Hi-Tech Security Solutions Hi-Tech Security Solutions
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn


Fix your gutters before looking at the clouds
September 2011, IT infrastructure in security

The recent media is abuzz with cloud computing in all its forms and permutations. And it has become apparent that, to some degree, each and every one of us will sooner or later be faced with the decision of what cloud services to use, and when to adopt this promising architecture.

If everyone promises cheaper services, more up-time, and most importantly, a reduction in infrastructure costs when using cloud computing, what should the CIO in your company be looking at in preparation for this latest wonder of our IT world?

The answer lies in bottle-necks and redundancy. If I were to build a new house and be completely dependent on rainwater for all my requirements, the first thing I would do is to make sure that there are no bottle-necks in the transfer of water from the catchment area into some form of reservoir. From there, I would have to establish a redundancy system of new, large-diameter water pipes to those areas of my household that will be needing access to the water. In other words – fix up your gutters and increase the size of your water pipes. Remember, in order to run my household, I cannot go without water, and neither do I have my own borehole anymore. (I sold it to buy the new water pipes). So yes, tapping resources from an external provider is definitely more cost effective if you are starting out a new house. Converting an existing household’s water supply to accommodate this new network may require some noticeable investment.

Cloud computing is no different. Companies surrender their own boreholes
(client-based software licenses and services) in order to make use of a resource feed from within the ‘cloud’. As such, the days of using large power-hungry servers in an expensively run air-conditioned room may seem to be numbered. But, as with boreholes, you move the weakness from your own infrastructure to that of the service delivery mechanism. In this instance, your network supply.

Setting up your company with quality network infrastructure, from your local area networks, to your switching systems, domain servers, and routers, is a non-negotiable before committing to cloud services. Similar to tapping water resources from a catchment area via high quality – high capacity gutters, you have to concentrate on redundancy and distribution.

At the moment, there are a number of public cloud solutions that do not allow for online-offline redundancy. In other words, with the exception of a few experimental frameworks – including Google Gears – should one perform mission critical applications on a cloud service, and the connection to the cloud goes offline, you would need to resume on a local instance of that server until the network has been re-connected. And even if this was possible, is it feasible?

Why go to the cloud in the first place if you have to fork out some serious computing power to run the service locally?

So to summarise; initially, one should not see the utilisation of public cloud services as a money saver. Use that infrastructure savings (servers, software licenses, electricity, etc) to spend on upgrading your networking system.

This should span your feed from the Internet right through to the network adapters on your PCs.

One final point on the decision of when to adopt cloud computing: Until your infrastructure has proven itself, limit the usage to services that you can do without for short periods of time. I would be happy to run my mail server in the cloud, but mission critical services which may include accounting, CRM, ERP, etc, will have to wait until I am satisfied that my service provider can deliver on his promises.


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Out of office mobile security
    April 2014, Technews Publishing, IT infrastructure in security
    Hi-Tech Security Solutions asked two local experts to talk about securing our mobility. On the one hand, we spoke to Riaan Badenhorst, MD at Kaspersky Lab South Africa about securing our smartphones in general, on the other we spoke to Robert Krumm, consulting systems engineer for Ruckus Wireless EMEA about secure Wi-Fi use in public hotspots.
  • Securing your IT infrastructure
    April 2014, Technews Publishing, IT infrastructure in security
    Hi-Tech Security Solutions wants to know what the current best practices are when it comes to securing your IT infrastructure. It’s not only data and users that are at risk; in an IP world, your network infrastructure carries security data as well, which can be intercepted and used against you.
  • MSPs get a boost
    April 2014, IT infrastructure in security
    McAfee helps its managed service providers free up valuable customer IT resources and budget. It introduces network security and security management solutions to its MSP Programme on a pay-as-you-go basis.
  • PoE switches with DDM support
    April 2014, Reditron, IT infrastructure in security
    EtherWAN has recently launched its latest switch technology, called Digital Diagnostics Monitoring (DDM) or Digital Optical Monitoring (DOM), to easily troubleshoot fibre optic connectivity issues.
  • Convergence in the real world
    April 2014, IT infrastructure in security
    Hi-Tech Security Solutions recently published a news article noting that South Africa’s SecureData is now a partner of HID Global. Known as an IT security company, we thought this move warranted more investigation and we spoke to SecureData’s CTO, Wayne Olsen, about this move and what it means looking forward.
  • It starts with e-mail
    April 2014, IT infrastructure in security
    Choosing to store data in an electronic format and on a network that can be accessed by anyone, should they hold the keys, can be as risky as it is convenient. It is for this reason that data security, encryption and secure archiving services surfaced and evolved into what they are today.
  • Secure authentication technology for SME and enterprise
    April 2014, IT infrastructure in security
    ESET Southern Africa has launched the latest version of its ESET Secure Authentication (ESA) technology, a two-factor authentication (2FA) software providing both SMEs and Enterprises with a more secure form of remote access to company networks and sensitive data.
  • Secure operating environment critical to cloud
    March 2014, IT infrastructure in security
    Increasing levels of adoption of the cloud is driving urgency around the need for a secure operating environment and the skills necessary to maintain this environment.
  • Innovation in hard drive technology
    March 2014, IT infrastructure in security
    2014 will see the rise of a new category of product: the dual drive, a unique storage innovation that fuses a 2.5-inch 120 GB solid state drive (SSD) with a 1 TB hard disk drive (HDD) to offer a powerful dual drive solution.
  • Security in the network environment
    February 2014, IT infrastructure in security
    Technology advancements in social media, mobile devices, Wi-Fi and cloud services are increasing a company’s vulnerability to attacks. Cyber risks and cyber threats are a major concern for large revenue-generating organisations.
  • 40 Gbps Ethernet switch solution
    February 2014, Drive Control, IT infrastructure in security
    The Switch SX1012 is ideal for high-performance networking environments such as mining organisations that store geological maps which comprise very large file sizes or JSE-listed companies that need fast access to large amounts of data.
  • New threat detection and ­mitigation sandbox
    February 2014, IT infrastructure in security
    The FortiSandbox-3000D combines a unique dual-level sandbox, dynamic threat intelligence, real-time dashboard and rich reporting in a single device that integrates with Fortinet’s FortiGate next generation firewalls (NGFW) and FortiMail e-mail gateway appliances.

Hi-Tech Security Solutions Business Directory

Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Terms & conditions of use, including privacy policy
PAIA Manual
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.