Creating secure cloud networks

Issue 4 2023 Infrastructure


Hacan Tiwemark.

The history of computing is the history of the back-and-forth between whether an individual computer should be in place or remote. The earliest computers were huge devices, but by the sixties and seventies they were replaced by terminals from which users, often in universities or large corporations, would dial in to a larger central mainframe.

This was followed by the rise of the personal computer; now you could have the power of a mainframe in your home or on your desk. In the last decades we have adopted something between the personal computer and mainframe eras; we have a powerful computer at our disposal (increasingly laptops or tablets), but they are always connected to either the internet at large and/or private networks (such as a company’s own intranet) that is hosted by a cloud service provider.

Today the cloud market is dominated by a handful of ‘hyperscalers’; companies like Amazon Web Services, Microsoft Azure, Google Cloud Platform, IBM cloud and Oracle. It is possible to buy time on super-computers for less than a Netflix subscription, and to purchase gigabytes of storage for less than the price a cup of coffee.

This gives companies the ability to scale incredibly quickly, since they can buy new capacity much more easily than if they had to build that capacity in their own data centre. It is also disaster-proof (hyperscalers have multiple back-ups around the world in case one is destroyed) and will benefit from first-tier security.

The advantages of this are obvious; new capacities can be bought online almost instantly, cloud services are almost always cheaper than building your own data centres and the security is likely to be very high. That doesn’t mean that cloud services are the only way that organizations can access high-quality, high-capacity, scalable computing power, and that in turn doesn’t mean that companies have to go back to having their own on-premises servers. Using the existing hyperscaler web services can be powerful, but it can also be limiting – if your needs are very specific, e.g. requiring industry-specific certification such as PCI PIN, or are very sensitive to data protection issues like GDPR compliance, then you may not be able to find a good fit in existing services and may need to use smaller (but by no means small) data centres.

What is possible with cloud computing?

Digital Realty is one such data centre operator that can provide services that are as powerful as hyperscalers but can offer more flexibility. Take for example its work with buy-now-pay-later company Afterpay. The company’s proprietary decision-making engine needs to be able to determine credit worthiness instantly, while their platform needs to process billions of sales.

Since the company experiences three-figure year-on-year growth, their capacities need to expand rapidly. This is something that existing hyperscaler data centres can provide, but they could struggle with the very specific needs of a company that is providing consumer payments services across several countries.

Similarly, Telefónica UK, which operates as O2 in the UK, needed a solid infrastructure for the expansion of its My O2 app. It had already experienced scalability problems with its current solutions, but found that with Digital Realty it was able to improve customer experience and create a solid foundation for further growth. The commerce platform Criteo had different goals. While cloud computing is an improvement on traditional IT, large data centres consume a lot of electricity and water for cooling. Criteo was able to meet its ESG goals by operating their own bespoke data centre service.

Security and cloud computing

As mentioned, hyperscalers have a very high level of security. They have to, a distributed denial of service attack could take thousands of sites offline, and penetrating the security of one cloud service could open as many organisations to attack.

This would seem to be an argument for using hyperscalers instead of more bespoke systems – all the customisable systems in the world mean nothing if your service isn’t secure. However, the reality is that bespoke systems can have the same level of security that major cloud providers enjoy and can in fact provide greater security because they offer bespoke services.

The security on major cloud providers is very strong, but it is also off-the-shelf, and may not have the exact requirements for heavily regulated industries, especially those which operate in a number of territories. It may be possible to rig together a solution, but there are ways to create security that are ideally suited to cloud data services.

When we look at the most common security threats to cloud platforms, we can see that they all come from areas, such as identity, credential and key management – emphasizing the fact that attackers no longer try to hack digital systems, but attempt to steal identities in order to gain access. Similarly, system vulnerabilities can be introduced by stringing together multiple systems to enable a bespoke security system. These are no longer a problem, provided businesses have the right specialist security solutions in place.

Such solutions are also well suited for hybrid cloud applications. Some companies may wish to have a combination of on-premises and cloud systems, particularly if they are subject to stringent data security regulations. This is where the right partner with extensive experience of working in both on-premises and cloud security benefits companies working in hybrid clouds.

A better way to work in the cloud

Many companies may think that running their own cloud data server instead of using one of the handful of major cloud services providers will be more complex, more expensive and less secure. There may have been a time when this was true, but just as terminals made way for personal computers and personal computers were replaced by always-connected cloud systems, the world of data and security is changing. Today’s experts are changing how companies across the world are working with cloud technology.

To learn more, visit: https://utimaco.com/




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Service robot technology for residential complexes
Suprema AI & Data Analytics Infrastructure Residential Estate (Industry)
Suprema has signed a three-party memorandum of understanding (MOU) with Hyundai Motor Group Robotics LAB and Hyundai Engineering & Construction (Hyundai E&C) to collaborate on advancing residential complexes through service robot technology.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
Proactive estate security in Cape Town
neaMetrics OneSpace Technologies Technews Publishing SMART Security Solutions Fang Fences & Guards ATG Digital Editor's Choice News & Events Integrated Solutions Infrastructure Residential Estate (Industry)
SMART Security Solutions started the year with our annual SMART Estate Security Conference in Cape Town on 26 February 2026. Held at Anna Beulah Farm, the conference saw a number of delegates enjoying the farm’s excellent cuisine, while listening to outstanding presenters.

Read more...
AI projects are failing at alarming rates
AI & Data Analytics Infrastructure
As organisations around the world accelerate their investments in artificial intelligence, digital transformation and data analytics, a growing number of industry experts are warning that many companies are still approaching these initiatives in fundamentally flawed ways.

Read more...
Understanding the Shared Responsibility Model
Infrastructure Security Services & Risk Management
While the cloud can certainly be a growth enabler in many ways, it can also introduce new security risks. Companies want to have a clear understanding of where their security duties end and where their cloud service provider’s begin.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.