Banking on the Cloud

Banking on the Cloud

Cloud migration flourishes, but some cybersecurity questions persist

Walk the GSX or ISC West show floor and you will see ample evidence that cloud has arrived. Cloud (and cloud-like) video surveillance providers are entering the market and exhibiting at trade shows. Cloud migration is only expected to accelerate in coming years.

Industry analyst firm Novaira Insights, in January forecasted the number of cloud-connected cameras in the United States will increase at an 80 percent CAGR through 2026. Even the large legacy VMS players want in on cloud. We have seen them creating new cloud products or acquiring cloud companies in the past year.

As quickly as businesses are moving to the cloud, some questions and misconceptions – generally having to do with cybersecurity – persist. Here are five frequent questions we hear, followed by answers that explain how and why a trusted true cloud provider offers superior cybersecurity protection.

Is it safe to put your video surveillance data in the cloud? To answer this question, I like the bank analogy. Putting your video data in the cloud is like putting your money in the bank, while keeping your video data onsite is like putting your money under your mattress. Most people opt for the bank over the mattress. Why is that? It is because you trust banks to physically safeguard your cash, to take care of it in transit and to make it readily available to you when you need it.

If your bank is in Austin, Texas, but you’re in Portland, Maine, you can go to an ATM and securely withdraw cash. The same is true with cloud, your video data is secured, cared for in transit and can be accessed at anytime from anywhere.

Banks are staffed by experts who know how to manage and protect your money. Similarly, a true cloud provider has a team of professionals solely focused on protecting the security and integrity of your video data. It is the bread and butter of what they do. They monitor for problems; patch known vulnerabilities and constantly update the video management system with the latest features.

To have a similar level of service with your on-premises video system, you would need to hire a team of IT experts or get your reseller to visit all your locations daily to check on updates and perform regular and proactive maintenance checks.

I do not trust the internet and I am worried about cloud computing. I need some reassurance. Business owners and resellers do not necessarily think about it, but most business systems have already moved to the cloud. ERP systems and CRMs are cloud-based. Everyone uses online banking; people pay bills and taxes online. Cloud systems are used to manage business data, schools, medical information. Businesses and individuals trust the cloud with all kinds of personal, private and confidential data. Video is just another kind of data.

Of course, trust is an important part of the equation. It is always important to vet any cloud vendor, their credentials, audits completed, and to learn if they have a history of cybersecurity problems, but the bottom line is that many standard business systems are cloud-based. Video surveillance just happens to be one of the last systems to move to cloud.

Can cloud help if video data is lost? Yes. Redundancy is an important benefit of cloud. In fact, some cloud providers offer triple redundancy: Video is stored on three different discs and three different cloud servers. But it is more than redundancy of storage, cloud providers also offer application redundancy – that means the system's settings and user permissions are also protected. That is not the case if you are running an on-prem system and your server dies. If that happens, you not only lose video, but have lost settings for cameras and for staff permissions in your organization. That is a huge headache you don’t need to worry about with a true cloud provider.

Redundancy benefits in the cloud also extend to power. If you lose power in one location, you can still access video from that location. We have seen the importance of power redundancy all too clearly during recent weather events, especially for businesses with many remote offices.

Bad actors and insider threats are a huge problem today. How can cloud help? This should be a major concern for every business owner. Cloud offers better protection against insider threats. With an on-prem system, a bad actor could tamper with a hard drive causing severe damage to a business. That is much more difficult to do with a cloud video surveillance system because bad actors do not have access to the hardware.

In addition, cloud video surveillance systems have audit logs. When video is accessed from the cloud, the audit log shows who accessed what video and when. The audit also records the IP address, which shows the location of the person who accessed the video. These cloud features go a long way to deter and investigate insider threats.

I keep reading about cybersecurity vulnerabilities in security cameras, are special cameras required for cloud video surveillance? A true cloud provider is an open system that works with many different camera manufacturers. The business owner is not held hostage by a specific manufacturer in a true cloud system.

Cloud video management systems work with existing security cameras, new cameras, or a mix. However, all IOT devices are subject to cybersecurity vulnerabilities, and an infected camera can cause business disruptions or much worse. Some cloud providers have addressed this problem with camera cyber lockdown features that reduce maintenance while making cameras significantly more cybersecure.

Cyber lockdown prevents security cameras from communicating with the internet and it also blocks cybersecurity attack attempts from reaching the cameras. Even if a security camera has been previously infected with a virus, camera cyber lockdown features prevent the camera from communicating with the internet.

Cybersecurity is an ongoing process for all business owners, security integrators and for cloud providers as well. The threat landscape changes daily, and vigilance is an absolute necessity. Cloud providers should welcome questions from potential customers about cybersecurity.

Armed with facts, cybersecurity becomes another reason that business owners and resellers are rapidly adopting cloud video surveillance. True cloud offers inherently better cybersecurity. You can bank on it.

This article originally appeared in the September / October 2023 issue of Security Today.

Featured

  • Teaching Old Dogs, New Tricks

    After more than 30 years in the security integration business, today’s video surveillance systems are certainly not the same CCTV systems I sold and installed when I first started hanging cameras. Back in the day, there were only a handful of companies out there and one that started with a “P” stood above the rest. If you were fortunate enough to get invited to travel on their private jet out to California to tour the factory, it was a real honor. I have a picture somewhere in my garage collecting dust, of me sitting in the co-pilot seat. I know, old-man highlights, but still very cool. Read Now

  • Learning to be a Strategic Skeptic: Promoting Critical Thinking, Digital Literacy

  • Why Communication is Key in an Emergency

    During an emergency, communication with the outside world can be a critical component when it comes to response time and saving lives. Emergency communications typically consist of alerts and warnings; directives about evacuating the premises; information about response status, and other matters that can impact response and recovery. Read Now

  • Trust But Verify

    Today’s world is built on software—whether it is third-party applications, open-source libraries, in-house developed tools, operating systems, containers or firmware. Organizations worldwide depend on these diverse software components to power their operations, connect with customers, and drive innovation. However, this reliance on software comes with hidden dangers: the blind trust placed in these software products. Many companies assume that the software they purchase, and use is secure and free from vulnerabilities, but recent high-profile software supply chain breaches have proven otherwise. The reality is that every piece of software, no matter how reputable the source, increases the organization’s attack surface and poses new risks. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3