As-a-Service solutions bolster information security

1 May 2019 Infrastructure, Integrated Solutions

The emerging concept of ‘Everything as a Service’ (XaaS) is set to revolutionise IT offerings in South Africa. Implementation of XaaS makes advanced technologies and solutions more cost effective and available to a broader spectrum of business. While concerns around the security of data within service-based solutions remain, an effectively implemented service model can be in most instances more secure than traditional IT. Organisations simply need to ensure they obtain the right ‘as-a-service’ offering from the right provider and maintain adequate control over their technology portfolio.

David Joyce
David Joyce

The most significant benefit of the XaaS model is the fact that it enables businesses to access the most advanced technologies available worldwide. In South and southern Africa in particular, many businesses fall into the small to medium enterprise (SME) category and are extremely budget-conscious. Obtaining the latest hardware and software in-house, as well as sourcing and retaining the skills required to maintain it is simply not viable for the vast majority of the market.

With a service model, however, it is possible to immediately access leading technologies in an affordable manner. Other benefits include greater agility and flexibility as well as a more cost-effective pay-per-use fee structure.

Another advantage of the XaaS model in the African context is the fact that it minimises the amount of physical equipment that needs to be secured and maintained. Unfortunately, theft is not uncommon and hardware is often the target. Making use of a cloud-based technology provider mitigates the risk of securing on-premise hardware and the sensitive data it may contain.

In order to mitigate any other security concerns that a business may have, it is essential to engage with a well-known and reputable provider. For example, providers with high profile clients within the financial services industry, means that their services will already be subject to the most stringent security and compliance requirements. Some global cloud providers also offer a sovereign cloud service, which is ring-fenced within the borders of specific countries to meet legislative and compliance requirements.

By conducting due diligence to obtain the correct services from a reputable provider, the service model is likely to be far more secure than an in-house solution. In addition, a reputable provider will offer well-designed solutions, something which the majority of organisations in Africa simply do not have the skill sets and capabilities to achieve. The XaaS model offers a significant step forward for emerging markets.

Obtaining solutions through a service model does not absolve organisations of ultimate responsibility for security. It is up to them to apply a good solution design within their environment, and that the solutions delivered meet their business, security and compliance requirements.

In summary, to leverage the full benefit of XaaS, organisations need to do their homework. This includes finding a vendor with a solid track record and experience implementing XaaS. Your chosen vendor should make use of cloud services from global providers and be able to tailor a solution to meet your needs, including ensuring security and compliance objectives. It is then essential to monitor these services and solutions. Businesses must maintain responsibility for their data regardless of the delivery mechanism of their IT services and solutions.

For more information contact Nimble Technologies, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Five tech trends shaping business in 2025
Information Security Infrastructure
From runaway IT costs to the urgent need for comprehensive AI strategies that drive sustainable business impact, executives must be prepared to navigate a complex and evolving technology environment to extract maximum value from their investments.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Navigating today’s cloud security challenges
Information Security Infrastructure
While the cloud certainly enables enterprises to quickly adapt to today’s evolving demands, it also introduces unique challenges that security teams must recognise and manage. Vincent Hwang offers insights from the 2025 State of Cloud Security Report.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
The rise of autonomous data recovery
Information Security Infrastructure
Escalating cyberthreats and attacks constantly put businesses under pressure, increasingly prompting organisations to shift their mindsets towards ensuring continuous operations and thus avoiding downtime and revenue loss.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...