classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn

Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017

On-premise security doesn’t make sense
May 2014, Cyber Security

IT Security has become a complex challenge for companies of all shapes and sizes. With the range of threats to corporate data coming from the Web, social media, via e-mail, and internally, most companies typically address each channel with multiple best-of-breed solutions to ensure optimal effectiveness.

Richard Broeke, Securicom
Richard Broeke, Securicom

“This prioritisation of product effectiveness over simplicity and ease-of-management comes with a high cost for businesses because buying and managing various point security solutions is expensive business. What makes this approach so expensive are the initial acquisition costs, the cost of IT labour to manage the systems on an ongoing basis, software licensing and maintenance costs, and the cost of any hardware that is needed to run the software,” says Richard Broeke, an IT security expert at Securicom.

Though using separate best-of-breed, on-premise solutions for different security problems remains the dominant approach for deploying IT security, recent research by Osterman Research shows that companies would prefer a single or cloud-based approach.

For example, Osterman Research found that 35% of the organisations it surveyed have on-premises, best-of-breed solutions in place, but only 16% cited this as their preferred security delivery approach. The study also found that while only 14% use a cloud-based and centrally managed security solution with a single interface, 24% actually prefer this model.

Broeke agrees: “There is a noticeable shift towards cloud-based security solutions in South Africa. Over time, we can expect to see more companies moving to cloud-based anti-malware, anti-spam and Web security solutions.

“We are definitely seeing a faster move to cloud-based services for email security and anti-spam than for other cloud-based services such as Web security. Our hosted email security and content filtering solution, ePurifier, grew more than 20% in 2013. Local companies are really starting to see the value in catching and stopping spam and malicious email content before it hits their networks.”

The fact is that IT security is rarely a core function. If the internal management of e-mail, Web and social media security as well as other parts of the IT infrastructure is not a core competency that is central to the success of a business, Broeke says it doesn’t make business sense to keep it in-house.

“Without a doubt, a cloud-based approach has potential to significantly reduce the administration, complexity, and overhead of IT security. The more predictable nature of cloud services costs makes them far more cost-effective than deploying and maintaining countless point solutions. If using internal resources to manage expensive, best-of-breed security solutions doesn’t add to the bottom line, why do it?” he questions.

To determine whether or not to use cloud-based security solutions, he says decision-makers need to understand the true cost of ownership of managing their current, on-premise infrastructure. They also need to understand the risks facing the business from an IT perspective.

“Very often, they come to the conclusion that their security is no better because it is on-premise. I have yet to see a case of a small to mid-sized company where hosting e-mail in-house is worth it from either a cost, security or uptime perspective.

He concludes: “Cloud based security is coming into its own as companies begin to see that outsourcing IT security functions such as e-mail and Web security gives them access to best-of-breed technologies and access to security experts without costly technology acquisitions or employing skilled resources. While there will always be business cases for on-premise or hybrid solutions, cloud-based services are set to become the norm.”

For more information contact Securicom at

Supplied By: Securicom IT Solutions
Tel: 086 159 1591
Fax: 086 638 2361
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Making cents out of the security mix
    May 2018, Cathexis Technologies, Panasonic South Africa, Xone Integrated Security, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions, Financial (Industry)
    Hi-Tech Security Solutions chats to industry specialists about the security mix, cybercrime and the onslaught of artificial intelligence in the financial sector.
  • More of the same, but more sophisticated
    May 2018, Duxbury Networking, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
    We’ve been protecting networks from criminals for many years, but as soon as the defences improve, the attacks get more sophisticated.
  • Make sure the channels are safe
    May 2018, This Week's Editor's Pick, Cyber Security, IT infrastructure
    Companies should be aware of how many possible data leakage sources they have: e-mail, phone calls, instant messengers and social networks, cloud storage, external storage devices – to name a few.
  • Visibility is critical
    May 2018, J2 Software, Cyber Security, IT infrastructure
    John Mc Loughlin, MD, J2 Software, expands on the predicted increase in ransomware and cyber-extortion tools and what we can do about it.
  • Transform your security
    May 2018, This Week's Editor's Pick, Cyber Security, IT infrastructure
    In this digital era, data is the currency of choice, unfortunately, opportunities are presented for both organisations and their adversaries.
  • Surviving cybersecurity challenges
    May 2018, Axis Communications SA, This Week's Editor's Pick, Cyber Security
    South Africa has the third highest number of cybercrime victims worldwide, with the country losing billions of rand annually.
  • Real-time network visibility
    May 2018, Networks Unlimited, IT infrastructure, Cyber Security
    When it comes to network downtime in any industry, the underlying statistics tell us one thing: it costs money and lots of it.
  • Insecure security
    May 2018, Cyber Security
    ESET researchers have analysed a newly discovered set of apps on Google Play, Google’s official Android app store, that pose as security applications.
  • A turbulent region
    May 2018, Cyber Security
    Kaspersky Lab reveals cybersecurity trends in the Middle East, Turkey and Africa, with South Africa putting in a good showing in the cyber landscape.
  • Cybersecurity awareness is key
    May 2018, GNL Cyber, Training & Education, Cyber Security
    GNL Cyber offers a wide range of tailored cybersecurity training courses, designed to address the changing cyber threat landscape.
  • The cybersecurity of physical ­security
    April 2018, This Week's Editor's Pick, Cyber Security
    Being aware of the dangers is one thing, but actually knowing what you need to look out for and do to secure your surveillance infrastructure, is quite another.
  • The network is the camera
    April 2018, IT infrastructure, Cyber Security
    Protecting your network is a critical step in protecting your security infrastructure as well as your business. Hi-Tech Security Solutions talks to Aruba Networks about network security.

Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Terms & conditions of use, including privacy policy
PAIA Manual
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.