[{"data":1,"prerenderedAt":20},["ShallowReactive",2],{"page--/en-us/resources/blogs/2024/ensuring-security-and-compliance-edge-computing":3,"sidebar-links-3de08d4d-aabd-01e8-9aeb-ab4788e50194":17},{"path":4,"slug":5,"type":6,"codename":7,"itemid":8,"title":9,"subpageCodenames":10,"language":11,"securePage":12,"domainAccessList":13,"secureRoles":14,"seriesLinkedItems":15,"group":16,"seoTitle":9},"/en-us/resources/blogs/2024/ensuring-security-and-compliance-edge-computing","ensuring-security-and-compliance-edge-computing","blog_page","ensuring_security_and_compliance_for_infrastructur","2382118c-2218-47bb-abd4-f28fd8a8c8c6","Ensuring Security and Compliance for Infrastructure at the Edge",[],"en-us",false,[],[],[],null,["Map",18,19],"warranties","/en-us/resources/product-information/warranties",1776764444889]