DMaaS is the solution to hybrid cloud complexity woes

Issue 6 2022 Infrastructure


Iniel Dreyer.

After an initial scramble to move everything to the cloud, companies are increasingly moving to a hybrid cloud environment, with a mix of private and public cloud infrastructure and services, coupled with on-premises storage.

Over the years, organisations have come to realise that there is no-one-size-fits-all when it comes to technology, and many – especially companies with legacy systems that are not cloud-ready – are paying much closer attention to what should and shouldn’t be migrated to the cloud. Yet, despite the benefits of the hybrid cloud, complexity and risks related to data management can creep in. This is where Data Management-as-a-Service (DMaaS) can help.

The hybrid cloud model is likely to be around for a long time to come, its uptake driven by business needs such as scalability, with many businesses incorporating cloud brokerage into their strategy to leverage cost benefits of different providers. This involves the movement of data between cloud providers and introduces several challenges, chiefly complexity, and a lack of visibility when it comes to data protection.

Contrary to expectations

This is often contrary to expectations, as many companies that begin their cloud journey think that everything will just magically work. Perhaps cloud migration seems so easy due to the perception created by cloud vendors, with organisations expecting a seamless migration, an environment that is less complex and easier to manage, and an IT team that can sit back because everything is expected to integrate and work perfectly.

Unfortunately, quite the opposite is often true, because with hybrid cloud models there is a lot more complexity due to data residing in different environments, and there are often issues with roles and responsibilities, especially around understanding what elements the customer and vendor are respectively responsible for.

Aside from this complexity, organisations should also be cognisant of risks related to data backup and recovery. Here again, assumptions tend to be made, with many companies thinking that the cloud provider will look after their data. However, this is most often not the case, so it is therefore very important that companies understand their data retention requirements. If their cloud provider does not adhere to these requirements, organisations must ensure that they have the option to protect their own data and to comply with their own rules and regulations.

Disparate systems and locations

Another challenge that comes with the nature of hybrid cloud models is that the various disparate systems and locations where data resides require a carefully planned and designed data management strategy. Failing this, companies could end up with specific point-products for each environment to protect their data. This will create overly complex data management with no single pane of glass that gives companies a view of their data so that it can be adequately protected, not to mention the cost implications of operating multiple point-products.

Essentially, the single-pane-of-glass approach is key to data protection. Unfortunately, data protection is often overlooked and ends up being something that gets thrown in on the side before companies realise things are not going to work as expected. It is therefore crucial, when building out a hybrid model, to keep data protection in mind and make it part of the design. Hence, the best approach is to deploy products and solutions that provide a single pane of glass when it comes to protecting data, making it a lot easier to manage and drive down complexity.

Single view

Quite often, the solution to these challenges and a good example of the single-pane-of-glass approach can be found in adopting a DMaaS model, which allows companies to grow and shrink their data ecosystems as their requirements change in the different hybrid cloud environments, without losing money. With a DMaaS model, it makes little difference where a company’s data sits as it will be protected, with no need to procure any additional hardware or software, even when moving data between cloud and on-premises environments.

A DMaaS model also gives companies access to the right skills and expertise via a service provider. These skillsets are often lacking in these hybrid environments, especially among small and medium enterprises, which do not have big, dedicated IT teams. The skilld and expertise sourced from a provider will not only ensure the environment is designed properly, but will also free up a company’s IT staff and allow them to focus on their core tasks.

Lastly, there is no capital expenditure requirement upfront, meaning that it becomes an operational expense from the very beginning. This is particularly useful for companies that are transitioning to the cloud and might not know what their data management requirements will ultimately be. Again, growing or shrinking the environment will not require any additional costs.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Protecting high-value data from AI
CASA Software Infrastructure Information Security Products & Solutions
As artificial intelligence accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent.

Read more...
Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

Read more...
The global state of physical security
Genetec News & Events Infrastructure
Physical security has become a strategic business function, improving IT collaboration and decision-making. Moreover, interest in AI has more than doubled among users, and organisations seek flexibility to deploy workloads on-premises, in the cloud, or hybrid.

Read more...
SA availability of immutable backup storage appliance
CASA Software Infrastructure Security Services & Risk Management
CASA Software has launched the newly released Nexsan VHR-Series, a fully integrated, enterprise-class, immutable backup storage appliance purpose-built for Veeam software environments, with usable capacity ranging from 64 TB to 3,3 PB.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.