SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

Which security markets are likely to embrace the cloud?

28 Nov 2019

Which security markets are likely to embrace the cloud?
Larry Anderson
Larry Anderson
28 Nov 2019

Editor Introduction

Cloud applications are an everyday facet of business these days, exemplified by systems such as Office 365, Salesforce.com and Dropbox. The physical security market is also embracing the cloud after overcoming some initial concerns and thanks to improvements in cloud offerings. We asked this week’s Expert Panel Roundtable: which security markets are likely to embrace the cloud?


Card image cap
Oktay Yildiz Genetec, Inc.

While the cloud might have been considered hype a few years ago, more organisations are becoming interested in a software-as-a-service (SaaS) model for video surveillance, access control, and other physical security applications that follow the digital transformation strategies already implemented by IT departments. From large corporations and financial institutions to smaller businesses with no corporate network infrastructure, organisations of all sizes are seeking easier and more flexible ways to manage their security infrastructure growth and costs. A cloud-based system is easier to maintain, can be safer from cyberattacks, and offers the most up-to-date features and functionality. Today, vendors are also leveraging the cloud to develop creative security and business applications that were once considered unrealistic or economically impractical. The ability to easily share data across departments and locations, for instance, can aid investigations by allowing different organisations to securely collect, manage, and share video evidence and other relevant case information.

Card image cap
Nigel Waterton Arcules

The better question might be: which security markets aren’t likely to embrace the cloud? In reality, cloud-based services have wider applicability than previously thought possible. In the past, organisations had to be intentional about the use of cloud-based systems, having to go in to download, install and patch software. Now, cloud is running in the background across a large number of applications as part of our everyday lives, and it’s poised to extend into helping deliver solutions for business needs. Some of the specific markets where cloud is ready to be implemented today are in retail and hospitality applications, property management and commercial real estate, and growing enterprise organisations with a need to streamline management of security operations for geographically dispersed locations.

Card image cap
Tijmen Vos Eagle Eye Networks

I believe all markets will move to the cloud without exception. There is absolutely no reason why a certain security market would not move to the cloud. The advantages are obvious: economies of scale, better security, flexibility, scalability and simplified management. The real question is to what kind of cloud a market will move. The consumer security markets have been moving mainly to common clouds like Amazon (e.g. Ring) and Google (e.g. Nest), the high-end security markets have mostly moved to large private clouds to operate their city surveillance, and Eagle Eye Networks’ Cloud VMS has a strong penetration in the B2B segment to bring surveillance to the cloud for entrepreneurs, retailers, schools and business. The drivers for the move are always the same and will eventually apply to all security markets, it’s just a matter of time.

Card image cap
Trevor Ball Allegion (UK) Ltd

Perhaps one of the greatest benefits of cloud-based IP systems is the ability to manage and administer multiple locations and devices in real-time and across the globe. Having the ability to program systems centrally and manage numerous individual remote sites is an intrinsic benefit of a system that relies solely on the network. This is why so many chose to move to IP video systems, and why schools, hospitals, governments and multinational corporations are now investing in IP access control. However, this isn’t the only reason to select a cloud-based system. Functionality, efficiency, ease of use and of course cost should all be considered. Cloud access control can significantly reduce costs. After all, there is no need for a physical local server, an operating system, expensive IT infrastructures, or personnel to manage its upkeep. It’s more a case of “when” security markets will embrace the cloud rather than “which.”

Card image cap
Yu Hao Lin Rasilient Systems, Inc.

There are two segments in the cloud market—public and private. The public segment is the VSaaS market, which currently suffers from high costs, unpredictable video transmission quality, and security concerns for storage in the public cloud. The cyberbreach of Capital One is a prime example. Because of this, we believe, until these problems are addressed, subscriptions to VSaaS services come from low-end users who don’t want to deal with video surveillance management. The private cloud segment is more often used by enterprise-class organisations with multi-site locations, such as universities, retail franchises, and financial institutions. As each site deploys their own video and analytics management systems, there is a need to centralize the data capture in one command center. Preserving the highest-level video quality, as well as minimizing risk of data compromise, is essential. For this reason, the private cloud will see greater adoption among entities managing sensitive information.

Card image cap
John Davies TDSi

When it comes to the use of cloud systems for security, the United States is at least three to five years ahead of Europe, with rapid adoption of the technology in the market as buyers there have quickly grasped the inherent security, integration and convenience benefits. Within Europe, the United Kingdom tends to drive market behaviour first, so we are likely to see an increase in cloud usage appearing there as an indication of the direction of Europe as a whole. Within the market sectors themselves, all the signs are that currently cloud tends to appeal to smaller end user businesses rather than large corporates, and private rather than public sector. Examples include small schools, shops and small offices. This is perhaps because smaller organisations tend to be more flexible and receptive to new technology, but also due to the cost and staffing implications of running an in-house IT team.

Card image cap
Julie Brown Johnson Controls, Inc.

Education leaders are constantly seeking innovative technologies that advance the safety and learning of their occupants, and they frequently turn to access control and the protection of smart devices. With the adoption of this type of technology, smartphones can replace traditional paper visitor badges, electronically granting or denying access to areas of a building or campus. Security teams can access more detailed information to solve issues quickly, if one were to occur. Smart devices house an abundance of sensitive data and have transformed the way students learn. Whether these devices are provided or are part of a BYOD (Bring Your Own Device) program, cloud technology can significantly heighten defenses against data breaches and other threats. By taking the steps to tighten cybersecurity measures, schools and campuses can focus more on student learning and well-being.

Card image cap
Jessica Burton Seagate Technology

For banks, retailers and other companies deploying smart surveillance systems with AI at multiple locations, data aggregation and analysis at the backend are key. Surveillance footage is no longer merely archived. Now, it is also leveraged for deep learning activities to train systems to be more predictive. For this reason, security customers in the financial, retail, and smart city sectors are taking advantage of edge-to-cloud strategies to enhance data management. In the cloud, data doesn’t sit still. Instead, following initial video ingestion and basic video analytics at the edge, deep learning analytics software in the cloud delivers intelligent insights for better decision-making. One of the key technologies driving performance in cloud environments are high-performing hard disk and solid-state drives, which are designed for churning through AI data. Cloud servers employing these enterprise-class drives can scale to petabytes of data captured from thousands of cameras and sensors.


Editor Summary

From education to banks, retailers and even large corporations, it’s a long list of markets that are in the process of embracing cloud applications for physical security, including video and access control. As our Expert Panelists point out, eventual widespread use of the cloud is inevitable – just a matter of time; a matter of when, not if. As cloud applications accelerate, they provide a new level of connectivity and functionality for physical security systems and even address continuing concerns such as cybersecurity.

Related white papers
Milestone cloud deployment guide

Milestone cloud deployment guide

Download
Maximising enterprise security systems in the cloud

Maximising enterprise security systems in the cloud

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Related articles
Looking back at 2020: Cloud systems expand in shadow of COVID

Looking back at 2020: Cloud systems expand in shadow of COVID

What is the cloud? (Can we all agree?)

What is the cloud? (Can we all agree?)

Which security markets are likely to embrace the cloud?

Which security markets are likely to embrace the cloud?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Round table discussions
About this page

Explore how security markets adopt cloud technology, boosting efficiency and scalability while reducing cost – revolutionising the industry.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec