Security Requirements for Deploying MEC at Scale

Asset Type
Owning partner

Added

26 Feb 2019

The idea of Multi-access Edge Computing (MEC) as an evolution or extension of the edge of the network is now starting to see real commercial traction. The value proposition is well understood within the telecom operator community; now the challenge is to sell MEC to the enterprise.

To sell and deploy MEC successfully, operators and enterprises need an understanding of what it provides from a security standpoint. This whitepaper provides industry partners with high-level insight and guidelines.