ZEDEDA makes edge computing effortless, open, and intrinsically secure - extending the cloud experience and agility to the edge. ZEDEDA reduces the cost of managing and orchestrating distributed edge infrastructure and applications, while increasing visibility, security and control.
There is an explosion of data at the edge, resulting from more connected devices, machines, sensors and applications. Moving these massive amounts of data to the cloud for processing is impractical given the operational cost (bandwidth, latency, autonomy, security and privacy) and potential short half-life of the data. The only way to get value from this data is by processing it at the edge. Given the scale of edge computing, there is a need to centrally manage and orchestrate nodes, security and applications.
ZEDEDA delivers an open, distributed, cloud-native edge management and orchestration solution, simplifying the security and remote management of edge infrastructure and applications at scale. ZEDEDA is delivered as a service and includes 24/7/365 support for the open source EVE-OS. ZEDEDA is available to enterprise customers, SIs and OEMs, with flexible deployment options.
ZEDEDA ensures extensibility and flexibility by utilizing an open partner ecosystem with a robust app marketplace. ZEDEDA leverages an open architecture built on EVE-OS, from the Linux Foundation. EVE-OS is a lightweight, open-source Linux-based edge operating system, with open orchestration APIs.
What problem do we solve?
Edge environments have significant local processing requirements, and it is costly and difficult for the cloud to meet these requirements at scale, given the availability of bandwidth in these distributed environments
Edge/remote apps (and environments) are cumbersome and expensive to manage
Apps require constant updating, and the need is to continuously develop and deploy apps at the edge just like in the cloud ⇒ especially when we talk about new applications related to AI, inference, machine learning, which need massive resources for the training, but only restricted resources for the actual inference.
Security of distributed environments is weak due to a lack of network control and physical perimeter, which is a completely different paradigm than the data center (which is layered with security - both physical and IT).
Many customers have legacy software investments in the field that they can’t just abandon as they invest in new cloud-native applications.
…