Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      R12.1-billion wasted as government IT projects collapse - Sita

      R12.1-billion wasted as government IT projects collapse

      1 April 2026
      DStv 4K streaming launch is not imminent

      R99 DStv deal to keep Showmax subscribers from bolting

      1 April 2026
      The biggest untapped EV market on Earth is hiding in plain sight

      The biggest untapped EV market on Earth is hiding in plain sight

      1 April 2026
      US-listed data centre operator Equinix doubles down on South Africa - Sandile Dube

      US-listed data centre operator Equinix doubles down on South Africa

      1 April 2026
      TCS | MTN's Divysh Joshi on the strategy behind Pi - Divyesh Joshi

      TCS | MTN’s Divyesh Joshi on the strategy behind Pi

      1 April 2026
    • World

      Apple plans to open Siri to rival AI services

      27 March 2026
      It's official: ads are coming to ChatGPT

      It’s official: ads are coming to ChatGPT

      23 March 2026
      Mystery Chinese AI model revealed to be Xiaomi's

      Mystery Chinese AI model revealed to be Xiaomi’s

      19 March 2026
      A mystery AI model has developers buzzing

      A mystery AI model has developers buzzing

      18 March 2026
      Samsung's trifold gamble ends in retreat

      Samsung’s trifold gamble ends in retreat

      17 March 2026
    • In-depth
      The R18-billion tech giant hiding in plain sight - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
    • TCS
      Anoosh Rooplal

      TCS | Anoosh Rooplal on the Post Office’s last stand

      27 March 2026
      Meet the CIO | HealthBridge CTO Anton Fatti on the future of digital health

      Meet the CIO | Healthbridge CTO Anton Fatti on the future of digital health

      23 March 2026
      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses - Clare Loveridge and Jason Oehley

      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses

      19 March 2026
      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience - Theo van Zyl

      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience

      13 March 2026
      TCS+ | Flipping the narrative on AI in the Global South - Josefin Rosén

      TCS+ | Flipping the narrative on AI in the Global South

      13 March 2026
    • Opinion
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Hold the doom: the case for a South African comeback

      26 February 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » How mid-tier businesses can harness the power of hybrid cloud

    How mid-tier businesses can harness the power of hybrid cloud

    By Mooketsi Gaboutloeloe27 January 2021
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    The pace at which digital transformation is taking place is accelerating, spurred on by many technologies that continue to evolve. We will see the pace of innovation continue to increase, fuelled by new emerging technologies like artificial intelligence, machine learning, edge computing, 5G, data management and hybrid cloud. These technologies have played a key role in how businesses have redefined themselves in our “new normal”.

    But this transformation is not without its challenges for medium-sized businesses, of which there are two major pain points:

    • Moving to cloud-based environments and the infrastructure required to do this; and
    • End-to-end cybersecurity.

    A lot of medium-sized businesses struggle to stay on top of the vast amount of data that they produce as well as grapple with how to store it, keep it safe, and turn it into business insights to help them grow and prosper. If you think about it, infrastructure modernisation and technological transformation all start and ultimately come down to one thing: data.

    The adoption of technology-driven, data-centric business models requires the adoption of cloud-based infrastructure

    Data is the foundation under every aspect of your digital organisation. Data also gives you the insights into how to become more agile, derive more value for your customers, and grow revenues. It is also paramount to understand the data constraints in the business in question, which could include security, sovereignty, and the cost involved with accessing and storing vast amounts of data.

    The adoption of technology-driven, data-centric business models requires the adoption of cloud-based infrastructure, according to a study by International Data Corp, Digital Transformations for the Midmarket Through Modern Infrastructure Platforms.

    Accelerated

    The adoption of cloud computing has been accelerated over the past year, alongside the onset of the fourth Industrial Revolution. Even before the exceptional circumstances of 2020, the adoption of cloud has been systematically growing and gaining traction. “IDC recommends leveraging a hybrid cloud strategy consisting of traditional IT infrastructure, private cloud and public cloud infrastructure environments for strategic workload placement and management.”

    However, medium-sized businesses have been asking themselves: How do I consume public cloud and run on-premises environments in a consistent and easy to manage way? There is no doubt that cloud opens a world of opportunities, but many medium businesses might need assistance in implementing this and they may also want to run certain applications on premises. Hybrid cloud is a perfect multi-cloud management strategy to modernise their infrastructure, but medium-sized businesses must also streamline their multi-cloud environments. In an ESG Research Insight Paper commissioned by Dell Technologies, VMware and Intel, “one of the biggest transformations in IT service delivery over the past decade has been the emergence of public cloud infrastructure consumption”. The paper also emphasises the importance of streamlining and simplifying cloud usage to avoid “cloud sprawl” by introducing consistent infrastructure and operations.

    Cloud is not a destination, it’s a journey, so as medium-sized businesses build their cloud strategy, they must consider how they are going to consume resources from different places: on premises and via public cloud providers and how their tech providers can assist in offering some sort of consistent management framework that allows them to easily manage and consume resources from anywhere, seamlessly.

    The author, Mooketsi Gaboutloeloe, says medium-sized businesses are using up to 60 tools just for security, resulting in huge complexity

    So, if it’s clear that data drives the success of a business, it follows that with the ability to collect, share and store all this information, security becomes business critical. Firstly, medium-sized businesses should not consider security a barrier. Security should be a strategic consideration. According to a Clark School study at the University of Maryland, a cyberattack occurs every 39 seconds. Medium-sized businesses should view security as intrinsic and not an afterthought, brought onto their applications or onto new architectures that they choose to deploy in the future.

    According to IDC, medium-sized business are using up to 60 tools for security, which can result in undue complexity. This complexity is often a result of legacy and emerging workloads and can result in vulnerabilities.

    So, medium-sized businesses must think about end-to-end security, right from the device to servers to their data protection stack. Dell Technologies allows medium-sized businesses to protect their entire ecosystem providing trusted devices, trusted data centres and trusted data. Trusted devices include enterprise-grade Dell Latitude and Dell OptiPlex laptops with built-in SafeBIOS, SafeData, SafeID and other security features. Trusted data centres feature built-in BIOS-level security, like dual root of trust in PowerEdge servers, and extend across the data centre with Unity XT storage and PowerStore storage, VxRail HCI and data protection appliances. And finally, trusted data involves data security built into HCI, storage and purpose-built backup appliances, as well as device-level security such as Dell SafeGuard and Response, offering a comprehensive approach to endpoint threat management.

    A security response or framework must be implemented with the assumption that there could be some sort of data breach or cyberattack

    A security response or framework must be implemented with the assumption that there could be some sort of data breach or cyberattack. This is how a multi-layered security framework starts to take shape. Dell EMC Power Protect Cyber Recovery Solution, for example, creates a vault that is disconnected from the rest of the network, helping medium-sized businesses recover their mission-critical data after a ransomware attack, restoring this data.

    Moving forward, a holistic, new approach is required, one that is resilient, intelligent and automated, with security built in. Dell Technologies is increasingly seeking to build security acumen and standards into its technology stack through organic architectural enhancements rather than bolting it on.

    Security must be intrinsic and end-to-end, and this can only be achieved via a multi-layered approach to security. Security should live with the application, whether the application is on premises or in the cloud.

    Endpoints exposed

    The “new normal” of an increased workforce working from home means less people behind the firewall and more endpoints exposed. These endpoints could be considered vulnerabilities if security is not end-to-end.

    In the digital era, data drives the success of your business, powering everything from customer acquisition strategies to growth strategies and ultimately the evolution of your business in response to environmental change. Medium-sized business teams rely daily on the digital information from the data that they generate, collect, share and store as they do their work and interact with their customers. So, medium-sized businesses should not get hung up on how they can get back to “normal” post-2020, but rather take advantage of the opportunity that has been presented to prepare for the next disruption with the help of technology – whatever it may be.

    • Mooketsi Gaboutloeloe is systems engineer, medium business and CTO ambassador, Dell Technologies South Africa
    • This promoted content was paid for by the company concerned
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    Dell Dell Technologies Mooketsi Gaboutloeloe
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleHuge Telecom launches another wireless voice industry first
    Next Article Up to R24-billion needed to vaccinate 40 million South Africans: treasury

    Related Posts

    RAM prices are surging, threatening to drive up the cost of PCs, smartphones and other consumer electronics devices

    AI is eating the world’s memory – and we’re all going to pay the price

    22 January 2026
    First Technology Western Cape delivers the tools - and intelligence - behind modern business - Dell Technologies

    First Technology Western Cape delivers the tools – and intelligence – behind modern business

    29 December 2025
    How First Technology Western Cape supports green IT initiatives - Dell Technologies

    How First Technology Western Cape supports green IT initiatives

    29 December 2025
    Company News
    Mining's problem isn't output, it's execution - Workday

    Mining’s problem isn’t output, it’s execution – Workday

    1 April 2026
    Paratus launches Starlink-powered connectivity for Africa's essential services - Paratus Essential Access

    Paratus launches Starlink-powered connectivity for Africa’s essential services

    1 April 2026
    How consumers can identify a true QLED TV

    How consumers can identify a true QLED TV

    30 March 2026
    Opinion
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026
    Hold the doom: the case for a South African comeback - Duncan McLeod

    Apple just dropped a bomb on the Windows world

    5 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    R12.1-billion wasted as government IT projects collapse - Sita

    R12.1-billion wasted as government IT projects collapse

    1 April 2026
    DStv 4K streaming launch is not imminent

    R99 DStv deal to keep Showmax subscribers from bolting

    1 April 2026
    The biggest untapped EV market on Earth is hiding in plain sight

    The biggest untapped EV market on Earth is hiding in plain sight

    1 April 2026
    Mining's problem isn't output, it's execution - Workday

    Mining’s problem isn’t output, it’s execution – Workday

    1 April 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}