SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Video surveillance
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Does the security market really understand the meaning of 'cloud?'

Does the security market really understand the meaning of 'cloud?'
30 Aug 2017

Editor Introduction

There’s a huge cloud hanging over the physical security market, but in a good way. Cloud-based systems, whether for video, access control or another category, are on the verge of taking the industry by storm. The benefits of that mythical “cloud” are well-known, or certainly well-touted, in the market. It’s almost as if the word “cloud” has become a buzzword that can mean different things, or at least whatever the customer wants it to mean (as long as they buy!). We asked this week’s Expert Panel Roundtable to define the term more specifically, and to comment on the industry’s understanding of the terminology. Specifically, we asked: Define what we mean by “the cloud.” Is the definition universally understood in the market?


Card image cap
Wayne Jared 3xLOGIC, Inc.

Cloud computing really represents the move from infrastructure-based computing to demand-based computing. Typically, a cloud solution should provide the following benefits:

  • Pay as you go — A customer pays only for the resources they use and nothing more
  • Self-sufficient — Users can add or remove resources on their own
  • Multi-tenant— All customers reside seamlessly on the same infrastructure
  • Resources can be easily scaled to handle increased load, and typically should scale automatically
  • High levels of availability and redundancy, with data often mirrored between geographically separate data centers.
Card image cap
Todd Piett Rave Mobile Safety

Cloud computing is defined by the National Institute of Standards and Technology (NIST) as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources. Using the cloud, many organisations can more easily deploy and manage applications by sharing the cost of some of the underlying components of a solution. The number of different “cloud” business models – from software-as-a-service, to infrastructure-as-a-service, to variations in between – is what makes for the confusion around what the cloud is. Ultimately, cloud services let a customer focus on their core competencies, and offload things that are not core to their business. For example, many enterprises understand the need for emergency notification services but few want to become experts in managing huge spare phone calling capacity for a rare emergency event and are happy to offload that responsibility to a cloud-based service provider.

Card image cap
Gareth Williams Oprema

"The cloud" is a means of hosting data centrally/off-site whereby users can request this information on demand over the internet. The use of cloud technology is commonplace in everyday life, with products and services such as Netflix, Apple Music, DropBox and Internet banking. The security market’s adaptation of cloud services is gathering pace; we see more products available within the video surveillance as a service (VSaaS) and access control as a service (ACaaS) space. The main enabler for VSaaS is bandwidth: With fibre broadband becoming more widespread, pushing video off-site to “the cloud” is now more achievable.

Card image cap
John Davies TDSi

When the security industry talks about “The Cloud,” we usually mean software systems and services hosted in remote server farms and the options for using this technology to re-invent the way we do things – how we interact with our business systems and from what devices. It is no longer unusual for the servers and connected devices to be hosted somewhere other than your office or home. In fact, servers can be located anywhere in the world, with just the same functionality as a local system. At the same time, there is an unprecedented number of devices that can be used to connect to these systems, and the scope for choice is ever-expanding. Whilst this repositioning of system components is driving new ways of doing business, it would seem that unfortunately this isn’t always being fully understood or adopted in our market.

Card image cap
Mike King Axis Communications

“The cloud” is a global term that can mean different things depending on the industry it is referring to. In the simplest of terms, “cloud” means to have a remote location that stores data, video, or other remotely accessible information. The term “cloud” is often confused with “hosted.” The term “hosted” means managing security solutions, the engine of the platform and its devices. All that said, the industry IS familiar with the cloud and the benefits it can provide, such as on-demand access to devices via mobile app or browser. Additionally, leveraging the cloud eliminates the need for extra equipment (DVR, NVR, etc.).

Card image cap
Mitchell Kane Vanderbilt Industries

The cloud is an overused term that seems to be a mystery to most within the security industry; but in all actuality, it's growing in popularity. The definition is really a shift from hardware-based functionality, such as an investment in physical hardware and servers to run applications, to using storage in a connected network to run similar applications. This results in the cost-effective management of data for many organisations. Instead of using capital investments on in-house hardware, organisations now can use cloud-based programmes to help streamline their businesses and provide advanced security functionality. For the market, there's still a disconnect on the definition of the cloud and its use cases, which is why it falls to manufacturers and integrators to educate clients on the importance of network security (after all, if you're storing data on a network, you should have safeguards) and how best to use emerging cloud-based applications.


Editor Summary

There is a specific definition of the “cloud,” although the specifics can sometimes get lost in translation as the industry looks to promote the benefits of a new approach to meeting computing needs. Unfortunately, the term “cloud” is a specific technology and has become a ubiquitous industry buzzword. We should be aware that how the industry promotes utilising cloud technology may muddy our understanding of this powerful new technology and its broader impact on the market.

  • Related links
  • ACT Access control systems & kits
  • Axis Communications CCTV software
  • TDSi CCTV software
  • TDSi Access control systems & kits
  • TDSi CCTV cameras
  • Axis Communications IP cameras
  • TDSi IP cameras
  • Axis Communications Network video recorders (NVRs)
  • TDSi Network video recorders (NVRs)
  • Axis Communications Storage
  • Seagate Storage
  • Axis Communications Fibre optics, telemetry receivers, transmitters, transceivers
  • Related categories
  • CCTV cameras
  • CCTV software
  • Access control systems & kits
  • IP cameras
  • Network video recorders (NVRs)
  • Storage
  • Fibre optics, telemetry receivers, transmitters, transceivers
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Understanding AI-powered video analytics

Understanding AI-powered video analytics

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
Related articles
IDIS launches new AI PTZ cameras for enhanced security

IDIS launches new AI PTZ cameras for enhanced security

Everon & Alarm.com unify commercial security solutions

Everon & Alarm.com unify commercial security solutions

Axis joins CISA Secure by design for cybersecurity

Axis joins CISA Secure by design for cybersecurity

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Video surveillance
  4. News
  5. Round table discussions
About this page

Explore the security market's comprehension of cloud technology, its benefits and challenges, and industry growth in our insightful article.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec