IT Brief New Zealand logo
Technology news for New Zealand's largest enterprises
Story image

Infrastructure as a service – providing businesses with flexibility

Thu 1 Sep 2011
FYI, this story is more than a year old

The amount of data in the world is increasing exponentially every second and many data centers are running out of capacity to house this information. Businesses need to decide whether to expand existing data center space, or engage in the costly and labour intensive exercise of building new facilities. Coupled with escalating energy and operational costs, some companies are now spending 70% of their IT budgets on maintenance with little time for innovation. It is against this changing IT background that many enterprises across the world are moving away from tightly integrated, long-term commitments, of client-owned assets, to emerging "Infrastructure-as-a-Service” (IaaS) offerings.

Companies are no longer required to own infrastructure to produce their product. Instead, they can purchase virtual space on a server, allowing for more flexibility in workflows. New IT delivery and infrastructure models, such as cloud computing or converged infrastructures offer increasing competitive advantages, and while some people believe that the cloud could be the death of outsourcing as we know it, it should be seen as an opportunity.

For the first time, businesses will have the ability to use many different delivery methods to acquire IT services, as information technology quickly becomes a profitable service instead of a hired department. As businesses can no longer afford to rely on a one-size-fits-all model to meet core services, today’s enterprise will require the best methods of IT service delivery to drive innovation, at a cost that meets solid return on investment metrics, in the timeframe needed. The role of the cloud for IaaS Much of the current attention centres on cloud computing services, which can be defined as a delivery model for technology-enabled services that provides on-demand access to an elastic pool of shared computing assets.

These assets include applications, servers, storage, and networks – all of which can be rapidly provisioned with minimal service provider interaction. The entire pool can be scaled up or down as needed on a pay-per-use basis. In other words, these assets can now be consumed "as a service.” This hybrid, responsive delivery model helps clients build, manage, transform and consume services using the right delivery approach to meet their needs. However, such services are not an immediate cure-all, and there are CIO challenges for an agile business IT infrastructure including:

  • Available, experienced personnel.
  • Optimised standard architecture, automated processes, and best practices.
  • Consistent deployment and measurements of service delivery performance.
  • Transformation skills and resources.
  • IT interoperability and integration across the enterprise.
  • Scalable IT services that respond to changes in business demands.

There is understandable hesitation among large businesses that require enterprise-class IT resources and services about what the cloud can and cannot deliver. However, the market is maturing, and IT providers have assembled portfolios of products and services to help enterprises realise the promise of IaaS.

The degree to which an organisation should move IT activities to a service provider depends on the individual requirements of that business – its core competencies, security requirements, government and industry regulations and business goals. Each organisation’s individual needs must be evaluated to determine what shape and form their environment should take, whether that be outsourced, in-sourced, cloud delivered or a hybrid mix.

As it relates to off-shoring, the cloud delivery model is a highly automated service type. As organisations begin to consume pre-built cloud services, they should expect a fall in the manual human effort required to manage the IT compared to traditional methods.  With the cloud, those people who would manage the traditional IT – whether onshore or offshore – are now adding greater value to the business by finding ways to innovate, increase customer satisfaction, and plan for business growth.

Instead of approaching the situation as cloud versus outsourcing, businesses need to focus on a hybrid approach. This will allow them to build, manage, transform and consume IaaS, using the right delivery approach that is specific to their business needs 

 

Related stories
Top stories
Story image
Cloud
Whispir reports significant revenue growth as CaaS market expands
Australian cloud platform Whispir has announced its financial results, reporting significant growth as it continues to introduce new Communications-as-a Service (CaaS) offerings to the market.
Story image
Mobility
Cradlepoint launches architectural extension of NetCloud solution
With this latest release Cradlepoint is focused on helping lean IT organisations with advanced SD-WAN and zero trust capabilities.
Story image
Solutions
Ivanti reveals potential ROI of 261% for Endpoint Management Solution
Ivanti has announced the results of a commissioned Total Economic Impact (TEI) study conducted by Forrester Consulting.
Story image
Collaboration
Schneider Electric launches Connected Services with Claroty
Schneider Electric is teaming up with Claroty to assist in maintaining cybersecurity for physical assets - a critical issue.
Story image
Microsoft
8x more users attacked via old Microsoft Office vulnerability in Q2
"Criminals craft malicious documents and convince their victims to open them through social engineering techniques."
Story image
Facial recognition
Benefits vs risks of facial recognition technology
Once a distant, futuristic concept, facial recognition technology is now found in many technological applications with a variety of different functions. 
Story image
Banking
Virgin Money works with 9Spokes to create custom offering
Virgin Money has worked with Kiwi SaaS 9Spokes to build a custom version of its business dashboard offering, M-Track, to generate stronger insights for the bank and its customers.
Story image
Biometrics
Can biometrics help? 123% increase in Gen Zs scammed online
In the three years leading up to 2022, the number of Gen Zs who fell victim to online scams rose by 123%, according to Ping Identity.
Story image
Data Protection
Safeguarding your financial data
As the digital revolution marches on, managing data security has never been more important. Here are five important steps to take toward better financial data security.
Story image
JLL
Investment in APAC cold storage to reach $5 in next decade
Investment in Asia Pacific’s cold storage market is expected to grow fivefold in the next decade, according to JLL.
Story image
Cloud Security
Tenable makes additions to Cloud Security portfolio
Tenable has announced additions to Tenable Cloud Security that represent the next step in assessing threats related to cloud vulnerabilities.
Story image
InternetNZ
How well do rangatahi understand cyber safety in Aotearoa?
Do rangatahi in Aotearoa understand the importance of being safe online, or has lifelong exposure to the internet resulted in widespread complacency?
Story image
Artificial Intelligence
Gartner unveils key emerging tech to watch in 2022
"Such technologies present greater risks for deployment, but potentially greater benefits for early adopters," says Gartner.
Story image
Digital Transformation
Federated change is the best path to digital evolution
Businesses that can successfully manage the exponentially expanding masses of data produced by modern consumers will be the businesses that survive and prosper.
Story image
Firewall
Why printing security plays a vital part in keeping Aotearoa safe
While internet printing, mobile printing and other similar technologies have no doubt made things easier to manage, it has also brought a whole new set of problems to the table.
Story image
MarTech
CM Group recognised as Best Overall MarTech Company
MarTech Breakthrough has ranked CM Group as the Best Overall MarTech Company for the third year running and Cheetah Digital as Best Overall Marketing Campaign Management Solution.
Story image
Microsoft
Avast reveals zero-day exploits targeting Chrome and Microsoft
Avast, released its Q2/2022 Threat Report today, revealing a significant increase in global ransomware attacks, up 24% from Q1/2022.
Story image
Tech job moves
Tech job moves - Fastly, INX, Kinly, SmartBear & Vectra AI
We round up all job appointments from July 29 - August 12, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Email scams
HelpSystems shines light on impact of response-based threats
Response-based attacks targeting corporate inboxes have climbed to their highest volume since 2020, representing 41% of all email-based scams.
Story image
Data analytics
Pressure on orgs to up their data analytics game - study
A recent report from Sisense highlights data transmission, analysis, and risk management remain top concerns for data professionals in APAC.
Story image
Lucid Software
Lucid Software expands enterprise offerings with enhanced slack apps
Lucid Software has expanded its enterprise offerings with enhanced slack apps for its Lucidspark and Lucidchart technology.
Story image
Cybersecurity
CISOs need to consider a risk-based cybersecurity strategy
Rather than talking in terms of attack vectors and vulnerabilities, CISOs and security decision-makers must look at actual business risk.
Story image
Artificial Intelligence
Appier achieves historically high growth rate of 56% YoY
"Our strong momentum over the past two quarters underscores Appier's significant growth alongside our customers."
Story image
Augmented Reality
TeamViewer remote access software integrated into RealWear Cloud
TeamViewer has announced a major expansion of its partnership with RealWear, a leading provider of assisted reality wearable solutions for frontline industrial workers. 
Story image
Mobiles
Demand grows for future-proof mobile access solutions
HID Global, in partnership with IFSEC Global, recently released the 2022 State of Physical Access Control report for the fourth year running.
Story image
Hybrid Cloud
The essential guide to digital transformation by SolarWinds
Digital transformation is a buzzword thrown around all the time by companies, but what does it actually mean and why is it important? SolarWinds breaks it down.
Story image
DevOps
Dynatrace extends application security capabilities for runtime environments
Dynatrace has announced that it has extended its Application Security Module to detect and protect against vulnerabilities in runtime environments.
AWS Marketplace
Learn how security orchestration, automation, and response (SOAR) enhances your security strategy.
Link image
Story image
Contact Centre
Treasure Data launches new customer experience functionality
Treasure Data has introduced a new strategic vision and product positioning for Customer Data Cloud, reflecting the company's focus.
Story image
Data
Workday research finds A/NZ organisations becoming leaders in digital agility
New research from Workday and IDC has revealed that Australia and New Zealand are becoming leaders in digital agility.
Story image
Ransomware
Sophos reveals latest ransomware trend impacting orgs
Sophos has announced in a new whitepaper that Hive, LockBit and BlackCat, three prominent ransomware gangs, consecutively attacked the same network.
Story image
Digital Transformation
Top tips for making your finance transformation program a resounding success
Planning to make 2023 the year you embark on a wholesale finance transformation program? It’s a move that will stand your enterprise in excellent stead as you navigate the complexities of the post-Covid business landscape.
Story image
ROI
How to increase the success rate of business data projects
Amid changing economic conditions and uncertainties about supply chains and staff availability, it's never been more important for New Zealand organisations to be innovative.
Story image
Low-code
Video: 10 Minute IT Jams - An update from Mendix
Mendix is a low-code platform used by businesses to develop mobile and web apps at scale, and Jornt joins us today to discuss how these offerings work, and what benefit they have in the development process.
Story image
Data Protection
Advancing genomic sequencing and public health with digital infrastructures
Right before our eyes, we've witnessed the development of the COVID-19 vaccine in record time. An enormous achievement in an otherwise lengthy task that previously took, on average, 10-15 years.
Story image
Artificial Intelligence
Concentric AI protects sensitive data with new capabilities
The new capability reveals sensitive data shared across email and business messaging platforms and highlights who has inappropriate access to content.
Story image
Artificial Intelligence
Is your chatbot bringing down the customer satisfaction score?
The top 10 reasons why chatbots are failing to meet customer expectations and what you must do to avoid that.
Story image
Blockchain
Australian Grand Prix uses CENNZnet blockchain for fan experience
CENNZnet was employed by Power'd Digital to deliver the Formula 1 Heineken Australian Grand Prix's 2022 AusGP Access program.
Story image
Digital Transformation
Why it is imperative to keep up with technology advancements
Technology is constantly evolving, which is why digital transformations can often be complicated. What legacy items stay? Will the new and old work together? Or is there a whole new system that we need to introduce?
Story image
Malware
Kaspersky uncovers new attacks by advanced persistent threat group
The attacks involved modifications of the well-known malware, DTrack, as well as the use of a brand-new Maui ransomware.
Story image
Collaboration
Lacework launches new capabilities for better threat detection
Lacework has announced new capabilities that enable organisations to uncover more critical threats to their infrastructure and empower teams.