As-a-Service solutions bolster information security

1 May 2019 Infrastructure, Integrated Solutions

The emerging concept of ‘Everything as a Service’ (XaaS) is set to revolutionise IT offerings in South Africa. Implementation of XaaS makes advanced technologies and solutions more cost effective and available to a broader spectrum of business. While concerns around the security of data within service-based solutions remain, an effectively implemented service model can be in most instances more secure than traditional IT. Organisations simply need to ensure they obtain the right ‘as-a-service’ offering from the right provider and maintain adequate control over their technology portfolio.

David Joyce
David Joyce

The most significant benefit of the XaaS model is the fact that it enables businesses to access the most advanced technologies available worldwide. In South and southern Africa in particular, many businesses fall into the small to medium enterprise (SME) category and are extremely budget-conscious. Obtaining the latest hardware and software in-house, as well as sourcing and retaining the skills required to maintain it is simply not viable for the vast majority of the market.

With a service model, however, it is possible to immediately access leading technologies in an affordable manner. Other benefits include greater agility and flexibility as well as a more cost-effective pay-per-use fee structure.

Another advantage of the XaaS model in the African context is the fact that it minimises the amount of physical equipment that needs to be secured and maintained. Unfortunately, theft is not uncommon and hardware is often the target. Making use of a cloud-based technology provider mitigates the risk of securing on-premise hardware and the sensitive data it may contain.

In order to mitigate any other security concerns that a business may have, it is essential to engage with a well-known and reputable provider. For example, providers with high profile clients within the financial services industry, means that their services will already be subject to the most stringent security and compliance requirements. Some global cloud providers also offer a sovereign cloud service, which is ring-fenced within the borders of specific countries to meet legislative and compliance requirements.

By conducting due diligence to obtain the correct services from a reputable provider, the service model is likely to be far more secure than an in-house solution. In addition, a reputable provider will offer well-designed solutions, something which the majority of organisations in Africa simply do not have the skill sets and capabilities to achieve. The XaaS model offers a significant step forward for emerging markets.

Obtaining solutions through a service model does not absolve organisations of ultimate responsibility for security. It is up to them to apply a good solution design within their environment, and that the solutions delivered meet their business, security and compliance requirements.

In summary, to leverage the full benefit of XaaS, organisations need to do their homework. This includes finding a vendor with a solid track record and experience implementing XaaS. Your chosen vendor should make use of cloud services from global providers and be able to tailor a solution to meet your needs, including ensuring security and compliance objectives. It is then essential to monitor these services and solutions. Businesses must maintain responsibility for their data regardless of the delivery mechanism of their IT services and solutions.

For more information contact Nimble Technologies, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Cyber resilience – protect, defend, recover
Infrastructure
The challenge with AI is that threats are getting harder to detect. As a result, plans in 2024 are not just about detection and prevention, but about recovery.

Read more...
Powering business resilience and field operations
Infrastructure Products & Solutions
[Sponsored] The Anker 757 Portable Power Station emerges as a strategic asset for businesses looking to overcome power instability and the demand for operational efficiency in remote and field-based environments.

Read more...
Top bets for backup and business continuity
Infrastructure
Become your organisation’s data pioneer and spearhead data governance and protection of critical data. Challenge why best practices are not adopted or in place, while highlighting the inherent risks this poses.

Read more...
Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Next-gen solar-powered switches
Infrastructure
Duxbury Networking has introduced its range of solar unmanaged switches, which are ideal for any environment requiring reliable Power-over-Ethernet (PoE) capabilities, such as IP phones, cameras, and access points.

Read more...
Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.

Read more...
Access and identity in 2024
Technews Publishing Gallagher HID Global IDEMIA Ideco Biometrics Enkulu Technologies neaMetrics Editor's Choice Access Control & Identity Management Integrated Solutions
SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.

Read more...
Creating a cybersecurity strategy in a world where threats never sleep
Information Security Infrastructure
[Sponsored Content] The boom of Internet of Things (IoT) technology and the chaos that surrounded the sudden shift to work-from-home models in 2020 kick-started the age of cybercrime. In that period, incidents rose by 600%, affecting every industry and showing no signs of slowing down.

Read more...