Jul 06, 2012
It is possible to secure cloud services, IT firm insistsBack
SECURITY|Africa|Business Connexion|Security|Systems|VMware Northern Europe|VMware South Africa|Africa|Security|Cloud Services|Data Processing|Equipment|Informatiuon Technology|Private Networks|Scaleable Cloud Services|Security|Service|Services|Systems|Virtualisation Equipment|Andrew Brauer|Chris Norton|Infrastructure|Matt Piercy|Power|Security|Informatiuon Technology
© Reuse this
Companies can leverage their own infrastructure, namely servers and computing power, to deploy their own cloud services and link these securely with external, scaleable cloud services when required, while maintaining business control, he says.
“Companies have already invested in people, processes, infrastructure and equipment to deploy and maintain their networks. Further, while cloud services enable easy scalability and cost reduction, the centralised control of private networks is imperative to ensure business compliance, security and accountability,” says VMware Northern Europe VP Matt Piercy.
To meet the disparate demands on informatiuon technology (IT) departments in com- panies, VMware proposes a hybrid cloud model, which entails that companies leverage their IT investments by virtualising their data servers, networks and computing power to deploy a cloud under their control, says Norton.
However, company policies for security of information and data processing should track data into other companies that provide outsourced cloud services. This will ensure that security and control remain high and the business remains compliant with regulatory and shareholder rules, says Piercy.
Service-level agreements stipulating security and access policies can be negotiated with service providers, and international best practice cloud security standards exist, says business IT systems provider Business Connexion chief technology officer Andrew Brauer.
Companies should, however, retain core and critical information and use the cloud for noncore functions, as well as encrypt data, notes Piercy.
Further, lists of identified applications that employees can use would ensure the safe use of internal and unsecured, external applications, such as widely used cloud storage application Dropbox.
“Individual experiences and familiarity drive the uptake of applications, devices and cloud functions in companies. However, the central management of policies and security across platforms and devices is important and possible by using automated and virtualised systems. These policies will encompass the generation and distribution of data, the use of different devices, technologies and applications, as well as accessibility management.
“In the near future, portals and policies will be employed to determine the security and accessibility profile of users, who increasingly demand to be in control of which applications, devices and platforms they use, while also ensuring central IT management and control by the company,” notes Piercy.
Companies will also seek to build and deploy their own applications and there is an increasing demand for self-service portals, which also gives control back to the companies, says Brauer.
“Vendor lock-in is rapidly decreasing and companies must increasingly control software scattered across different virtualisation layers. Expanded policy-driven automation will be employed to enable an IT department to manage this. Back-end functions will also become more automated and policy-driven,” he says.
Virtualisation and cloud services can enable small and medium-size businesses to leapfrog technology gaps, compared with large corporations. Large companies can, however, use cloud services to provide scope for easy expansion or contraction and move from a deterministic capital expenditure model for the deployment of IT systems to a more flexible operating expenditure model, concludes Norton.
Edited by: Martin Zhuwakinyu© Reuse this Comment Guidelines (150 word limit)
Other Business Process Outsourcing News
With the sale of Nashua Mobile's subscriber base now concluded and the unit subsequently closed, parent company Reunert planned to use the cash flows earned from the deal to “explore growth opportunities through investment”. The R1.4-billion profit from the split...
Cape Town is on a drive to strengthen its position as a key business capital in Africa. The Mother City is keen to retain its reputation as a leading tourist destination, but wants to be taken more seriously as a destination for local and international investment...
An undisclosed company has made a play for Blue Label Telecoms, with discussions now under way, the JSE-listed telecommunications group said on Wednesday. In a cautionary announcement to shareholders, Blue Label stated that a nonbinding expression of interest (EoI)...
Recent Research Reports
Liquid Fuels 2014 - A review of South Africa's Liquid Fuels sector (PDF Report)
Creamer Media’s Liquid Fuels 2014 Report examines these issues, focusing on the business environment, oil and gas exploration, the country’s feedstock supplies, the development of South Africa’s biofuels industry, fuel pricing, competition in the sector, the...
Water 2014: A review of South Africa's water sector (PDF Report)
Creamer Media’s Water 2014 report considers the aforementioned issues, not only in the South African context, but also in the African and global context, and examines the issues of water and sanitation, water quality and the demand for water, among others.
Defence 2014: A review of South Africa's defence industry (PDF Report)
Creamer Media’s Defence 2014 report examines South Africa’s defence industry, with particular focus on the key participants in the sector, the innovations that have come out of the sector, local and export demand, South Africa’s controversial multibillion-rand...
Road and Rail 2014: A review of South Africa's road and rail infrastructure (PDF report)
Creamer Media’s Road and Rail 2014 report examines South Africa’s road and rail transport system, with particular focus on the size and state of the country’s road and rail network, the funding and maintenance of these respective networks, and the push to move road...
Real Economy Year Book 2014 (PDF Report)
This edition drills down into the performance and outlook for a variety of sectors, including automotive, construction, electricity, transport, steel, water, coal, gold, iron-ore and platinum.
Real Economy Insight: Automotive 2014 (PDF Report)
This four-page brief covers key developments in the automotive industry over the past 12 months, including an overview of South Africa’s automotive market, trade figures, production and the policies influencing the sector.
This Week's Magazine
South Africa remains an important manufacturing and export platform for Ford Motor Company, says executive chairperson Bill Ford. However, he adds that other countries on the continent are “becoming interesting”, and that the US carmaker is casting its net wider for...
Germany’s Max-Planck-Society (MPG) and the Max-Planck-Institute for Radio Astronomy (MPlfR) are investing €11-million (about R150-million) into South Africa’s MeerKAT radio telescope array programme. The money will be used to design, build and install S-band radio...
Infrastructure spend in sub-Saharan Africa will grow from $70-billion in 2013 to $180-billion by 2025, says PwC capital projects and infrastructure Africa leader Jonathan Cawood. This is one of the findings of PwC’s Capital Projects & Infrastructure report on East...
Private-owned defence and aerospace manufacturer Paramount Group and the Ichikowitz Family Foundation unveiled its Anti-Poaching Skills and K9 Training Academy in Magaliesburg last month.
The inclusion of Bluetooth to provide sub-three meter accuracy and heightened functionality for users is one of the ways to change existing wireless networks into engagement networks. An engagement network differs from common wireless networks in that it enables the...