Making the Case for Cloud Security

Making the Case for Cloud Security

What to keep in mind when deploying your cloud security and surveillance strategy

The cloud continues to be a major topic of discussion across the security and surveillance industry. Cloud adoption rates are continuing to increase as many customers move past earlier concerns about cloud security and reliability and begin to realize the significant benefits that come with the cloud: efficiency, scale, and cost savings.

The scope of a cloud deployment can vary from customer to customer, based on their market, requirements, the focus of their operations and budgets, among many other factors. For some, fully cloud environments work best, for others, on-premise is the way to go. Still, for others, a hybrid approach makes sense.

Cloud vs. On-premise vs. Hybrid
There are many applications that can dictate when a hybrid approach makes sense. For example, in many markets such as cannabis or banking – there are regulations stating you must have both on-site and off-site back-up storage. Hybrid allows you to have full on-site video recording capability combined with a full cloud user interface with all the necessary features and functionality without tying up network bandwidth. If you don't need to send all your data to the cloud all the time, then hybrid gives you the best of both worlds. You can mix and match or go either way.

Another of the biggest cloud benefits is flexibility and scalability. The cloud is flexible and elastic and scales to your needs and resources. That's one of the biggest benefits to the cloud: you can have a cloud-based video system up and running quickly.

If you are recording 30 days now, but in a few months or seasonally you need 60 days, just log in, click a few buttons and you are done. You do not need to go on site and change out hard drives. As more dealers and integrators become familiar and fluent with cloud video platforms, they will recommend and offer it to more of their customers, which will greatly help in keeping adoption rates on the rise.

Cloud video recording will also grow more accepted for use as sourcing and installing servers to manage the growing demand for video retention. This is attractive to many customers since cloud recording is elastic and only requires a few clicks to extend storage retention. We will see much more blending of on-prem systems with cloud backup or cloud archiving, with more customers embracing the idea of choosing, and only paying for the cloud services they need.

In the coming months and years, look for more companies using the cloud on an “as-a-service” basis, creating customized security network infrastructures enabling flexibility, efficiency, lower unit cost and scalability – all while being simple enough for users to manage themselves. They will embrace the ability to easily scale bandwidth up or down, or for certain time periods. For example, if their business is seasonal, they can plan for busier times of the year.

The edge is still a primary topic on everyone’s mind, as organizations continually seek to streamline their operations. The edge may refer to points of presence (PoPs) close to network endpoints, or connectivity that brings recording and storage closer to the data source or device. Security at the edge is much more effective and the fact that it is decentralized gives organizations more options for managing their own unique security requirements.

Perfect for standalone or remote systems, edge-based recording only uses a network for playback and review, conserving bandwidth and allowing more stable and reliable recording of high-quality, high-resolution content through on-board flash media. The addition of intelligent analytics further enhances the long-term value of stored content.

Ask the Right Questions
It is important to ask about where the data is stored – on who’s cloud, and where the cloud data centers are located. Who has access to the data and how is it securely stored and replicated. Other questions should be:

  • How does a typical end-user access the system? Is it all web browser based, or are there mobile apps and a thick client?
  • What about integrations with diverse types and brands of cameras? Do camera-based analytics trigger recording and searching? Can I move to PTZ cameras, de-warp fisheye cameras? How do multi-senor cameras integrate? Can I easily adjust camera settings remotely?
  • Finally, how does pricing work in terms of storage, resolutions, multi-sensor cameras and advanced features?

A good cloud system should have its own data centers and not be running on “general purpose” existing clouds. They should have data centers in the customer’s country to ensure compliance with any data protection laws, as well as best performance. The data should be replicated to multiple data centers and segregated from each other customer for privacy. Data should be encrypted in transit and at rest, and no one – not even the cloud provider should have access to the video, except for the customer and possibly the integrator, if granted access.

A robust web-interface and modern mobile app is essential. Client software may be desired, but often not needed in many customer scenarios. Camera settings should be easy to configure remotely through the cloud system without the need to roll a truck to be onsite, such as adjusting zoom & focus, WDR, etc.

Companies today need fresh solutions fast and they simply need them to work. Increasingly, many are finding those types of solutions in the cloud.

This article originally appeared in the September / October 2023 issue of Security Today.

Featured

  • The Future is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reason. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. But as the number of cameras grows and resolutions push from HD to 4K and beyond, the cloud’s limits are becoming unavoidable. Bandwidth bottlenecks. Latency lags. Rising storage costs. These are not abstract concerns. Read Now

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.