Cloud-based access control solutions are growing very fast for one to eight doors

Installers and integrators still have questions about cloud-based services, so we asked Service Manager Michael Troiani of Idesco Corp. in New York City for his input.

SourceSecurity.com: What is your opinion of the security of cloud-based services?

Troiani: Cloud-based computing is here and is heavily marketed as a revolution in the security industry. Like any other service, cyber-security can always be improved in the cloud. The continued trend to SaaS (Software as a Service) means there must be more complex encryption for cloud-based applications. Over the next few years you will see more and more investments being made in the security area of cloud-based services, as they clearly offer the best opportunity for growth.

SourceSecurity.com: How is the physical security industry adapting to newer cloud-based technologies/products?

Troiani: The security market in general is slower to adapt to any newer technology. There are consultants and customers who have stayed with solutions that have proven solid if not spectacular in terms of results and reliability. However, hosted access control and video eliminate the costs of local servers, software and maintenance. Customers also get additional built-in features with automatic software updates, along with the ability to use application programming interfaces (APIs) as opposed to purchasing expensive system add-ons. Cloud-based access control solutions are growing very fast for one to eight doors, as they are affordable and can be deployed faster than traditional access control.

SourceSecurity.com: Has Idesco adopted any cloud services recently?

Troiani: Idesco invested in a cloud-based service module in December 2007. It’s amazing that it has been seven years already. My previous job with a publishing company provided me with a solid base of technical knowledge and experience, and when the opportunity presented itself for me to run the service department at Idesco, I thought: “If we had success at my previous location with these technologies, why can’t it work here?” We started slowly, only offering this new service to our contract customers. However as we grew with the product, it has become one of our main talking points in promoting what we do.

Idesco’s success as a company depends upon not only keeping our customers’ facilities safe and secure
Service Manager Michael Troiani of Idesco Corp.

I firmly believe it brings tremendous value to our customer base. Customers hated leaving voicemails when they had a service issue or needed assistance. With our cloud-based service module, service calls can be scheduled and acknowledged, and a technician dispatched within seconds. We have a convenient product, are maximising our time in the field, and our technicians have the ability to get customers to sign off on work on their tablets and smartphones which leads to faster billing. Recently our Project Management team has started working with Smartsheet to better track our projects and procedures.

SourceSecurity.com: Is the customer information safe with these cloud-based systems?

Troiani: Idesco’s success as a company depends upon not only keeping our customers’ facilities safe and secure, but also protecting their data at all times. We value our customers’ business and are committed to protecting their security and privacy.

The servers are hosted in Rackspace, a leading managed-hosting provider that is trusted by some of the biggest companies. Rackspace offers a 100 percent Network Uptime Guarantee and is respected as one of the leaders in managed hosting, with data backed up multiple times daily. In addition to built-in secure login capabilities, our service module also includes the ability to secure information with the same SSL encryption technologies used by online banking and ecommerce sites.

SourceSecurity.com: What can we expect in the future as far as technologies to boost cloud security even more?

Troiani: At Idesco, we want to constantly offer customers best-in-breed products. Generally with cloud-based technology (outside and inside the security space), it seems to have endless possibilities in terms of growth potential. In 2015, the cloud-based security market is estimated to be worth about $3 billion. The top most sought-after cloud security services moving forward will be email security, web security services and identity and access management. With more organisations gaining more experience with SaaS, interest in cloud-based security will only continue to trend upward.

Download PDF version Download PDF version

Author profile

Deborah O'Mara Owner, DLO Communications

Deborah L. O’Mara, SourceSecurity.com's dealer/integrator correspondent, is a veteran of the security marketplace, having extensive experience in security, fire alarm technology and integrated systems.

In case you missed it

What challenges do end users face when working with integrators?
What challenges do end users face when working with integrators?

The security industry offers a vast array of technologies and vendors. This can be overwhelming for end users, who depend on security integrators for guidance and service. But how...

Humboldt Forum relies on intelligent locking system from ASSA ABLOY
Humboldt Forum relies on intelligent locking system from ASSA ABLOY

After around nine years of construction, the Humboldt Forum is gradually opening its doors. In the heart of Berlin's historic centre, it was set up as a modern space for culture an...

Milestone Systems: Open platform video technology tees up enhanced safety for PGA’s Houston open
Milestone Systems: Open platform video technology tees up enhanced safety for PGA’s Houston open

Intent on bringing the Houston Open back to Memorial Park Golf Course, the Houston Parks and Recreation Department (HPARD) reached out to the Houston Living Lab (HLL), Milestone Sy...