classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017


On-premise security doesn’t make sense
May 2014, Cyber Security

IT Security has become a complex challenge for companies of all shapes and sizes. With the range of threats to corporate data coming from the Web, social media, via e-mail, and internally, most companies typically address each channel with multiple best-of-breed solutions to ensure optimal effectiveness.

Richard Broeke, Securicom
Richard Broeke, Securicom

“This prioritisation of product effectiveness over simplicity and ease-of-management comes with a high cost for businesses because buying and managing various point security solutions is expensive business. What makes this approach so expensive are the initial acquisition costs, the cost of IT labour to manage the systems on an ongoing basis, software licensing and maintenance costs, and the cost of any hardware that is needed to run the software,” says Richard Broeke, an IT security expert at Securicom.

Though using separate best-of-breed, on-premise solutions for different security problems remains the dominant approach for deploying IT security, recent research by Osterman Research shows that companies would prefer a single or cloud-based approach.

For example, Osterman Research found that 35% of the organisations it surveyed have on-premises, best-of-breed solutions in place, but only 16% cited this as their preferred security delivery approach. The study also found that while only 14% use a cloud-based and centrally managed security solution with a single interface, 24% actually prefer this model.

Broeke agrees: “There is a noticeable shift towards cloud-based security solutions in South Africa. Over time, we can expect to see more companies moving to cloud-based anti-malware, anti-spam and Web security solutions.

“We are definitely seeing a faster move to cloud-based services for email security and anti-spam than for other cloud-based services such as Web security. Our hosted email security and content filtering solution, ePurifier, grew more than 20% in 2013. Local companies are really starting to see the value in catching and stopping spam and malicious email content before it hits their networks.”

The fact is that IT security is rarely a core function. If the internal management of e-mail, Web and social media security as well as other parts of the IT infrastructure is not a core competency that is central to the success of a business, Broeke says it doesn’t make business sense to keep it in-house.

“Without a doubt, a cloud-based approach has potential to significantly reduce the administration, complexity, and overhead of IT security. The more predictable nature of cloud services costs makes them far more cost-effective than deploying and maintaining countless point solutions. If using internal resources to manage expensive, best-of-breed security solutions doesn’t add to the bottom line, why do it?” he questions.

To determine whether or not to use cloud-based security solutions, he says decision-makers need to understand the true cost of ownership of managing their current, on-premise infrastructure. They also need to understand the risks facing the business from an IT perspective.

“Very often, they come to the conclusion that their security is no better because it is on-premise. I have yet to see a case of a small to mid-sized company where hosting e-mail in-house is worth it from either a cost, security or uptime perspective.

He concludes: “Cloud based security is coming into its own as companies begin to see that outsourcing IT security functions such as e-mail and Web security gives them access to best-of-breed technologies and access to security experts without costly technology acquisitions or employing skilled resources. While there will always be business cases for on-premise or hybrid solutions, cloud-based services are set to become the norm.”

For more information contact Securicom at www.securicom.co.za


Credit(s)
Supplied By: Securicom IT Solutions
Tel: 086 159 1591
Fax: 086 638 2361
Email: sales@securicom.co.za
www: www.securicom.co.za
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Packaged cyber-threat service
    October 2017, GNL Cyber, News, Cyber Security
    Gold ‘N Links Cyber introduces GNL CYBER 360, a per user, next generation cyber-threat packaged service.
  • More than physical intrusion
    October 2017, Mining (Industry), Cyber Security
    Mining and manufacturing sectors are becoming increasingly vulnerable to cyber attack. This is highlighted in Dimension Data’s Global Threat Intelligence Report for 2017.
  • Compliance is knowing
    October 2017, J2 Software, Cyber Security, IT infrastructure
    There are two types of businesses, those who have been breached and those that don’t know that they have been breached.
  • Compliance through security
    October 2017, Cyber Security
    Sophos helps South African partners to assist customers in preparing for GDPR and POPI compliance through a local roadshow.
  • Intact adds Veriato to its stable
    October 2017, Cyber Security, Products
    Security solutions distributor Intact Software Distribution has added Veriato’s range of intelligent solutions to its portfolio.
  • Protecting privacy in the face of PoPI
    October 2017, Cyber Security, IT infrastructure, Security Services & Risk Management
    While no single product can offer complete PoPI compliance, having a quality set of information security products puts organisations in a significantly better position.
  • Mining botnets are back
    October 2017, This Week's Editor's Pick, Cyber Security
    The Kaspersky Lab anti-malware research team has identified two botnets made of computers infected with malware, which silently installs cryptocurrency miners.
  • DDoS detection and mitigation platform
    September 2017, Networks Unlimited, Cyber Security, Products
    Arbor Networks further automates DDoS attack mitigation for MSSPs and enterprise customers.
  • Back to the future
    September 2017, Adamastor Consulting, This Week's Editor's Pick, Cyber Security, Integrated Solutions, Residential Estate (Industry)
    The future is not what it used to be. Rob Anderson looks at estate security in 2027.
  • Are IP cameras vulnerable to ­cyber attacks?
    September 2017, Graphic Image Technologies, Cyber Security, CCTV, Surveillance & Remote Monitoring
    The Internet of Things (IoT) is currently on the rise and with the expansion of digitisation, the separation between physical security and network security is no longer clear.
  • Managing technology risks for effective estate security
    September 2017, Technews Publishing, Residential Estate (Industry), Cyber Security, Integrated Solutions, Conferences & Events
    Hi-Tech Security Solutions and Rob Anderson hosted the Residential Estate Security Conference 2017 in Johannesburg earlier this year.
  • Deepening the value of surveillance
    September 2017, Hikvision South Africa, Residential Estate (Industry), CCTV, Surveillance & Remote Monitoring, Cyber Security
    Deep Learning has swept through the IT industry, bringing benefits and better classifications to a number of applications. Now it’s changing security as well.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.