environments, and enterprise applications where reliability and processing power are crucial. If you are looking to configure a cluster for high availability (HA) and data replication, then you should see Edge Node Cluster Overview. If you are looking to use third-party integration with K3S (Rancher) or TKG (VMware), then you should see Kubernetes Infrastructure Orchestration Overview. |
| configuration drift |
Configuration drift occurs when a system’s actual setup deviates from its intended state, often due to manual changes or unmanaged updates. ZEDEDA combats this by enforcing centralized policies and using its Configuration Lock feature, which compares the current node state to the cloud-defined config and helps bring the node’s configuration back into alignment. This stabilizes deployments, especially during sensitive rollout phases, ensuring edge nodes stay consistent and secure. To learn more, see Configuration Lock. |
| container | Containers are lightweight, standalone software packages that bundle an application with all its dependencies, libraries, and configuration files, enabling it to run consistently across different computing environments. They provide isolation from other applications while sharing the host system's operating system kernel. See Add a Container as an Edge App Type. |
| CRUD | Create, Read, Update, and Delete. This is a set of common commands which can be used by administrators to configure the ZEDEDA environment. The command options should be familiar to most IT professionals. Note that the actions available in the GUI may differ from those in the CLI, with the GUI offering actions such as the following: Add, Monitor, Operate, and Remove. You can use these actions to configure the edge nodes and apps in your ZEDEDA environment. See Enterprise CRUD operations or Roles. |
| Docker |
The Docker platform enables developers to create, deploy, and run applications in containers, which are lightweight, standalone packages that include everything needed to run a piece of software, such as code, runtime, system tools, libraries, and settings. Docker basically standardizes how these containers are built and run, making applications portable and consistent across different environments. Docker is the de facto standard for containerization. While containers existed before Docker, Docker made them accessible and practical for widespread use by providing tools and a standardized format for packaging and running containerized applications. Docker works great for edge computing, since it enables consistent deployment of applications from cloud to edge locations, and the containers are lightweight and start quickly, making them ideal for resource-constrained edge devices. In addition, the same Docker tools and workflows used in cloud environments can be applied to your edge devices, streamlining development and operations. See Docker Compose Overview. |
| Eastbound / Westbound | The terms Eastbound / Westbound describe horizontal communication between components or services that are at the same hierarchical level within the network, data center, or cloud environment. These terms refer to lateral traffic (P2P). For instance, communication between different microservices within a single application, or server-to-server communication in the same tier of a data center, would be considered Eastbound or Westbound. These terms are often used interchangeably. |
| Edge Access | Edge Access is a remote management feature developed by ZEDEDA that provides secure connectivity to edge computing infrastructure through integration with ZEDEDA Cloud. The tool enables remote access, management, and auditing capabilities for edge nodes and the applications running on your edge nodes. The Edge Access feature can operate without requiring any additional infrastructure deployment or local administrative setup for current ZEDEDA Cloud customers. See Edge Access. |
| edge application |
An edge application is software that is created from an edge application image and is available to be deployed on an edge node. After the application has been deployed, it’s called an “edge application instance.” At ZEDEDA, an Edge Application represents the Metadata manifest of the software application. Each edge application comes with its metadata manifest, which is basically a description of the application and a set of instructions for using the application. It’s similar to having a detailed list or a blueprint that explains what the app does, how it should be used, and what it needs to work properly. See Edge Application Overview. |
| edge application image |
An edge application image is used to create an edge application, after which, the edge app instances run on the edge nodes. A more formal definition:
|
| edge application instance |
Put simply, an edge application refers to the actual running app once it’s been deployed on an edge node. Here’s a more comprehensive definition: An edge application instance in ZEDEDA refers to a specific deployment of an application on an edge node. When you select an application from the ZEDEDA Marketplace and deploy it, the edge node downloads and runs the application with defined runtime characteristics such as adapters, networks, and other details. This creates a real, operational instance of the application on the edge node. For example, it's akin to downloading and running an app from the app store on your iPhone. Multiple instances of the same edge application can be deployed across different edge nodes, allowing for scalability and flexibility in edge computing deployments. See Edge Application Instance Overview. |
| edge computing |
Edge computing is the practice of processing data closer to where the data is being generated, rather than sending it to a data center. The benefits of edge computing include: reduced latency, better response times, and enhanced efficiency. Edge computing can be particularly useful for applications that require real-time data processing, such as industrial IoT devices, manufacturing, energy, and retail. Gartner defines edge computing as “part of a distributed computing topology where information processing is located close to the edge, where things and people produce or consume that information.” |
| edge gap |
Edge gap describes the disparity between the perceived potential of edge computing and the practical complexities that often hinder its widespread adoption. This "gap" often arises because hyperscalers (such as AWS, GCP, or Azure) extend their cloud architectures to the edge without fundamentally rethinking them for edge-specific needs, such as limited connectivity, diverse hardware, and stringent security requirements. The resulting edge gap represents the challenge of effectively monetizing AI at the enterprise edge due to these architectural and operational mismatches. To learn more about edge gap, see Monetizing AI at the Enterprise Edge. |
| edge node | An edge node is an edge device with ZEDEDA Cloud system running EVE-OS that has been onboarded to a ZEDEDA project. Prior to onboarding, the device is referred to as an “edge device” and after the device has been onboarded to the cloud, it’s thereafter referred to as an “edge node”. Examples of edge nodes include: IoT gateways, industrial PCs, single-board computers, rack-mount or desktop servers. See Edge Node Overview. |
| edge node cluster | To ensure high availability (HA) and data replication, you can group multiple edge nodes into an edge node cluster. This setup keeps your applications and data accessible even if one node fails, minimizing downtime and allowing for faster recovery from hardware failures. If the primary edge node becomes unavailable (for example, due to failure or disconnection), another node in the cluster automatically takes over, restarting the application and keeping your services running. This process is automatic and requires no intervention from you. See Edge Node Cluster Overview. |
| edge orchestration |
Edge orchestration refers to managing resources at the edge of the network where the data is generated. This can involve automating the deployment, scaling, and maintenance of applications across large fleets of edge nodes. With Kubernetes ZEDEDA provides a seamless, secure, and scalable edge orchestration solution that simplifies the deployment and management of your applications at the edge. See Kubernetes Infrastructure Orchestration - Overview. |
| Edge Sync |
Edge Sync, formerly known as local operator console (LOC), is a tool that helps manage edge nodes when they do not have internet access. It acts as a local controller for the edge nodes, ensuring they can operate smoothly even without an internet connection to the ZEDEDA Cloud. Edge Sync manages configurations and collects runtime metrics from the edge nodes and applications, and is ideal for environments with intermittent connectivity, such as air-gapped networks. Edge Sync relies on the local network (or a metadata server) for connectivity and does not require a direct physical connection to the edge node's ports. See Edge Sync. |
| Edge View |
Edge View provides secure, remote access to your edge devices and applications, allowing you to essentially log in directly to them through a terminal. This can be helpful for troubleshooting and maintenance purposes, since Edge View essentially gives you hands-on control over your edge assets from anywhere. Edge View is implemented as a Docker container, with the Edge View container on the remote device providing the server function and the same container on the user laptop serving as the 'client'. See EdgeView FAQ. |
| enterprise | An enterprise is a complete, discrete set of edge nodes, edge applications, tenants, and an associated ZEDEDA Cloud configuration. Each customer has an enterprise which can be subdivided into logical sub-groups called projects. These logical groupings can help you to manage your devices and foster collaboration between teams. See Enterprise. |
| EVE-k | EVE-Kubevirt, introduced as early-access in 14.5.0 LTS, is being renamed to EVE-k. For example, image names will change from X.Y.Z*-kubevirt-amd64 to X.Y.Z*-k-amd64. EVE-k is a k3s-based EVE-OS variant that enables edge-node clustering and ZEDEDA Edge Kubernetes Service. The standard EVE-OS variant is unchanged and remains the recommended option for deployments not using these capabilities. EVE-k will be generally available in v16.0.0 LTS in November. |
| EVE-OS | EVE-OS is a lightweight, open-source Linux distribution that delivers a robust and secure platform for running virtual machines and containerized applications on edge devices such as IoT gateways, industrial PCs, and rugged field computers. See EVE-OS overview. |
| FDE | Full Disk Encryption (FDE) is a security feature that encrypts all data on a hard drive, including the operating system. This ensures that all information stored on the disk is unreadable to unauthorized individuals, even if the device gets lost or stolen. FDE is crucial for protecting sensitive data on your edge devices, providing a robust layer of security against physical access threats and ensuring data confidentiality. |
| GitOps | GitOps is an operational framework used to automate the management of your infrastructure using a Git repository as the single source of truth. It works by having an automated process that continually ensures the live system's state matches the desired state defined in the repository. GitOps helps improve the speed and reliability of your deployments, providing a complete audit trail for all changes, and enabling faster, more consistent system rollbacks. |
| Helm Chart | A Helm Chart is the packaging format used by Helm, the package manager for Kubernetes. It bundles the necessary Kubernetes resource definitions, configurations, and dependencies required to run your apps into a single, manageable package. This approach simplifies the process of installing, upgrading, and sharing complicated applications, ensuring deployments are consistent and repeatable. |
| immutable | An immutable image or volume cannot be changed after it has been created. If a change is needed, a new version is deployed. ZEDEDA leverages the concept of immutability for enhanced security and reliability of edge applications and operating systems. This prevents tampering and ensures consistent behavior across deployments, simplifying updates and rollbacks. To learn more about immutable volumes, see Volume Instances Overview. |
| instance | An instance is a single running copy of a software application or an operating system. In virtualization, this refers to a virtual machine (VM) or container that operates independently within its own environment. It utilizes shared resources like CPU, memory, and storage. In the context of edge computing, an instance represents an application running on an edge device, such as an edge node or gateway. These instances process data close to the source, reducing latency and improving performance. See edge application instance in this glossary. |
| jobs |
A job in ZEDEDA parlance is a group of tasks that are triggered by any bulk operation, such as deploying multiple app instances. The task(s) are executed as part of the process of managing and configuring edge devices. Jobs can include actions like installing software, updating EVE-OS, or deploying an application. Jobs are tracked by ZEDEDA, so you can monitor their progress and ensure that everything is running smoothly. Bulk tasks, such as deploying many apps at once, or doing a big EVE-OS update, will end up creating a single job that has a bunch of tasks in it. Jobs are always sorted so the latest one is at the top, as viewed from the GUI. See Jobs. |
| k3s |
Kubernetes built for the edge (K3S) is a highly available, Kubernetes distribution designed for production workloads in unattended, resource-constrained, remote locations or inside IoT appliances. You can provision and manage the K3S (Rancher) or TKG (VMware) infrastructure at the distributed edge, using zero-touch provisioning capabilities of ZEDEDA Cloud and zero-trust operating system built for the edge, the EVE-OS. |
| k8s |
Kubernetes (k8s) is an open-source platform that automates the deployment, scaling, and management of containerized applications. It simplifies the operation of containerized workloads by organizing containers into logical units for easy administration and discovery. |
| kubectl |
kubectl is the primary command-line tool used to interact with Kubernetes clusters. It provides a CLI that allows you to deploy apps, inspect nodes, and manage the overall state of the cluster. kubectl is crucial for performing deployments, troubleshooting workloads, and managing the health of a cluster. |
| Kubernetes |
Kubernetes is an open-source orchestration system that simplifies the process of managing and scaling fleets of software apps in containers. In the context of edge computing, (K8s, as it is sometimes abbreviated) offers a way to manage a bunch of edge node apps running on your edge nodes at the edge of a distributed edge network. These apps could be used to manage machines on a factory floor, wind turbines in the field, or even fleets of rented autonomous vehicles. Kubernetes helps you deploy and manage these applications easily, even if the devices are in remote locations and far from any datacenters. Kubernetes offers early adopters a way to make sure everything in their factory is running smoothly and securely, without the need to have an on-site technician monitoring operations every day. |
| LF Edge |
LF Edge is an open source framework governed by the Linux Foundation that provides edge computing infrastructure and tools. It includes a sandbox environment, powered by ZEDEDA and EVE-OS (a Linux-based operating system), that enables developers to quickly test and deploy edge applications. The platform facilitates rapid proof-of-concept (PoC) development and testing of edge computing solutions through its Marketplace, remote management capabilities, and application orchestration features. LF Edge creates a common framework of hardware and software standards for IoT and edge devices, and other notable members include Intel, Ericsson, and Samsung. See LF Edge. |
| Local UI |
The Local UI feature provides a direct, on-device interface for monitoring and basic management of edge nodes. You can use Local UI by physically connecting a keyboard and monitor to your device to help diagnose issues, view the status of the edge apps, and manage network settings. If any errors or issues are detected, the Local UI interface displays possible causes, along with suggestions for remediation to help troubleshoot misbehaving nodes out in the field. This can be especially helpful when your edge nodes become disconnected from the ZEDEDA Cloud Controller. |
| Marketplace |
The ZEDEDA Marketplace is an online store for edge computing apps and solutions. You can go here to find a variety of software applications that have been pre-tested and which are ready to go. These apps are made by various tech companies (ZEDEDA partners) and they have been designed to work well with the ZEDEDA platform. So, in short, the Marketplace offers a convenient place for businesses and developers who want to be able to quickly set up and manage their edge computing projects without having to build everything from scratch. See Import Models to Enterprise. |
| measured boot |
Measured boot is a security process that cryptographically measures each component of the boot process before it executes, from the firmware to the operating system. These measurements are stored in a secure hardware component, like a Trusted Platform Module (TPM). This creates an unchangeable record, allowing for remote attestation to verify the integrity and trustworthiness of an edge device's boot state. For more details, see Factors Affecting PCR[1]. |
| network | A network, which is different from a network instance, handles the routing of traffic for edge node hardware that allows it to pass along traffic to and from ZEDEDA Cloud for management purposes, just as one possible example. See Network Overview. |
| network instance |
Network instances provide the virtual network environment for edge applications. Ultimately, a network instance is a virtual subnet maintained by EVE-OS. Network instances can be completely internal to the edge node or can be attached to external interfaces. They can also provide services such as DHCP, NAT, and DNS to edge applications. See Use the ZEDEDA CLI to Manage a Network Instance. |
| Northbound / Southbound |
The terms Northbound / Southbound describe the vertical communications in a network. Northbound refers to data or commands flowing up from network devices (like routers, switches, or edge nodes) to a higher-level controller or management system (for example, a cloud platform). Conversely, Southbound describes commands or configurations flowing down from the controller or management system to individual network devices to manage or program them. |
| Offline Profile Server | Offline Profile Server (OPS) is a ZEDEDA feature that allows you to manage edge applications even when the edge node is offline. You can deploy or stop edge devices, as well as perform other actions when the management interface is down. This lets you manage applications directly from the edge device even without a live connection to ZEDEDA Cloud. Only application instances that are part of a profile can be managed through the OPS feature, and app instances that are not in the profile cannot be managed this way. See Offline Profile Server. |
| onboarding | Edge Node onboarding refers to the process of integrating a new edge device into an enterprise's ZEDEDA environment. The EVE-OS (Edge Virtualization Engine Operating System) must be installed on the device as a prerequisite, but this is just the first part of the process. During onboarding, the edge node receives a project association, security credentials, management policies, and network settings. This process ensures secure integration of edge nodes while maintaining enterprise security policies and management requirements. See Onboard an edge node to ZEDEDA Cloud. |
| project |
A project is a logical grouping of one or more edge nodes, as well as the edge apps, and deployments. It's like having a logical container that groups together related in order to make them easier to manage. Key points include:
While an enterprise can have several projects, each edge node can only belong to one project. See project under "Concepts related to Edge Nodes". |
| remote attestation |
Remote attestation is a security mechanism that enables a system to verify the integrity and authenticity of a remote hardware device, such as an edge node. The remote attestation process allows a trusted authority to validate that a remote device is in an expected state, meaning that it has a specific version of software running, or certain configuration settings, or security policies. The process ensures the device has not been tampered with. During remote attestation, the remote system provides cryptographically signed evidence of its current state, including hardware configuration, firmware, operating system, and a list of software applications that are running. The hardware security feature, Trusted Platform Module (TPM), ensures that the attestation process itself has not be compromised in any way. See Remote Attestation Overview. |
| remote orchestration |
This is the process of managing and controlling edge nodes and apps from a remote location, typically through ZEDEDA Cloud. See Orchestration Overview under “Kubernetes Infrastructure Orchestration - Overview”. |
| SBC | Single Board Computer (SBC), is a fully functional computer that’s built onto a single circuit board, like the Raspberry Pi. An SBC typically includes a processor, RAM, storage interfaces, USB, video output, and network connectivity. SBCs are designed to be low-cost and smaller in size, and they are widely used in education, IoT, and edge computing. The Raspberry Pi, for example, brought SBCs into the mainstream by offering an accessible platform for learning and prototyping. |
| shell |
A shell is a command-line interface program that serves as an intermediary between the user and the OS kernel. The shell executes user commands, manages processes, handles input/output redirects, and provides scripting capabilities. The shell parses command syntax, launches programs, manages environment variables, and facilitates file system navigation. Examples of popular shells include Bash, Zsh, and PowerShell. In short, the shell provides a text-based environment where you can interact with system resources to run applications and automate tasks. |
| SSH | SSH, or Secure Shell, is a cryptographic network protocol for operating network services securely over an unsecured network. It's widely used for remote command-line login and secure file transfers. ZEDEDA leverages SSH to provide secure remote access to edge devices for troubleshooting and maintenance, ensuring all communications are encrypted and authenticated. To learn more about using SSH to access your edge nodes, see How to Enable and Disable SSH for an Edge Device. |
| storage | Storage, in the context of ZEDEDA, refers to how data is saved and managed on the edge devices. This includes storing image data, application data, and other necessary information for running applications on the edge. ZEDEDA provides persistent storage that remains even when the applications are not running, as well as transient storage that is tied to the lifecycle of an application. See Storage Overview. |
| systemd | systemd is a system and service manager for Linux that initializes and controls processes after the kernel boots. In ZEDEDA-managed environments, systemd ensures that EVE-OS services and edge apps start reliably, manage their lifecycles, and recover gracefully from failures. |
| TKG |
Tanzu Kubernetes Grid (TKG) is a Kubernetes solution for larger scale integrations with VMware products. It has been specially designed to work well in hybrid and multi-cloud environments. See k3s in this glossary. |
| truck roll | A truck roll refers to dispatching a technician to a physical edge site, like a factory floor or IoT installation, for maintenance, troubleshooting, or upgrades. ZEDEDA minimizes these costly visits through Zero Touch remote management, enabling centralized control and updates without on-site presence. See Seamlessly Deploy Kubernetes at the Edge. |
| Trusted Platform Module | While trusted platform module (TPM) is not a ZEDEDA-specific term, it’s an international standard for the security chips used in edge devices to store cryptographic keys. The TPM performs security tasks such as generating and managing crypto-keys, checking system integrity, encrypting data, authenticating devices, and assisting in remote attestation for edge devices. Having a TPM on your edge device is like having a secure vault that keeps your sensitive information safe and helps ensure the edge nodes have not been tampered with. See Overview of the Trusted Platform Module (TPM) in EVE-OS. |
| user agent | User agents are the primary interfaces available to access and control the edge devices in your ZEDEDA deployment. The user agents allow you to access the ZEDEDA platform to manage and monitor your edge infrastructure. The following user agents are currently supported:
|
| virtualization |
Virtualization refers to the process of creating a software-based (or "virtual") representation of various computing resources, such as servers, storage devices, networks, or operating systems. It enables multiple virtual instances to run on a single physical hardware platform, allowing for more efficient use of computing resources. A hypervisor manages these virtual instances and ensures they remain isolated from each other while sharing the underlying hardware. |
| volume instance |
A volume instance handles data storage on the edge nodes. It can retain image (binary) data or (runtime) application data. Some volume instances are persistent and keep their data even after the edge applications using them have stopped. Other volume instances are temporary and only store data while the application is running. See Volume Instances under “Storage Overview”. |
| x86 |
See AMD64 in this glossary. |
| ZCLI | ZEDEDA CLI (ZCLI) is a command-line interface for interacting with ZEDEDA Cloud. Access is also available using the ZEDEDA GUI and ZEDEDA API. Note that Docker Desktop must be running before you can start using ZCLI. See ZEDEDA CLI Overview. |
| ZedCloud | This term has been deprecated. The new name for ZedCloud is ZEDEDA Cloud. (See “ZEDEDA Cloud” in this glossary) |
| ZedControl | This term has been deprecated. The new name for ZedControl is ZEDEDA GUI. (See “ZEDEDA GUI” in this glossary) |
| ZEDEDA Cloud | ZEDEDA Cloud is a suite of ZEDEDA-managed microservices that orchestrates EVE-OS nodes. ZEDEDA Cloud is a cloud-native, SaaS platform that provides orchestration and management for edge computing environments and helps simplify the deployment and management of edge devices. You can interact via graphical user interface (GUI), command line interface (CLI), or application programming interface (API). See Onboard an edge node to ZEDEDA Cloud. |
| ZEDEDA Cloud Terraform Provider |
The ZEDEDA Provider helps you automate and manage your edge nodes and other resources. It offers an alternative way to configure your nodes, without having to use the ZEDEDA’s GUI and ZCLI. But just a heads up, it’s only for managing configs and not for monitoring. The ZEDEDA Provider talks with Terraform Core and ZEDEDA Cloud by sending commands (RPCs) to the provider. In turn, the provider chats with ZEDEDA Cloud, which sends replies through the provider to Terraform. See ZEDEDA Terraform Provider. |
| ZEDEDA Edge Kubernetes App Flows |
The ZEDEDA Edge Kubernetes Solution is made up of the ZEDEDA Edge Kubernetes Service and the ZEDEDA Edge Kubernetes App Flows. ZEDEDA Edge Kubernetes App Flows can be used for fleet management and GitOps app management. See
|
| ZEDEDA Edge Kubernetes Service |
A ZEDEDA Edge Kubernetes Service cluster is the “engine” for running a set of one or more interconnected edge nodes that work together to run containerized applications. See |
| ZEDEDA GUI |
The ZEDEDA graphical user interface (GUI) is an easy-to-use web application that allows you to interact seamlessly with ZEDEDA Cloud. This interface allows you to manage your resources, monitor activities, and perform various tasks in a more intuitive and visual manner, ensuring that you can efficiently oversee and control your cloud operations without ZCLI. See ZEDEDA Graphical User Interface overview. |
| Zero-Touch Deployments | Zero-touch management simplifies the deployment of edge devices by automating the assignment of policies and the deployment of applications. Zero-touch management uses tagging to match edge nodes with their corresponding applications and policies, enabling automated deployments with minimal administrative overhead. See Zero-Touch Deployments overview. |
| zero trust edge security policy | The Zero Trust security model flips traditional security on its head. Instead of trusting anything inside your network, it treats every access request as suspicious, regardless of whether that request originated from inside or outside your network. All requests are treated as suspicious, regardless of where they came from. Zero Trust continuously verifies the identities of users and devices, and validates device health, restricting access to the bare minimum needed to complete a task. Networks are segmented into secure segments, and all data is encrypted end-to-end. The core idea is simply that nothing should be trusted, and everything should be verified, making it much harder for attackers to move around in your network if they manage to gain access. See blog Zero Trust Orchestration for the Distributed Edge. |