Video Surveillance Takes to the Cloud

Video Surveillance Takes to the Cloud

It was not all that long ago when discussion of professional security services on the Cloud seemed all but preposterous due to bandwidth and security concerns. Fast-forward to 2021, and all that talk seems like it was decades ago, likened to a time when IP video was thought to be a futuristic speculation.

The evolution to Cloud services has largely been the work of technologist in other industries who have been nurturing the Cloud for software as a service (SaaS) applications. The success and widespread acceptance of highly popular and successful applications like Microsoft Office 365 and Salesforce.com helped pave the way for numerous Cloud applications. As a result, scores of software innovators now offer users access to powerful software applications that would otherwise not be affordable with little to no capital expenditures and minimized risk.

The continued demand for remote system access and management is also helping to drive the migration of some or all aspects of professional video surveillance to the Cloud. Moreover, with early barriers to the adoption of Cloud such as cost, bandwidth and resolution all but behind us, it is expected that Cloud security solutions will continue to become even more popular. However, it will take some time to break ingrained industry habits, which will change as more use cases are made public that substantiate the performance attributes and document return on investment (ROI).

Going remote with the Cloud
COVID-19 has also created new security and business operational challenges, which have spurred the demand for Cloud video surveillance solutions. Video surveillance is leading the Cloud movement by enabling a cost-effective way to easily download and share footage remotely. It also offers users the ability to control their systems remotely via a mobile app or a web portal. For example, users can change motion detection zones and sensitivity or use pan-tilt-zoom (PTZ) functionality to adjust their cameras to better focus on events of interest, without having to be physically near their system.

When a potential security breach or threat is detected, users can also respond in real time to deter unwanted visitors with features such as two-way audio. These remote capabilities set Cloud video surveillance apart from traditional systems where sharing footage and controlling settings is often cumbersome and requires physical access to the recorder. 

Business owners and management are also increasingly seeking security solutions that can assist in improving daily operations. Cloud video surveillance and security solutions can instantly transform these systems from being reactive to proactive sources of business data and intelligence. For example, users can be alerted via email or push notification when specific objects such as people or vehicles are detected so they can respond to events in real-time.

Cloud providers such as Videoloft offer video analytics features, which can empower even basic cameras with the ability to detect a wide range of objects and thus allow customizable alerting and smart footage search. By connecting Cloud software to existing video surveillance cameras, users can instantly upgrade legacy systems with new capabilities while leveraging their existing capital expense in fixed system technology.

Scaling with the Cloud
While video surveillance and security in the Cloud delivers new remote access capabilities to legacy systems, it also provides virtually unlimited scalability. Users are free from the burden of maintaining the hardware used to store video and are not subject to the fixed storage capacity limitations of resident servers and/or recorders. Recorded footage can be archived in the Cloud for more than three years. 

Bandwidth management in the Cloud
High bandwidth consumption and limited resolution also is perceived as a key hurdle for professional surveillance and security applications in the Cloud. As video compression technology continues to improve, bandwidth requirements have been reduced. Cloud-based systems continuously monitor network conditions and adjust frame rate, bit rate and resolution, so that video can be sent to the Cloud, even in poor network conditions. Cloud-based video surveillance systems also commonly offer an option to store only video events that have been triggered by motion, meaning that bandwidth is used when the video is worth saving. 

Security in the Cloud
Cybersecurity concerns have hindered the growth of Cloud-based systems, but independent Cloud platform providers are arguably more secure than traditional systems. The independence of Cloud providers is important, as often their software runs on a bridging device rather than on the cameras or recorders, meaning that camera manufacturers have no access to the Cloud platform.

Cloud solutions can also overcome other cybersecurity issues. For example, enabling remote access on traditional systems frequently requires port forwarding, leaving the system vulnerable to infiltration. However, with Cloud solutions, no port forwarding is required and in most cases, video files are transmitted over encrypted TLS (HTTPS) channels.

Resolution in the Cloud
The final hurdle historically truncating the adoption of professional video Cloud services is resolution. Cost and bandwidth constraints often necessitated that the resolution of video sent to the Cloud was limited to 2MP. In most cases, this meant an onsite recorder was needed to save higher resolution video locally.

Moving to the Cloud
While cost, bandwidth, security and resolution are areas, which have all improved with vast improvements in recent years, there is still one very simple reason why Cloud is not being more widely adopted by security professionals – resistance to change! However, when it took the security industry literally a few decades to move from coax to IP, making a move to the Cloud may seem even more daunting. One large motivator is the financial benefits that the Cloud delivers to both users and resellers in the form of cost-savings and recurring revenue, respectively. Although perceptions will not change overnight, professional video surveillance and security is destined to take to the Cloud.

Featured

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Motorola Solutions Named Official Safety Technology Supplier of the Ryder Cup through 2027

    Motorola Solutions has today been named the Official Safety Technology Supplier of the 2025 and 2027 Ryder Cup, professional golf’s renowned biennial team competition between the United States and Europe. Read Now

  • Evolving Cybersecurity Strategies

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.