Search
Close this search box.

Introducing Legalty, Our Cloud-Powered Solution For Law Firms

Legalty by BUI

Security and mobility for small and medium-sized legal practices

  • Briefs. Memos. Notes.
  • Contracts. Deeds. Permits.
  • Statements. Agreements. Settlements.
  • Court papers. Case files. Transcripts.
  • Financial documents. Forensic reports.
  • Personal information. Client particulars.

Law firms handle large volumes of data

And they’re duty-bound to ensure the privacy and security of such sensitive material.

But it’s not always easy in digital environments with multiple end-users and multiple points of access.

That’s why we’ve created Legalty.

Legalty gives lawyers, attorneys, partners, paralegals, and their support staff the tools they need to work securely – and efficiently – everywhere, every day.

How?

By combining the law firm’s existing legal software and Microsoft 365 in a managed, cloud-based environment that supports data encryption and device control. With built-in security. With built-in redundancy protocols. With comprehensive technical support. With a transparent pricing plan. Without bulky hardware. And without costly local servers.

Unified, simplified, secured

Legalty can be deployed for legal practitioners using LegalSuite, Lexis Convey, and most other third-party legal software applications.

Our all-in-one solution helps law firms to:

  • deliver enterprise-grade, always-on security for their IT environments
  • provide secure access for their team members to work remotely
  • ensure data protection and data privacy across devices
  • safeguard their digital resources against malware.

Legalty includes Office 365, with perennially popular Microsoft applications (like Excel, Word, and PowerPoint) that are up to date and accessible anywhere, at any time, using a computer, tablet, smartphone, or other device connected to the Internet.

Legalty comes with top-notch communication tools that enable group email, team chat, and collaborative online meetings, as well as calendaring and scheduling facilities to simplify diary planning and management.

Legalty also features Advanced Threat Protection, a comprehensive security solution designed to protect organisations from increasingly sophisticated phishing and ransomware attacks.

Want to know how Legalty can help your law firm to achieve more? Explore the Legalty website.

Keen to see Legalty in action? Request a demo with our team.

BUI is an official Microsoft Partner in South Africa, and an award-winning leader in identity and security solutions.

BUI Joins Cloudflare’s Partner Programme

A STRATEGIC ALLIANCE

We’ve teamed up with a global innovator to boost our range of security solutions

Ever heard of Cloudflare? It’s a web performance and security company on a mission to speed up and protect websites, ecommerce stores, SaaS products, mobile applications, APIs, and other properties connected to the Internet.

It’s also our newest ally.

Security and speed are critical for successful business operations in today’s digital economy, and our managing director, Ryan Roseveare, believes Cloudflare’s commitments in both areas mirror BUI’s own. “We investigated several vendors, as well as traditional technology providers, in this space. We chose to team up with Cloudflare because it’s a market leader with a cost-effective solution that complements our deep cloud security model.”

Cloudflare’s security services are designed to mitigate DDoS attacks, prevent data breaches, and block malicious web traffic. “We’re going to be able to offer our clients reliable and redundant solutions with security in mind for their cloud, hybrid, and on-premises requirements,” says Roseveare.

Cloudflare serves data from more than 150 international data centres, including three on South African soil. The company opened its Johannesburg data centre in 2014 and facilities in Cape Town and Durban followed in May 2017 and March 2018, respectively.

Roseveare is confident that Cloudflare’s SA footprint will translate into tangible performance benefits for BUI’s local clients. “We’ve completed several proof of concept demos and deployments already,” he says.

Cloudflare’s technology is easy to integrate and simple to scale. Watch the video below to learn about its real-world applications…

“We’re excited to collaborate with Cloudflare to provide our own clients with services that further secure their environments,” concludes Roseveare. “We’re looking forward to designing and deploying tailored Cloudflare solutions for our clients.”

As an Enterprise Partner, BUI is an authorised reseller of Cloudflare’s cutting-edge suite of services.

MORE ABOUT CLOUDFLARE

Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code.

Internet properties powered by Cloudflare have all traffic routed through its intelligent global network, which gets smarter with each new site added.

Cloudflare has been recognised by the World Economic Forum as a Technology Pioneer, and named the Most Innovative Network & Internet Technology Company for two years running by the Wall Street Journal.

Visit the Cloudflare website for more information, or follow Cloudflare on FacebookLinkedIn, or Twitter for news and updates.

BUI is an official Microsoft Partner in South Africa, and an award-winning leader in identity and security solutions.

CASE STUDY: A Productivity-Enhancing Cloud Journey

AMPLIFYING WITH AZURE

Moving a fully functioning business to the cloud with minimal disruption takes expertise, preparation, and an innovative approach to problem-solving.

In the September 2018 edition of the BUI Bulletin, we briefly discussed our latest Azure migration project. Here, we highlight key stages in that journey to help you understand how we solved a complicated business problem with cloud technology.

The business problem

Our customer, a financial services company, was hosting its entire online environment with front-facing websites at a large local hosting provider in South Africa.

BUI was brought in to help the business migrate all its services to Azure. The move had to be done seamlessly, with zero downtime. It also had to happen in the background, without affecting normal operations.

The solution

Solving the customer’s problem involved end-to-end service delivery from BUI.

We harnessed the strength and expertise of our networking team and our Azure cloud architects to successfully migrate the customer’s digital environment into Azure – with zero downtime.

In technical terms, we moved the customer’s entire online environment by using Network Address Translation (NAT) to re-map the IPs across ExpressRoute. We secured the solution in Azure behind next-generation firewall virtual appliances and took care of the high availability concerns with Azure Load Balancers. The security happens when the previous provider NATs it over ExpressRoute into Azure, where it hits the Load Balancers. Now, we are passing through the traffic and keeping the source address throughout the whole transaction until it lands in the back-end database behind the firewall and two Load Balancers. The entire process runs without any downtime for our customer, or any of its own clients.

Azure services are now being used instead of Virtual Machines, all Load Balanced and Highly Available.

The following technologies were among those used or implemented to achieve a successful migration and an improved overall security infrastructure:

  • Azure Network Watcher
  • Azure Backup for instances
  • Azure Backup for SQL Server
  • Azure Batch (to run the customer’s batch jobs and queuing jobs efficiently in Azure)

The benefits

Our customer has been running services in Azure for more than 30 days, and already there is a substantial cost saving.

Improved performance has also been noted: batch processes that took 15 minutes to complete with the previous provider now take under 60 seconds.

Enhanced security has been a particular game-changer for our customer… There were audible gasps when the results were first viewed via Azure Security Center and Azure Network Watcher. “All of a sudden, we can see all the malicious attacks that are hitting our web front ends! A real eye-opener,” said a key staff member.

The future

The next step is to replicate the same environment to another region in Azure as a Disaster Recovery Site.

This customer’s appetite for Azure services has grown enormously – because the business benefits are clear.

Looking for ways to make your business more efficient and more agile?

Book your assessment with BUI’s Azure experts.

We’ll make cloud migration simpler and more manageable for you.

BUI is an official Microsoft Partner in South Africa, and an award-winning leader in identity and security solutions.

Responding to a cyberattack? Bring your ‘A’ game

The actions that you take during a cyberattack can affect the speed and strength of your recovery afterwards.

Do you have a comprehensive incident response strategy?

Safeguarding business systems and software applications against cyberattacks and data breaches is essential in today’s connected world. We’ve already discussed why digital identity management and network security should be core components of your overall cybersecurity framework. We’ve also looked at the most common types of malware used by hackers, and seen that the threat landscape demands robust cyber protection throughout every organisation.

But what happens when cybercriminals actively bombard your defences? Or worse, when they find a way to override your security protocols and penetrate your systems? Sometimes, even the best precautions aren’t good enough to impede the rogue actors lurking in the darkest corners of the web. That’s why a detailed incident response plan is imperative. Here are five things to consider when you’re formulating your strategy…

It pays to be proactive

Cyber attackers are targeting corporate digital assets – repeatedly, and with diverse tactics. No industry is immune. No business is immune. And the fallout is not purely financial: recent intelligence reports have highlighted the risk to brands, reputations, and relationships.

If you accept that a security incident is probable, if not inevitable, then you can make advance preparations to limit the damage to your business.

You need the right team for the job

Your IT personnel will have critical roles to play in the midst of a cyberattack, but they won’t be the only staff members with key responsibilities. It’s important to assemble a multifaceted incident response team that includes:

  • technical professionals to analyse the problem, assess the impact on the business, implement remedial solutions, and monitor system integrity in the immediate aftermath of the attack;
  • public relations officials and spokespersons to handle internal and external communication and messaging related to the incident; and
  • lawyers to provide clarity on the legal implications of any action (or inaction) related to the incident.

The size and structure of your team should be determined by the scale and complexity of your organisation. National enterprises might need interdepartmental hierarchies of responders to co-ordinate efforts in different provinces; mid-market businesses in single locations might need only a handful of specialists to address the issues at hand. Define individual roles and responsibilities so that they’re clear to all team members.

The paperwork is necessary

Every second counts in a crisis scenario, so make sure that your documented incident response plan is easily accessible. Core team members should have hard copies (printed versions) stored securely in their respective offices. The digital master document should ideally be stored offline on a standalone machine: if the cyberattack in question is a network breach or disruption, there’s a chance you won’t be able to retrieve the digital file from a network location.

Communication counts

Your response team should be ready to communicate with a wide range of stakeholders, including employees, partners, suppliers, customers, board members, investors, shareholders, competitors, and the media. Interested parties will want to know how you’re responding to the cyberattack – and they’ll expect regular, in-depth updates that address their respective concerns.

Remember to consult your legal advisors regarding any communication obligations you may have as a result of local or international law. South Africa’s POPI Act and the European Union’s GDPR, for example, are pieces of legislation that deal with data privacy.

There will be lessons to learn

In triage mode, your team will be focused on problem-solving and damage control in line with the incident response plan – but a successful cyberattack should warrant a full investigation of your protocols and procedures. Plan for a review of your cybersecurity initiatives, or call in specialist consultants to put your playbook under a microscope.

Have you secured your digital assets? Ask us about cyber security consulting, penetration testing, and vulnerability scanning. We’ll help you strengthen your defences.

BUI is an official Microsoft Partner in South Africa, and an award-winning leader in identity and security solutions.

Are You Prepared For A Network Breach?

Sly cybercriminals are refining their attack methods for maximum impact and minimum traceability.

Who is monitoring your network for suspicious activity?

If you read our recent post on cybersecurity, then you’ll know that malware is a growing menace in the virtual world. It’s also a popular tool for hackers looking to penetrate sensitive business networks. Early detection is critical if you hope to minimise the damage, disruption, and potential financial losses caused by a serious network breach.

Here are five ways to prepare your business for the challenges related to network security…

#1 | Get to grips with the modern threat landscape

Cyberspace is more like a battlefield than a business park – and you need to be familiar with the terrain. You also need to understand your enemies. What would they want? Where would they strike? How would they operate?

They could be financial hackers using fake accounts to target your money. They could be corporate spies intent on stealing your product plans. They could be rogue activists looking to publish your private data. Identify the prevailing risks so that you can plan accordingly.

#2 | Hire professionals with the right expertise

Cybersecurity experts have a deep understanding of historic, current, and evolving cyber threats. Highly skilled, and armed with both technical knowledge and social awareness, they are the guardians you need on the front line.

The integrated, interdependent IT systems found in mid-market and enterprise-level businesses are particularly complex in nature. Enlist specialists who can create customised solutions for your company’s unique network vulnerability issues.

#3 | Leverage the technology at your disposal

Security fundamentals like digital identity management and access control will help you to track the people authorised to utilise your network, but illicit users can be difficult to detect without the right resources.

Threat detection tools enable your cybersecurity pros to monitor network activity in real time. Consider investing in a comprehensive program that can provide detailed data, event logs, and incident reports for every action – and every anomaly – related to your network.

#4 | Follow recommended best practices and stay informed

Make sure that your technical staff are carrying out updates, implementing patches and fixes, and performing the maintenance required to ensure the integrity of your network, systems and applications.

Subscribe to industry newsletters, study threat intelligence reports from leading stakeholders, read cybersecurity blogs, and keep an eye on local and international headlines. The broader your knowledge, the greater your advantage over the perpetrators of cybercrime.

#5 | Educate and involve your non-technical staff

It’s easy to think of cybersecurity as the exclusive responsibility of your technical experts, but business-wide vigilance is increasingly necessary to combat today’s cyber threats. Teach your personnel – from data-capturers and personal assistants to financial administrators and senior executives – to look for warning signs that could indicate a breach.

Encourage all your network users to report any activity that seems out of the ordinary. Have they been locked out of their accounts for no apparent reason? Have they experienced random system reboots? Seemingly insignificant events can sometimes be the very symptoms your IT teams need to diagnose a network security issue.

Online ecosystems are becoming more complex. Networks are expanding. And relentless cyber fiends are targeting even the most comprehensive ring fences. To protect your digital assets, you need to make network security a priority for your whole team.

When last did you evaluate your network security protocols? Ask us about embedding cybersecurity at the heart of your business. We’ll help you balance your organisation’s productivity with robust prevention and detection initiatives.

You Can’t Afford To Be Complacent About Cybersecurity

Cybercriminals are targeting everything from networks to inboxes as they fine-tune their instruments of disruption and destruction.

How strong are your defences?

In last week’s blog post, we looked at digital identity management and why it’s essential to control access to your important assets and sensitive data. Compromised or stolen user credentials (including login names and passwords) are sometimes the only things required for hackers to penetrate business systems. But the most efficient villains in cyberspace are arguably the ones expanding their toolsets, refining their methods, and adapting their strategies. To combat their efforts, you must do the same – and more.

How many times have you seen the words “hacked” and “breached” in news headlines this year? Two industry studies – Microsoft’s latest Security Intelligence Report and Cisco’s Annual Cybersecurity Report – recently documented the most prevalent threats in the digital domain. Malware was highlighted as a growing problem.

A menace in the virtual world

Malware is the term for any kind of malicious software that’s designed to disrupt, harm or gain unauthorised access to a computer system. From the intrusive to the blatantly hostile, malware can take the form of a computer virus or worm, a Trojan horse, or even a piece of ransomware. The program code is created for a specific, nefarious purpose.

Computer viruses and worms were some of the earliest forms of malware. Viruses delete, corrupt, or steal data, and are capable of spreading from one infected computer to another. Worms spread copies of themselves from machine to machine, without any human involvement, and leverage networks to replicate rapidly.

Trojan horse malware masquerades as something else, much like its wooden namesake from Greek mythology. Computers become infected when people download insidious programs or applications disguised as legitimate resources. Trojan horses can be exploited to give hackers remote access to impaired computers, or to record sensitive data through keystroke logging.

Ransomware is an apt name for the type of malware that effectively limits or blocks access to files, folders, or systems until a ransom is paid. In some of the most prominent cases last year, cybercriminals encrypted, stole, or threatened to publish sensitive data belonging to banks, law enforcement agencies and corporate institutions unless they received hefty sums of money.

Malware is a formidable weapon in an attacker’s arsenal, but it’s certainly not the only one. Have you done enough to protect your network from sophisticated security threats?

Effective security is a team sport

You’ve heard that proverb about chains and weak links, right? We’d argue that the same applies for networks and people… The security of your network depends, in part, on the people connected to it. And if those people are ignorant about best practice, or complacent about passwords, or nonchalant about the perils of cyberspace, then your system could be vulnerable.

In modern enterprises, networks are often the foundations of all digital architecture. From enabling communication to supporting software and applications, networks are critical pathways for productivity. And that means they need to be protected – from internal and external threats. Creating a culture of awareness within your organisation is an important step. Get your employees involved by educating them about the latest cyber threats (especially those associated with the tools they use every day, like email) and the importance of people-centric enhanced security measures (like multi-factor authentication for account logins).

If your people are informed and aware, then they’ll be better equipped to identify and report any unusual or suspicious network activity. Early detection is critical in any threat scenario, and your IT staff would likely welcome business-wide vigilance.

Is your business challenged around cyber security and identity management? BUI’s experts have in-depth knowledge and experience across several next-generation solutions that are redefining the way the world looks at information security. Ask us about cyber security consulting, penetration testing, and vulnerability scanning. We’ll help you strengthen your security posture.

BUI is an official Microsoft Partner in South Africa, and an award-winning leader in identity and security solutions.

‘Be Yourself – And Never Stop Learning’

BEHIND THE SCENES AT BUI

Business Development Manager Lizette van Wyk tells us why she’s still excited about technology after two decades in the industry.

Lizette van Wyk is a senior member of the BUI team in Johannesburg. She’s an experienced developer, solutions architect, project manager and sales consultant who joined us in 2015. We asked her about her role models, her biggest lessons, and her career journey.

Lizette, do you remember your first computer?

Yes! It was a Pentium I. My parents got it for me in my third year of university. I remember programming in Pascal and running MATLAB for my Honours project.

You studied Computer Science at North-West University. What influenced that decision?

I’ve always loved a challenge! Riddles, problems… The idea of solving problems using technology was really intriguing to me.

If you returned to university today, what would you like to learn about?

I’d probably study Psychology. I’m interested in the human mind, but also in artificial intelligence. I think AI is going to have a dramatic impact on our social and intellectual status quo.

Tell us about your career path.

I started out as a junior developer at Vircom, developing websites in Notepad. It was a blast! And I met exceptional people there. I’m still friends with them. When Vircom was acquired by another company, I moved into management. Later on, I worked as a solutions architect and project manager at Oakwell. And after that, I joined Digital Matter as a mobile software solutions architect and product manager. I started my BUI journey as a program manager and moved into sales about two years ago.

What’s the most rewarding aspect of your job?

Working with the BUI team! They’re all very intelligent, very motivated people. And also, for me personally, just being able to find the right solution at the right price for our customers.

What’s your biggest challenge at work?

Knowing enough to make sense!

We get it. The tech industry is always changing. How do you keep up with the latest trends?

I’ve come to realise that it’s impossible to know everything. I try to attend online sessions specific to BUI’s focus areas. And for industry news, I rely on social media.

Who is your role model in business?

I’d have to say Elon Musk. I think he’s shown the world that anything is possible, and that the status quo doesn’t have to be the norm.

What lessons from your parents do you value the most?

My parents gave me my moral compass. They taught me the importance of honesty, loyalty, and patience.

How do you think your colleagues would describe you?

I hope they think I’m a team player, and that I’m optimistic and fun to be around.

You’re a key part of the BUI team and you have a lot of responsibility. How do you balance the demands of your career and your home life?

Honestly, I don’t always get it right. For me, it’s about prioritising and scheduling. And I try to make family time quality time.

You probably know that America’s Silicon Valley had a “boys’ club” reputation for a long time. What do you think of South Africa’s tech industry, in terms of gender equality?

I can only speak from personal experience, but I’ve been in IT for more than 20 years and I’ve seen substantial progress. We’ve had a lot of social and political change in South Africa… I have to believe that the country will address gender equality as well.

What advice would you give to young women considering careers in technology?

Don’t change who you are to try to fit in. Because in this industry, it’s more important to be assertive, honest, and knowledgeable. And remember that university is about more than just your studies… You gain life skills, you make friends, you learn, you teach, you experiment… Never stop learning – and never stop challenging yourself.

What tech project or initiative are you excited about right now?

There are so many! And they’re all so exciting! But I’m ecstatic that Microsoft is launching two data centres in South Africa this year. I think cloud technology is revolutionary. And I’m very keen to see where it leads in the future… Automation, AI, data analytics… There are so many possibilities.

How did you spend Women’s Day this year?

Relaxing with family and friends. No email. Absolutely no email!

The importance of digital identity management

Compromised user credentials can put your business at risk.

Is digital identity management a priority for your tech team?

Modern IT environments are becoming increasingly complicated. Cybercriminals are finding new and sophisticated ways to cause harm. It’s never been more important for businesses to manage user identity and user access. And many cybersecurity experts agree that usernames and passwords, however strong, are not guaranteed to keep out the crooks.

Alex Weinert (group programme manager for identity security and protection at Microsoft) spoke about the prevalence of breach replay attacks (trying stolen passwords from other sites), password spraying (trying common passwords against known account lists), and phishing (tricking users into revealing passwords) at the Microsoft Ignite event in 2017. He stressed that password information was the common denominator.

And there’s a reason why… As humans, we’re often predictable. And lazy. How many logins do you have for your various web tools at work? Five? Ten? Are you using a unique password for each one? Or your favourite, easy-to-remember term? Or whatever’s literally at your fingertips? Some of the most common passwords are collections of letters or numbers found on a typical keyboard. It’s not a safe practice, but it’s happening all over.

SplashData compiled a list of the world’s worst passwords after reviewing the five million that were leaked last year. The number string 123456 took the top spot, with four variations (1234567812345123456789 and 1234567) in the top 10 alone. Other popular choices included password (sometimes a default setting left unchanged) and qwerty (a letter string from the top row on a keyboard). Such evidence certainly makes it easier to understand how hackers are exploiting human nature for their own gain.

The risks are real

Cybercrime reportedly cost the world $600-billion last year, and the evolving threat landscape has prompted cybersecurity experts to re-examine digital identity management.

How many of your digital accounts require something over and above your username and password? Do you access secure files and folders with a one-time password delivered via text message? Do you unlock your office laptop with a fingerprint or iris scan?

From multi-factor authentication to biometric identification, your digital identity is being defined and regulated to give you the right access to the right assets at the right time.

Why is digital identity management important?

The management of an individual’s digital identity is particularly necessary in the business environment, where it’s crucial to govern both users and their degree of access to networks, applications, and sensitive data. Your IT personnel must be able to maintain, modify, and monitor all users, their profiles, and their access permissions (or restrictions) from the moment they join your organisation until the day they depart permanently.

Existing digital identity and access management systems give IT administrators the tools and technologies they need to create user identities, assign user roles, grant (or revoke) user privileges, and track user activities – continuously, from a central dashboard. And if you think about the way we work today, you’ll start to appreciate the indispensability of these controls.

How many of your employees use in-house software to perform their daily duties? How many of them use cloud-based applications? Do they use corporate hardware (like desktop computers) or their own devices (like laptops and smartphones)? Do they use secure internet connections, or public Wi-Fi? Are you confident that the identity and access protocols you have in place will safeguard the integrity of your company’s most important information assets?

Strengthen your identity infrastructure

A simple, scalable identity management system should be a core component of your security architecture.

If you’re concerned about password breaches, network vulnerability, or the growing risk of cybercrime, talk to us about an audit or in-depth assessment today. We have offices in Cape Town, Durban and Johannesburg.

BUI is an official Microsoft Partner in South Africa, and an award-winning leader in identity and security solutions.

Understanding cloud computing

Cloud computing is transforming the business landscape

And you’ll be better positioned to leverage its advantages with deeper insight into the fundamentals.

Cape Town – If you asked your IT experts to define cloud computing in simple terms, how many explanations do you think you’d get? Two? Three? A different definition from each member of the team? It’s possible. Because cloud computing can be applied in many ways, to achieve a variety of outcomes and objectives.

What is cloud computing?

If you look up “cloud computing” in the dictionary, you’ll discover that it’s the practice of “using a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer”. That’s true enough, but cloud computing has evolved so much over the past decade that a closer inspection is required to fully comprehend the current landscape.

At its core, cloud computing is about supplying computing services over the internet (also known as the “cloud”). Cloud computing allows you to utilise, process, manage and store data, files, programs and software in a remote, virtual environment that is secure and universally accessible from any device capable of connecting to the web. It might sound complicated, but you’re probably doing all of these things already. Let’s take a look at some everyday examples:

  • Data in the cloud. Do you have profiles on social media networks like Facebook, Twitter and LinkedIn? Your data (login details, profile information, friend lists, status updates) is being processed and stored in the cloud. That’s why you can access your account from your mobile phone at the office, or from a laptop overseas, quickly and easily.
  • Files in the cloud. Do you collect and curate your family photographs online? Digital file-storage services like Dropbox are virtual archives for your images, documents, presentations and reports. And cloud technology facilitates your access from any web-connected device.
  • Software in the cloud. Do you remember the days when the latest Microsoft Office software came in a box with an instruction manual and a disc to insert into your computer? Today, Microsoft Office is available via the cloud and you can subscribe for a tailored package that suits your needs.

From email to internet banking, cloud computing is powering many of our personal activities. But the technology is being harnessed by more and more businesses looking to streamline processes, boost productivity, and reduce costs.

How do businesses use cloud computing?

Businesses are turning to the cloud for processing power, database storage, application management, software provision, networking, or a combination thereof.

Traditionally, businesses have needed local hardware (hard drives, in-house servers, on-premises data centres) and software to enable people to do their jobs. The physical hardware requires space and ongoing care and maintenance; the software requires patches, updates, and licence-renewals. There are substantial cost implications in both cases, as well as the need for dedicated IT staff to monitor and manage the overall environment.

Cloud computing goes a long way towards reducing the need for expensive on-site computing assets, and cloud providers typically group their services by infrastructure, platform, and software. These services can be packaged according to your individual requirements, and are generally available on a pay-as-you-go basis.

Infrastructure as a service (or IaaS) is often the first building block, because it involves the servers, virtual machines, storage systems and networks you need as a foundation for your IT architecture.

Platform as a service (or PaaS) is the cloud-based environment that supports the development and deployment of web applications. Your developers will have the tools and database management systems they need to build, test, deploy and manage apps.

Software as a service (or SaaS) is designed to give people on-demand access to software applications via the cloud, without the hassle of regular upgrades or security patches. Email and calendar software are common examples.

What are the benefits of cloud computing?

The cloud computing market is growing at a steady pace, largely because businesses are becoming more aware of the three main advantages of moving to the cloud:

  • The cost factor. The technological terrain is constantly evolving. New hardware is unveiled every year. New software, too. Businesses are re-evaluating their IT spending – and reconsidering the substantial investment required to install and maintain on-site assets like servers and data centres. Cloud computing eliminates the need for such significant expenditure upfront, and opens the door for customised cost solutions.
  • The flexibility factor. The IT needs of every business will change over time. The growth and expansion of the enterprise will require the commensurate growth and expansion of its IT environment. Cloud computing enables agile scaling.
  • The security factor. Cybersecurity is a pressing concern for data-driven businesses. Cloud computing makes it simpler to carry out data backups and to pursue recovery initiatives in the event of a disaster.

As cloud experts, we’ve helped clients from across the business spectrum with their cloud migrations. If you’re ready to begin your journey to the cloud, book an assessment with one of our consultants today. We’re happy to explain how cloud technology can transform your organisation.

BUI is an official Microsoft Partner in South Africa, and an award-winning leader in identity and security solutions.

It’s Time To Gear Up For Microsoft’s SA Data Centres

Cape Town – Microsoft Azure, Office 365 and Dynamics 365 will soon be delivered from Microsoft data centres on African soil. Have you considered moving to the cloud?

Microsoft is bringing its global cloud infrastructure to Africa, with data centres in Cape Town and Johannesburg to connect you to the world.

On May 18, 2017, the tech titan announced its plan to launch two hyperscale cloud data centres in South Africa’s metropolitan hubs of Cape Town and Johannesburg.

“We’re excited by the growing demand for cloud services in Africa and their ability to be a catalyst for new economic opportunities,” explained Scott Guthrie (Executive Vice President, Cloud and Enterprise, Microsoft) at the time.

Guthrie’s sentiments were echoed at the 2018 Microsoft Tech Summit in Cape Town, where Nuri Cankaya (Senior Sub Product Marketing Manager, Microsoft Azure) and Victoria Grady (General Manager, Microsoft Azure Experience Marketing) highlighted some of the benefits of the Azure environment and urged customers to start preparing for cloud migration.

A first for Africa

Microsoft has 54 Azure regions spanning the globe. The majority of these (42) are already available, while others have been announced, but not yet launched.

The data centres in Cape Town and Johannesburg are Microsoft’s first such facilities in Africa and represent a significant investment by the company, as well as a game-changing development for individuals and organisations concerned about data residency.

At present, customers based in Africa depend on cloud services delivered from data centres outside of the continent. It’s thus possible that data belonging to a business in Pretoria is actually being stored on a remote server in Amsterdam. It’s not an ideal situation, given that data is often subject to the laws of the country in which it resides.

Did you read last week’s blog post about data-privacy legislation? We covered South Africa’s Protection of Personal Information Act and the European Union’s General Data Protection Regulation, as well as the penalties for non-compliance in each case.

Microsoft’s SA-based data centres will provide secure cloud services across Africa, with the option of data residency in SA. The facilities are expected to be up and running later this year.

Microsoft wants you to be ready

A clear plan and a capable team will be necessary for successful cloud migration.

Microsoft has two training initiatives to help prepare your IT staff for the Azure environment: Azure Essentials and the DC Cloud Insider Certification.

We want you to be ready, too

Over the next few weeks, we’ll be taking a detailed look at cloud computing and several Azure products and services as we map out the steps for your journey to the cloud.