http://www.engineeringnews.co.za
  SEARCH
Login
R/€ = 14.15Change: 0.05
R/$ = 11.58Change: -0.02
Au 1195.87 $/ozChange: -1.05
Pt 1197.50 $/ozChange: 0.00
 
 
Note: Search is limited to the most recent 250 articles. Set date range to access earlier articles.
Where? With... When?








Start
 
End
 
 
And must exclude these words...
Close Main Search
Close Main Login
My Profile News Alerts Newsletters Logout Close Main Profile
 
Agriculture   Automotive   Chemicals   Competition Policy   Construction   Defence   Economy   Electricity   Energy   Environment   ICT   Metals   Mining   Science and Technology   Services   Trade   Transport & Logistics   Water  
What's On Press Office Tenders Suppliers Directory Research Jobs Announcements Contact Us
 
 
 
RSS Feed
Article   Comments   Other News   Research   Magazine  
 
 
Jul 06, 2012

It is possible to secure cloud services, IT firm insists

Back
SECURITY|Africa|Business Connexion|Security|Systems|VMware Northern Europe|VMware South Africa|Africa|Security|Cloud Services|Data Processing|Equipment|Informatiuon Technology|Private Networks|Scaleable Cloud Services|Security|Service|Services|Systems|Virtualisation Equipment|Andrew Brauer|Chris Norton|Infrastructure|Matt Piercy|Power|Security|Informatiuon Technology
SECURITY|Africa|Security|Systems||Africa|Security|Equipment|Security|Service|Services|Systems||Infrastructure|Power|Security|
security|africa-company|business-connexion|security-company|systems-company|vmware-northern-europe|vmware-south-africa|africa|security-facility|cloud-services|data-processing|equipment|informatiuon-technology|private-networks|scaleable-cloud-services|security-industry-term|service|services|systems|virtualisation-equipment|andrew-brauer|chris-norton|infrastructure|matt-piercy|power|security-person|informatiuon-technology-technology
© Reuse this



Businesses can ensure the security of cloud services, such as external data storage and applications, and enforce business control policies by employing virtualisation architecture, says virtualisation equipment and systems company VMware South Africa director Chris Norton.

Companies can leverage their own infrastructure, namely servers and computing power, to deploy their own cloud services and link these securely with external, scaleable cloud services when required, while maintaining business control, he says.

“Companies have already invested in people, processes, infrastructure and equipment to deploy and maintain their networks. Further, while cloud services enable easy scalability and cost reduction, the centralised control of private networks is imperative to ensure business compliance, security and accountability,” says VMware Northern Europe VP Matt Piercy.

To meet the disparate demands on informatiuon technology (IT) departments in com- panies, VMware proposes a hybrid cloud model, which entails that companies leverage their IT investments by virtualising their data servers, networks and computing power to deploy a cloud under their control, says Norton.

However, company policies for security of information and data processing should track data into other companies that provide outsourced cloud services. This will ensure that security and control remain high and the business remains compliant with regulatory and shareholder rules, says Piercy.

Service-level agreements stipulating security and access policies can be negotiated with service providers, and international best practice cloud security standards exist, says business IT systems provider Business Connexion chief technology officer Andrew Brauer.

Companies should, however, retain core and critical information and use the cloud for noncore functions, as well as encrypt data, notes Piercy.

Further, lists of identified applications that employees can use would ensure the safe use of internal and unsecured, external applications, such as widely used cloud storage application Dropbox.

“Individual experiences and familiarity drive the uptake of applications, devices and cloud functions in companies. However, the central management of policies and security across platforms and devices is important and possible by using automated and virtualised systems. These policies will encompass the generation and distribution of data, the use of different devices, technologies and applications, as well as accessibility management.

“In the near future, portals and policies will be employed to determine the security and accessibility profile of users, who increasingly demand to be in control of which applications, devices and platforms they use, while also ensuring central IT management and control by the company,” notes Piercy.

Companies will also seek to build and deploy their own applications and there is an increasing demand for self-service portals, which also gives control back to the companies, says Brauer.

“Vendor lock-in is rapidly decreasing and companies must increasingly control software scattered across different virtualisation layers. Expanded policy-driven automation will be employed to enable an IT department to manage this. Back-end functions will also become more automated and policy-driven,” he says.

Virtualisation and cloud services can enable small and medium-size businesses to leapfrog technology gaps, compared with large corporations. Large companies can, however, use cloud services to provide scope for easy expansion or contraction and move from a deterministic capital expenditure model for the deployment of IT systems to a more flexible operating expenditure model, concludes Norton.

Edited by: Martin Zhuwakinyu
© Reuse this Comment Guidelines (150 word limit)
 
 
 
 
 
 
 
 
Other Business Process Outsourcing News
With the sale of Nashua Mobile's subscriber base now concluded and the unit subsequently closed, parent company Reunert planned to use the cash flows earned from the deal to “explore growth opportunities through investment”. The R1.4-billion profit from the split...
Cape Town is on a drive to strengthen its position as a key business capital in Africa. The Mother City is keen to retain its reputation as a leading tourist destination, but wants to be taken more seriously as a destination for local and international investment...
An undisclosed company has made a play for Blue Label Telecoms, with discussions now under way, the JSE-listed telecommunications group said on Wednesday. In a cautionary announcement to shareholders, Blue Label stated that a nonbinding expression of interest (EoI)...
More
 
 
Latest News
China appears to have been routinely underestimating output from its sprawling steel sector, with official figures for last year alone 40-million tonnes below a key industry estimate - an amount equivalent to Germany's entire annual production. Beijing has vowed to...
Lumwana, Zambia
Canada’s Barrick Gold Corp will suspend operations at its Lumwana copper mine, in Zambia’s Northwestern province, after the country enacted legislation that raised the royalty rate on openpit mining operations from 6% to 20%. TSX- and NYSE-listed Barrick, the world’s...
The Labour Court in Johannesburg has set aside the 2011-2014 metal sector wage agreement, the National Employers' Association of SA (Neasa) said on Thursday. The 2011-2014 wage deal was the result of an agreement between the Steel and Engineering Industries...
More
 
 
Recent Research Reports
Liquid Fuels 2014 - A review of South Africa's Liquid Fuels sector (PDF Report)
Creamer Media’s Liquid Fuels 2014 Report examines these issues, focusing on the business environment, oil and gas exploration, the country’s feedstock supplies, the development of South Africa’s biofuels industry, fuel pricing, competition in the sector, the...
Water 2014: A review of South Africa's water sector (PDF Report)
Creamer Media’s Water 2014 report considers the aforementioned issues, not only in the South African context, but also in the African and global context, and examines the issues of water and sanitation, water quality and the demand for water, among others.
Defence 2014: A review of South Africa's defence industry (PDF Report)
Creamer Media’s Defence 2014 report examines South Africa’s defence industry, with particular focus on the key participants in the sector, the innovations that have come out of the sector, local and export demand, South Africa’s controversial multibillion-rand...
Road and Rail 2014: A review of South Africa's road and rail infrastructure (PDF report)
Creamer Media’s Road and Rail 2014 report examines South Africa’s road and rail transport system, with particular focus on the size and state of the country’s road and rail network, the funding and maintenance of these respective networks, and the push to move road...
Real Economy Year Book 2014 (PDF Report)
This edition drills down into the performance and outlook for a variety of sectors, including automotive, construction, electricity, transport, steel, water, coal, gold, iron-ore and platinum.
Real Economy Insight: Automotive 2014 (PDF Report)
This four-page brief covers key developments in the automotive industry over the past 12 months, including an overview of South Africa’s automotive market, trade figures, production and the policies influencing the sector.
 
 
 
 
 
This Week's Magazine
South Africa remains an important manufacturing and export platform for Ford Motor Company, says executive chairperson Bill Ford. However, he adds that other countries on the continent are “becoming interesting”, and that the US carmaker is casting its net wider for...
TO BE PHASED INTO SERVICE The first MeerKAT dish, with another 63 to come
Germany’s Max-Planck-Society (MPG) and the Max-Planck-Institute for Radio Astronomy (MPlfR) are investing €11-million (about R150-million) into South Africa’s MeerKAT radio telescope array programme. The money will be used to design, build and install S-band radio...
Infrastructure spend in sub-Saharan Africa will grow from $70-billion in 2013 to $180-billion by 2025, says PwC capital projects and infrastructure Africa leader Jonathan Cawood. This is one of the findings of PwC’s Capital Projects & Infrastructure report on East...
Private-owned defence and aerospace manufacturer Paramount Group and the Ichikowitz Family Foundation unveiled its Anti-Poaching Skills and K9 Training Academy in Magaliesburg last month.
MATT BARKER Wireless networks should enable users to engage and must provide relevant information to them based on their activity and location
The inclusion of Bluetooth to provide sub-three meter accuracy and heightened functionality for users is one of the ways to change existing wireless networks into engagement networks. An engagement network differs from common wireless networks in that it enables the...
 
 
 
 
 
 
 
 
 
Alert Close
Embed Code Close
content
Research Reports Close
Research Reports are a product of the
Research Channel Africa. Reports can be bought individually or you can gain full access to all reports as part of a Research Channel Africa subscription.
Find Out More Buy Report
 
 
Close
Engineering News
Completely Re-Engineered
Experience it now. Click here
*website to launch in a few weeks