Jul 06, 2012
It is possible to secure cloud services, IT firm insistsBack
SECURITY|Africa|Business Connexion|Security|Systems|VMware Northern Europe|VMware South Africa|Africa|Security|Cloud Services|Data Processing|Equipment|Informatiuon Technology|Private Networks|Scaleable Cloud Services|Security|Service|Services|Systems|Virtualisation Equipment|Andrew Brauer|Chris Norton|Infrastructure|Matt Piercy|Power|Security|Informatiuon Technology
© Reuse this
Companies can leverage their own infrastructure, namely servers and computing power, to deploy their own cloud services and link these securely with external, scaleable cloud services when required, while maintaining business control, he says.
“Companies have already invested in people, processes, infrastructure and equipment to deploy and maintain their networks. Further, while cloud services enable easy scalability and cost reduction, the centralised control of private networks is imperative to ensure business compliance, security and accountability,” says VMware Northern Europe VP Matt Piercy.
To meet the disparate demands on informatiuon technology (IT) departments in com- panies, VMware proposes a hybrid cloud model, which entails that companies leverage their IT investments by virtualising their data servers, networks and computing power to deploy a cloud under their control, says Norton.
However, company policies for security of information and data processing should track data into other companies that provide outsourced cloud services. This will ensure that security and control remain high and the business remains compliant with regulatory and shareholder rules, says Piercy.
Service-level agreements stipulating security and access policies can be negotiated with service providers, and international best practice cloud security standards exist, says business IT systems provider Business Connexion chief technology officer Andrew Brauer.
Companies should, however, retain core and critical information and use the cloud for noncore functions, as well as encrypt data, notes Piercy.
Further, lists of identified applications that employees can use would ensure the safe use of internal and unsecured, external applications, such as widely used cloud storage application Dropbox.
“Individual experiences and familiarity drive the uptake of applications, devices and cloud functions in companies. However, the central management of policies and security across platforms and devices is important and possible by using automated and virtualised systems. These policies will encompass the generation and distribution of data, the use of different devices, technologies and applications, as well as accessibility management.
“In the near future, portals and policies will be employed to determine the security and accessibility profile of users, who increasingly demand to be in control of which applications, devices and platforms they use, while also ensuring central IT management and control by the company,” notes Piercy.
Companies will also seek to build and deploy their own applications and there is an increasing demand for self-service portals, which also gives control back to the companies, says Brauer.
“Vendor lock-in is rapidly decreasing and companies must increasingly control software scattered across different virtualisation layers. Expanded policy-driven automation will be employed to enable an IT department to manage this. Back-end functions will also become more automated and policy-driven,” he says.
Virtualisation and cloud services can enable small and medium-size businesses to leapfrog technology gaps, compared with large corporations. Large companies can, however, use cloud services to provide scope for easy expansion or contraction and move from a deterministic capital expenditure model for the deployment of IT systems to a more flexible operating expenditure model, concludes Norton.
Edited by: Martin Zhuwakinyu© Reuse this Comment Guidelines (150 word limit)
Other Information Technology News
Enterprises can protect their data – even if employees use their own devices for work – using data protection company Check Point’s Capsule system. The system, which enforces partitions on the devices to store data and routes all business communications through a...
Entry-level fleet owners can enjoy increased peace of mind regarding the safety of their large, cross-border vehicle fleets, owing to the cost-effective QIC-SUR global postioning system (GPS) tracking unit. Asset management solutions provider QCIC director Brian...
With the sale of Nashua Mobile's subscriber base now concluded and the unit subsequently closed, parent company Reunert planned to use the cash flows earned from the deal to “explore growth opportunities through investment”. The R1.4-billion profit from the split...
Recent Research Reports
Defence 2014: A review of South Africa's defence industry (PDF Report)
Creamer Media’s Defence 2014 report examines South Africa’s defence industry, with particular focus on the key participants in the sector, the innovations that have come out of the sector, local and export demand, South Africa’s controversial multibillion-rand...
Road and Rail 2014: A review of South Africa's road and rail infrastructure (PDF report)
Creamer Media’s Road and Rail 2014 report examines South Africa’s road and rail transport system, with particular focus on the size and state of the country’s road and rail network, the funding and maintenance of these respective networks, and the push to move road...
Real Economy Year Book 2014 (PDF Report)
This edition drills down into the performance and outlook for a variety of sectors, including automotive, construction, electricity, transport, steel, water, coal, gold, iron-ore and platinum.
Real Economy Insight: Automotive 2014 (PDF Report)
This four-page brief covers key developments in the automotive industry over the past 12 months, including an overview of South Africa’s automotive market, trade figures, production and the policies influencing the sector.
Real Economy Insight: Construction 2014 (PDF Report)
This five-page brief covers key developments in the construction industry over the past 12 months. It provides an overview of the sector and includes details of employment in the sector, infrastructure and municipal spending, as well as insight into companies’...
Real Economy Insight: Electricity 2014 (PDF Report)
This five-page brief covers key developments in the electricity industry over the past 12 months, including details of State-owned power utility Eskom’s generation activities, funding and tariffs, independent power producers and prospects for the sector.
This Week's Magazine
JSE-listed real estate investment trust (REIT) Rebosis Property Fund achieved a distribution growth of 8.1% to 99.45c per linked unit in the financial year ended August 31, despite volatile market conditions.
A low-cost, inflatable incubator won this year’s international James Dyson design award, which aims to encourage and inspire the next generation of design engineers.
The World Bank released its ‘Doing Business 2015: Going Beyond Efficiency’ report last month and ranked South Africa 43 out of 189 global economies for its ease of doing business, with Singapore topping the rankings.
Air Products South Africa officially launched its R300-million Eastern Cape air- separation unit (ASU), at its new manufacturing facility in the Coega Industrial Development Zone (IDZ), earlier this month. It is the second facility that Air Products launched in South...
BMW South Africa (SA) has signed a power purchasing agreement with energy company Bio2Watt. The offtake partnership will bring renewable energy to the carmaker’s Rosslyn plant, north of Pretoria.