Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Starlink wait set to drag on as Icasa flags legal hurdle

      Starlink wait set to drag on as Icasa flags legal hurdle

      13 May 2026
      Malatsi opens door to 'some' partial privatisations of SOEs - communications minister Solly Malatsi

      Malatsi opens door to ‘some’ partial privatisations of SOEs

      13 May 2026
      Sam Altman denies betraying Elon Musk. Shelby Tauber/Reuters

      Sam Altman denies betraying Elon Musk

      13 May 2026
      Naked Insurance launches native app in ChatGPT - Alex Thomson

      Naked Insurance launches native app in ChatGPT

      13 May 2026
      Canal+ firms up 3 June JSE listing

      Canal+ firms up 3 June JSE listing

      13 May 2026
    • World
      Pop star sues Samsung for $15-million - Dua Lipa

      Pop star sues Samsung for $15-million

      11 May 2026
      OpenAI's new audio APIs aim for conversational voice agents

      OpenAI’s new audio APIs aim for conversational voice agents

      8 May 2026
      'It was my idea': Musk claims paternity of OpenAI - Elon Musk

      ‘It was my idea’: Musk claims paternity of OpenAI

      29 April 2026
      Pivotal week for US tech stocks

      Pivotal week for US tech stocks

      28 April 2026
      Sam Altman denies betraying Elon Musk. Shelby Tauber/Reuters

      Worries over OpenAI’s growth as Anthropic gains ground

      28 April 2026
    • In-depth
      Alfa's electric rebel - Alfa Romeo Junior Elettrica Veloce

      Alfa’s electric rebel

      29 April 2026
      Africa switches on as Europe dims the lights

      Africa switches on as Europe dims the lights

      9 April 2026
      The biggest untapped EV market on Earth is hiding in plain sight

      The biggest untapped EV market on Earth is hiding in plain sight

      1 April 2026
      Datatec is firing on all cylinders - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
    • TCS
      TCS+ | The Up&Up Group on the hidden cost of AI - Jason Harrison

      TCS+ | The Up&Up Group on the hidden cost of AI

      13 May 2026
      Michael Rossouw

      TCS+ | The retirement decision most South Africans get wrong

      6 May 2026
      TCS | The Cape Town start-up listening for TB with AI - Braden van Breda

      TCS | The Cape Town start-up listening for TB with AI

      4 May 2026

      TCS+ | ‘The ISP for ISPs’: Vox’s shift to wholesale aggregator

      20 April 2026
      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      TCS | Werner Lindemann on how AI is rewriting the infosec rulebook

      15 April 2026
    • Opinion
      Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

      Free calls, dead voice and Shameel Joosub’s Spanish ghost

      22 April 2026
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      R230-million in the bag for Endeavor's third Harvest Fund - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • Contactable
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • Kaspersky
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » How mid-tier businesses can harness the power of hybrid cloud

    How mid-tier businesses can harness the power of hybrid cloud

    By Mooketsi Gaboutloeloe27 January 2021
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    The pace at which digital transformation is taking place is accelerating, spurred on by many technologies that continue to evolve. We will see the pace of innovation continue to increase, fuelled by new emerging technologies like artificial intelligence, machine learning, edge computing, 5G, data management and hybrid cloud. These technologies have played a key role in how businesses have redefined themselves in our “new normal”.

    But this transformation is not without its challenges for medium-sized businesses, of which there are two major pain points:

    • Moving to cloud-based environments and the infrastructure required to do this; and
    • End-to-end cybersecurity.

    A lot of medium-sized businesses struggle to stay on top of the vast amount of data that they produce as well as grapple with how to store it, keep it safe, and turn it into business insights to help them grow and prosper. If you think about it, infrastructure modernisation and technological transformation all start and ultimately come down to one thing: data.

    The adoption of technology-driven, data-centric business models requires the adoption of cloud-based infrastructure

    Data is the foundation under every aspect of your digital organisation. Data also gives you the insights into how to become more agile, derive more value for your customers, and grow revenues. It is also paramount to understand the data constraints in the business in question, which could include security, sovereignty, and the cost involved with accessing and storing vast amounts of data.

    The adoption of technology-driven, data-centric business models requires the adoption of cloud-based infrastructure, according to a study by International Data Corp, Digital Transformations for the Midmarket Through Modern Infrastructure Platforms.

    Accelerated

    The adoption of cloud computing has been accelerated over the past year, alongside the onset of the fourth Industrial Revolution. Even before the exceptional circumstances of 2020, the adoption of cloud has been systematically growing and gaining traction. “IDC recommends leveraging a hybrid cloud strategy consisting of traditional IT infrastructure, private cloud and public cloud infrastructure environments for strategic workload placement and management.”

    However, medium-sized businesses have been asking themselves: How do I consume public cloud and run on-premises environments in a consistent and easy to manage way? There is no doubt that cloud opens a world of opportunities, but many medium businesses might need assistance in implementing this and they may also want to run certain applications on premises. Hybrid cloud is a perfect multi-cloud management strategy to modernise their infrastructure, but medium-sized businesses must also streamline their multi-cloud environments. In an ESG Research Insight Paper commissioned by Dell Technologies, VMware and Intel, “one of the biggest transformations in IT service delivery over the past decade has been the emergence of public cloud infrastructure consumption”. The paper also emphasises the importance of streamlining and simplifying cloud usage to avoid “cloud sprawl” by introducing consistent infrastructure and operations.

    Cloud is not a destination, it’s a journey, so as medium-sized businesses build their cloud strategy, they must consider how they are going to consume resources from different places: on premises and via public cloud providers and how their tech providers can assist in offering some sort of consistent management framework that allows them to easily manage and consume resources from anywhere, seamlessly.

    The author, Mooketsi Gaboutloeloe, says medium-sized businesses are using up to 60 tools just for security, resulting in huge complexity

    So, if it’s clear that data drives the success of a business, it follows that with the ability to collect, share and store all this information, security becomes business critical. Firstly, medium-sized businesses should not consider security a barrier. Security should be a strategic consideration. According to a Clark School study at the University of Maryland, a cyberattack occurs every 39 seconds. Medium-sized businesses should view security as intrinsic and not an afterthought, brought onto their applications or onto new architectures that they choose to deploy in the future.

    According to IDC, medium-sized business are using up to 60 tools for security, which can result in undue complexity. This complexity is often a result of legacy and emerging workloads and can result in vulnerabilities.

    So, medium-sized businesses must think about end-to-end security, right from the device to servers to their data protection stack. Dell Technologies allows medium-sized businesses to protect their entire ecosystem providing trusted devices, trusted data centres and trusted data. Trusted devices include enterprise-grade Dell Latitude and Dell OptiPlex laptops with built-in SafeBIOS, SafeData, SafeID and other security features. Trusted data centres feature built-in BIOS-level security, like dual root of trust in PowerEdge servers, and extend across the data centre with Unity XT storage and PowerStore storage, VxRail HCI and data protection appliances. And finally, trusted data involves data security built into HCI, storage and purpose-built backup appliances, as well as device-level security such as Dell SafeGuard and Response, offering a comprehensive approach to endpoint threat management.

    A security response or framework must be implemented with the assumption that there could be some sort of data breach or cyberattack

    A security response or framework must be implemented with the assumption that there could be some sort of data breach or cyberattack. This is how a multi-layered security framework starts to take shape. Dell EMC Power Protect Cyber Recovery Solution, for example, creates a vault that is disconnected from the rest of the network, helping medium-sized businesses recover their mission-critical data after a ransomware attack, restoring this data.

    Moving forward, a holistic, new approach is required, one that is resilient, intelligent and automated, with security built in. Dell Technologies is increasingly seeking to build security acumen and standards into its technology stack through organic architectural enhancements rather than bolting it on.

    Security must be intrinsic and end-to-end, and this can only be achieved via a multi-layered approach to security. Security should live with the application, whether the application is on premises or in the cloud.

    Endpoints exposed

    The “new normal” of an increased workforce working from home means less people behind the firewall and more endpoints exposed. These endpoints could be considered vulnerabilities if security is not end-to-end.

    In the digital era, data drives the success of your business, powering everything from customer acquisition strategies to growth strategies and ultimately the evolution of your business in response to environmental change. Medium-sized business teams rely daily on the digital information from the data that they generate, collect, share and store as they do their work and interact with their customers. So, medium-sized businesses should not get hung up on how they can get back to “normal” post-2020, but rather take advantage of the opportunity that has been presented to prepare for the next disruption with the help of technology – whatever it may be.

    • Mooketsi Gaboutloeloe is systems engineer, medium business and CTO ambassador, Dell Technologies South Africa
    • This promoted content was paid for by the company concerned
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    Dell Dell Technologies Mooketsi Gaboutloeloe
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleHuge Telecom launches another wireless voice industry first
    Next Article Up to R24-billion needed to vaccinate 40 million South Africans: treasury

    Related Posts

    RAM prices are surging, threatening to drive up the cost of PCs, smartphones and other consumer electronics devices

    AI is eating the world’s memory – and we’re all going to pay the price

    22 January 2026
    First Technology Western Cape delivers the tools - and intelligence - behind modern business - Dell Technologies

    First Technology Western Cape delivers the tools – and intelligence – behind modern business

    29 December 2025
    How First Technology Western Cape supports green IT initiatives - Dell Technologies

    How First Technology Western Cape supports green IT initiatives

    29 December 2025
    Company News
    In crypto, trust is the new currency - Binance South Africa's Sam Mkhize

    In crypto, trust is the new currency

    13 May 2026
    Don't miss the Telviva Tech Insights webinar

    Don’t miss the Telviva Tech Insights webinar

    13 May 2026

    Don’t miss the Pan African DataCentres Exhibition & Conference

    13 May 2026
    Opinion
    Free calls, dead voice and Shameel Joosub's Spanish ghost - Duncan McLeod

    Free calls, dead voice and Shameel Joosub’s Spanish ghost

    22 April 2026
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Starlink wait set to drag on as Icasa flags legal hurdle

    Starlink wait set to drag on as Icasa flags legal hurdle

    13 May 2026
    Malatsi opens door to 'some' partial privatisations of SOEs - communications minister Solly Malatsi

    Malatsi opens door to ‘some’ partial privatisations of SOEs

    13 May 2026
    Sam Altman denies betraying Elon Musk. Shelby Tauber/Reuters

    Sam Altman denies betraying Elon Musk

    13 May 2026
    Naked Insurance launches native app in ChatGPT - Alex Thomson

    Naked Insurance launches native app in ChatGPT

    13 May 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}