free download

Securing the edge: infrastructure, applications and secrets management

Many hybrid solutions have applications running across the edge and a central counterpart running in the central cloud. While these counterparts are equally important for the operational aspects of the application, the security enforcing measures differ a lot between the centralized environments and the more exposed edge.

This calls for new and higher requirements for protecting data living on edge infrastructure, and in this white paper, you’ll learn how to master your security posture at the on-site edge.

WHAT WE DO

Simple, secure, and scalable container management in 10s, 100s, or 10 000s of on-site locations

If you’re planning to operate applications in many locations, tooling originally built for the cloud won’t help you achieve efficient management and operational excellence.

Avassa provide an application management and operations platform for your on-site edge. We make edge management and orchestration easy and offer unique, purpose-built functionality for distributed edge environments.

why edge?

There is no turning back.
You need to move at the speed of software.

Enterprises expect feature velocity according to expectations set by the central cloud. While you may have moved significant parts of your applications to one of more public clouds, many of your application components will run much better at the edge. This, however, should not limit your ability or speed for innovation. With Avassa, you can increase efficiency, and lower your overhead costs related to edge application management.

HOW IT WORKS

Be up and running faster than you can say edge application orchestration

Setting up new sites is a breeze when you bring the Avassa Edge Enforcer agent into play. Imagine a handy container that takes charge of all the local container runtime on your hosts. It acts like an agent, handling everything from making sure your containers play nice together to securing data.

Installing the Edge Enforcer is as straightforward as it gets, thanks to its automated and zero-trust architecture that avoids the hassle of manual and host-specific setups. Once in place, call home to their Control Tower, and receives all configurations and keys they need to keep data safe and sound, not just for the site, but for all its users.

The next step is to craft the blueprint of your containerized application in an application specification. These specifications come in the well-known forms of YAML or JSON, letting you configure them using exsiting CI/CD tooling, oris for a more hands-on approach, through the Control Tower’s web interface.

When it’s time to decide where your application should operate, you use application deployment specifications. This is a comprehensive way to tell the system where (in which sites) a specific application should operate. With a bit of simple matching language magic, you can specify where and under what conditions—think location, hardware specs, or how much resources you’ve got available—your application is placed only where it makes sense and provide value.

Once your applications are deployed, keeping an eye on their health becomes crucial, and sometimes, you need to dig into the forensics of incidents that may occur. Every container in your deployment is under constant surveillance by the platform, ensuring everything runs smoothly not just at the container level but also through optional health checks tailored to your application’s unique needs. When things go sideways, the system doesn’t just throw alerts at you; it tells you exactly which container is down which application it’s a part of, and where it’s located. This way, you’re not just getting a warning; you’re getting a roadmap to the problem.

Diving into observability. With distributed log queries, you can pull up the historical data or catch the live action from wherever your operations are spread out. You’re not drowning in data; you’re strategically filtering by time, what’s in the logs, where it happened, and more, so you’re only ever dealing with information that directly ties back to whatever challenge you’re facing right now.

WHAT MAKES US DIFFERENT?

Opinionated and user-friendly

We don’t overcomplicate things. With Avassa, it’s easy to deploy containerized applications across large-scale edge clouds in a few clicks.

Distributed security
you can trust

We built our platform on zero-trust with a layered security model across sites and tenants, and eliminated any time-consuming manual work.

Application-centric operations

Our platform was built with the needs of application operations at the forefront, freeing you from the massive complexities associated with infrastructure-centric solutions.

Our solution works well with

Recent resources

edge

DIVE INTO THE DETAILS

Looking for our platform documentation?

Deepdive into the details of how our solution works in our platform documentation.

SWEET TALKING

Don’t just take our word for it

LET’S KEEP IN TOUCH

Sign up for our newsletter

We’ll send you occasional emails, and you can opt-out at any time.
By clicking the button you agree to our Privacy Policy.

GET TO KNOW US

We are Avassa

Avassa empowers businesses to bridge the gap between modern containerized applications development and operations and the distributed edge infrastructure. Based in Stockholm, Sweden, Avassa was founded in 2020 and is a privately held company funded by Fairpoint Capital and Industrifonden.