SECaaS a game changer for SA

April 2019 Integrated Solutions, Infrastructure

Security-a-a-Service (SECaaS) is not an entirely new concept; people have been talking about it since as far back as 2014. On paper, the benefits seem to be extensive, but what are they and do they translate for local businesses?

SECaaS can be defined as outsourcing your security measures to a third-party cloud service provider. This means that your security services are now delivered via a Web browser, and not locally through an internal IT department; saving on upfront hardware costs and ensuring that your software is continually kept up-to-date.

Sven Smit
Sven Smit

SECaaS promises to comprehensively arm companies of all sizes with the tools they’ll be needing to protect themselves from harmful cyberattacks (including ransom-, spy- and malware), which is predicted, by IDG, to cause up to $6 trillion worth of damage globally by 2021.

“And while cyber-based SECaaS may be a more obvious offering, this type of technology also allows businesses to outsource physical security requirements – including access control and video surveillance for example,” states Sven Smit, portfolio director at Specialised Exhibitions Montgomery.

“With the growing accessibility of cloud computing, the ‘X-as-a-Service’ approach is gaining popularity for businesses of all sizes,” he adds. “It has also become clear that SECaaS in particular is especially suitable for the small businesses that form the backbone of South Africa’s entrepreneurial landscape.”

A recent Memeburn article says the SECaas model is “quite possibly the best thing to happen to the SME since high-speed broadband. They can select the products they want, when they want.” It says, in the past a selection was a permanent investment, today they can try it out, see if it fits, and move on. The flexibility of SECaaS means they can change the solution when it doesn’t work for them.

SMEs aside though, research company Gartner expounds the virtues of SECaaS, stating that, while the overall adoption of cloud computing is growing, SECaaS in particular is set to boom. The organisation stated that, by 2020, 85% of large enterprises will use a cloud access security broker solution for their cloud services, up from less than 5% in 2015, and that the SECaaS market will exceed $8.5 billion, growing at a 22.2% compound annual growth rate from last year’s $3.12 billion.

A Persistence Market Research study looks even further into the future, saying that SECaaS will arise as the de facto business model on many networks, as it doubles in size again to $16.5 billion by 2026.

The reasons for the uptake could be based on economic factors, says Smit. “SECaaS offers a portfolio of prevention, detection and resolution services and it does this in a budget-friendly manner.

“Businesses are empowered in purchasing only the ‘cover’ they need to address their specific requirements, and they can do so using OpEx as opposed to CapEx budgets. Then, specifically for those companies using products from numerous vendors, this approach offers access to expertise from ISPs who are trained across all product sets and are solely focused on keeping the business secure and security protocols current.

“This frees up internal IT staff to focus on helping achieve core business objectives rather than running from pillar to post in an attempt to address thousands of potential threats.

“Having said that, it seems widely understood, globally, that opting for a SECaaS solution is the way forward and when the benefits are weighed and measured, we have no doubt local businesses will be following suit,” says Smit.

Interested in hearing more on the latest trends in both physical and cybersecurity? Visitors to Securex South Africa 2019, Africa’s leading security and fire trade exhibition, will have access to a host of security experts and several seminar opportunities that should help shine a light on what’s happening within this sector.

Securex South Africa 2019 will take place at Gallagher Convention Centre from 14 to 16 May 2019, and is co-located with A-OSH EXPO, Africa’s leading occupational safety and health trade exhibition, as well as – for the very first time – Facilities Management Expo 2019, the show that brings together all aspects of facilities management.

Visitors are able to register for attendance at no cost by visiting www.securex.co.za, gaining access to all three shows.

For more information contact Specialised Exhibitions Montgomery, +27 11 835 1565, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.

Read more...
Access and identity in 2024
Technews Publishing Gallagher HID Global IDEMIA Ideco Biometrics Enkulu Technologies neaMetrics Editor's Choice Access Control & Identity Management Integrated Solutions
SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.

Read more...
Creating a cybersecurity strategy in a world where threats never sleep
Information Security Infrastructure
[Sponsored Content] The boom of Internet of Things (IoT) technology and the chaos that surrounded the sudden shift to work-from-home models in 2020 kick-started the age of cybercrime. In that period, incidents rose by 600%, affecting every industry and showing no signs of slowing down.

Read more...
Advanced security solution for high-risk areas
Secutel Technologies Surveillance Integrated Solutions
The need for a sophisticated intrusion detection system is paramount when faced with persistent security challenges, particularly in isolated battery rooms or high-risk areas prone to vandalism, cable theft, and battery theft.

Read more...
Vumacam and NAVIC enhance SafeCity initiative
Integrated Solutions Security Services & Risk Management
Vumacam and NAVIC, two of South Africa's most respected surveillance technology and vehicle intelligence providers, are proud to announce an alliance that will greatly expand the coverage and impact of the SafeCity initiative across the country.

Read more...
Gallagher Security’s achieves SOC2 Type 2 recertification
Gallagher News & Events Integrated Solutions Infrastructure
Gallagher has achieved System and Organization Controls (SOC2 Type 2) recertification after a fresh audit of the cloud-hosted services of its integrated security solution, Command Centre. The recertification was achieved on 21 December 2023.

Read more...
Cyberattacks the #1 cause of business outages
Editor's Choice Information Security Infrastructure
The latest survey by Veeam Software shows that 92% of organizations will increase their spending on data protection by 2024 to achieve cyber resilience due to continued threats of ransomware and cyberattacks.

Read more...