Enterprise stores on average 50 per cent of their data in branch offices, to which they dedicate half of their total IT budget. In practice, this means half of the IT organisations are using outdated methods of operation, writes ELKHAYAT, REGIONAL of Riverbed Technology.
Today’s enterprises store on average 50 per cent of their corporate data in branch offices, to which they dedicate half of their total IT budget. In practice, this means half of today’s IT organisations are using outdated methods of operation which, in addition to being costly and complex to manage, limit IT’s ability to proactively respond to businesses’ ever-changing needs, prevent security breaches, and recover from unplanned outages.
As a result, some organisations are taking a new approach to branch IT, in order to improve system performance and resiliency, ensure reliable data backups, and greatly reduce operating expenses. While equipping edge locations has traditionally been all about infrastructure — the hardware, routers and switches, backup systems, and software that are there to make employees as productive as possible — enterprises are asking themselves what it takes to manage their remote locations efficiently. What are the operational costs associated with their infrastructure? How is employee productivity affected by their decisions?
To answer these questions, organisations should review the following checklist, which includes items relating to:
· Infrastructure: What are the key traits of a modern edge infrastructure?
· Operations: What are the costs associated with managing edge infrastructure?
· Business needs: How can organisations maximise their return on investment?
To ensure secure and efficient IT in remote offices and branch offices (ROBO), organisations should ensure the following when planning their infrastructure:
1. Ensure compute is separate from data: Modern infrastructure separates compute, which should remain at the edge, from data storage, which should be centralised. This approach yields a stateless edge and eliminates many operational challenges and costs.
2. Centralise data storage: Organisations should store 100 per cent of their company data in the datacentre where it can be managed and protected. From there, it can be projected to the edge on an as-needed basis. This removes sensitive information from vulnerable remote locations, and gives IT teams far more control over the data.
3. Centralise backup: Edge-based backup can be expensive and error-prone. Instead, data backups should be centralised in the datacentre, and be automated and continuous. This will ensure backups are reliable and efficient, while significantly reducing costs.
4. Optimise the WAN: Wide area network (WAN) optimisation helps further streamline branch infrastructure by accelerating branch user applications and data traffic across the optimal networks at the lowest cost. As WANs are notoriously unreliable and do not offer protection against the creation of localised pockets of systems and information stores, organisations should implement the use of specialised tools that enable the convergence of IT systems and applications with WAN optimisation technologies. In this way, they will achieve maximum performance across distance.
5. Encrypt all data: To help protect against cyber threats, all company data should automatically be encrypted at both when it’s at rest (both in branch offices as well as in datacentres) and when it is being transported back and forth.
IT teams need to be able to quickly provision and manage edge infrastructure in a timely and cost-effective way. They can achieve this by ensuring the following:
6. Carry out fast provisioning: The IT team should be able to update edge locations with new applications and features, and provision a new edge location from the organisation’s central datacentre in minutes — without costly and time-consuming onsite visits.
7. Ensure fast ROBO recovery: When an unplanned outage occurs, rapid recovery is a must to keep business operations up and running. So that operations resume in minutes or hours and with minimal loss of working data, IT needs to be able to initiate the recovery process from the datacentre.
8. Protect data: From an operational point of view, data encryption should be available at rest and in motion, and backups should be affordable, automatic, centralised, and continuous.
9. Manage storage in the cloud: So as to avoid excessive storage costs and operational overhead, organisations should eliminate storage in edge locations, making them stateless edges. A good way to achieve this is by taking advantage of cloud storage’s low costs.
In order to satisfy infrastructure related business needs, organisations need to ask themselves several questions: Does their infrastructure help them stay competitive and act quickly in the face of changing markets? Can the business satisfy customers’ needs around the clock? How can the organisation get products to market faster? How does your infrastructure investment drive business ROI?
10. Keep employees productive: IT can contribute to increasing employees’ productivity by enabling them to access applications, updated data and information, any time, any place.
11. Achieve business continuity: If a disaster strikes, IT should be able to quickly recover data and applications. The team should also have the tools needed to shift operations to a different region without much loss of time or data.
12. Make the business agile: The organisation’s infrastructure should let the business respond to changing market conditions by quickly provisioning users with new applications and features. It should also provide the ability to quickly open new locations in order to take advantage of new opportunities.
With remote offices and branch offices playing a crucial role in modern business, today’s enterprises have entered a new era with new technologies and new thinking about edge IT investments. In order to achieve operational cost savings, rapid service deployment, and instant recovery — all while providing unmatched data protection — IT needs to understand what’s happening across the business and act accordingly. By ensuring that the right tools and processes are in place, organisations can ensure the security, resilience and flexibility they need to meet today’s business needs.
Now download a bank account
Absa has introduced an end-to-end account opening for new customers, through the Absa Banking App, which can be downloaded from the Android and Apple app stores. This follows the launch of the world first ChatBanking on WhatsApp service.
This “download your account” feature enables new customers to Absa, to open a Cheque account, order their card and start transacting on the Absa Banking App, all within minutes, from anywhere and at any time, by downloading it from the App stores.
“Overall, this new capability is not only expected to enhance the customer’s digital experience, but we expect to leverage this in our branches, bringing digital experiences to the branch environment and making it easier for our customers to join and bank with us regardless of where they may be,” says Aupa Monyatsi, Managing Executive for Virtual Channels at Absa Retail & Business Banking.
“With this innovation comes the need to ensure that the security of our customers is at the heart of our digital experience, this is why the digital onboarding experience for this feature includes a high-quality facial matching check with the Department of Home Affairs to verify the customer’s identity, ensuring that we have the most up to date information of our clients. Security is supremely important for us.”
The new version of the Absa Banking App is now available in the Apple and Android App stores, and anyone with a South African ID can become an Absa customer, by following these simple steps:
- Download the Absa App
- Choose the account you would like to open
- Tell us who you are
- To keep you safe, we will verify your cell phone number
- Take a selfie, and we will do facial matching with the Department of Home Affairs to confirm you are who you say you are
- Tell us where you live
- Let us know what you do for a living and your income
- Click Apply.
How we use phones to avoid human contact
A recent study by Kaspersky Lab has found that 75% of people pick up their connected device to avoid conversing with another human being.
Connected devices are becoming essential to keeping people in contact with each other, but for many they are also a much-needed comfort blanket in a variety of social situations when they do not want to interact with others. A recent survey from Kaspersky Lab has confirmed this trend in behaviour after three-quarters of people (75%) admitted they use a device to pretend to be busy when they don’t want to talk to someone else, showing the importance of keeping connected devices protected under all circumstances.
Imagine you’ve arrived at a bar and you’re waiting for your date. The bar is busy, and people are chatting all around you. What do you do now? Strike up a conversation with someone you don’t know? Grab your phone from your pocket or handbag until your date arrives to keep yourself busy? Why talk to humans or even make eye-contact with someone else when you can stare at your connected device instead?
The truth is, our use of devices is making it much easier to avoid small talk or even be polite to those around us, and new Kaspersky Lab research has found that 72% of people use one when they do not know what to do in a social situation. They are also the ‘go-to’ distraction for people even when they aren’t trying to look busy or avoid someone’s eye. 46% of people admit to using a device just to kill time every day and 44% use it as a daily distraction.
In addition to just being a distraction, devices are also a lifeline to those who would rather not talk directly to another person in day-to-day situations, to complete essential tasks. In fact, nearly a third (31%) of people would prefer to carry out tasks such as ordering a taxi or finding directions to where they need to go via a website and an app, because they find it an easier experience than speaking with another person.
Whether they are helping us avoid direct contact or filling a void in our daily lives, our constant reliance on devices has become a cause for panic when they become unusable. A third (34%) of people worry that they will not be able to entertain themselves if they cannot access a connected device. 12% are even concerned that they won’t be able to pretend to be busy if their device is out of action.
Dmitry Aleshin, VP for Product Marketing, Kaspersky Lab said, “The reliance on connected devices is impacting us in more ways than we could have ever expected. There is no doubt that being connected gives us the freedom to make modern life easier, but devices are also vital to help people get through different and difficult social situations. No matter what your ‘connection crutch’ is, it is essential to make sure your device is online and available when you need it most.”
To ensure your device lifeline is always there and in top health – no matter what the reason or situation – Kaspersky Security Cloud keeps your connection safe and secure:
· I want to use my device while waiting for a friend – is it secure to access the bar’s Wi-Fi?
With Kaspersky Security Cloud, devices are protected against network threats, even if the user needs to use insecure public Wi-Fi hotspots. This is done through transferring data via an encrypted channel to ensure personal data safety, so users’ devices are protected on any connection.
· Oh no! I’m bored but my phone’s battery is getting low – what am I going to do?
Users can track their battery level thanks to a countdown of how many minutes are left until their device shuts down in the Kaspersky Security Cloud interface. There is also a wide-range of portable power supplies available to keep device batteries charged while on-the-go.
· I’ve lost my phone! How will I keep myself entertained now?
Should the unthinkable happen and you lose or have your phone stolen, Kaspersky Security Cloud can track and protect your device from data breaches, for complete peace of mind. Remote lock and locate features ensure your device remains secure until you are reunited.