SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Video surveillance
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

What are the most valuable features of cloud security?

15 Mar 2018

What are the most valuable features of cloud security?
15 Mar 2018

Editor Introduction

Cloud computing has been around since the turn of the millennium. Over the years, the concept of storing and accessing programs over the Internet (instead of using an on-premises computer system) has grown in almost every realm of business. Some might say the physical security industry has come late to the party, delayed in some instances by (misguided?) concerns about cybersecurity of cloud systems. The bandwidth needed to transfer video to the cloud has also been a challenge. We asked this week’s Expert Panel Roundtable: What features of Cloud-based software-as-a-service (SaaS) are the most valuable to the average user?


Card image cap
Dan Cremins March Networks Corporation

When people in the security industry think about cloud technology and video, many of them will immediately think about video storage services. Certainly, cloud storage is a growing trend, with CIOs looking to adopt centralised storage models for all types of corporate data, including video. While we have yet to see the large-scale deployment of video to the cloud for security purposes, as corporations continue to upgrade their networks to accommodate more traffic and as bandwidth costs continue to drop, expect to see it grow in popularity. On the services side, other types of cloud-based solutions offer multiple end user benefits. Chief among these is the ability to outsource the infrastructure and resources required to manage large enterprise systems. This allows system administrators to save both time and the associated costs for solutions that provide everything from wide video system health monitoring and management to customised remote video auditing.

Card image cap
Colin Leatherbarrow Grosvenor Technology Ltd

SaaS is finally becoming mainstream as the technology continues to mature, connectivity improves, competition increases, and the concept becomes more accessible to the SME (small-to-medium-sized enterprise) segment. The defining features are well understood, but for me, the average user will benefit from near universal access and information from any location. SaaS removes geographical boundaries and offers secure access to data spanning CRM (customer relationship management), ERP (enterprise retail planning), HR (human resources) and increasingly Fire and Security solutions, without the need to maintain expensive dedicated or closed protocol “on prem” IT hardware. Our industry is only just beginning to leverage the power of Cloud and SaaS, but the advantages of speed and ease of deployment, high availability, data security and remote diagnostics combined with the inherent ability to join-up data from different sources will increasingly drive demand from end users to transition to cloud-first and eventually cloud-only environments.

Card image cap
Eric Widlitz Vanderbilt Industries

With cloud-based access control and video management, all users gain the flexibility to control and manage access to their facilities remotely without the expense and addition of dedicated IT expertise. This means extensive cost savings with regards to infrastructure and resource investments. Users also gain the value of being able to view live and recorded video on demand, while managing users, building reports and reviewing alarms – all from a user-friendly Web-based interface or application running on a mobile phone. One of the largest benefits is automatic updates. Knowing you never have to remember to update your software, or pay for someone to update your software, is a major plus. This is a nice guarantee that you are using the most up-to-date and secure version of software, ensuring cyber vulnerabilities are addressed. These guarantees and cost savings are the value you receive and what you pay for with a cloud-based service.

Card image cap
Wayne Jared 3xLOGIC, Inc.

Among the many features of cloud-based SaaS, here are three I believe are among the most valuable:

  • Cloud-based SaaS eliminates the need for internal infrastructure — there are no new servers needed, eliminating up-front costs and long-term maintenance issues;
  • SaaS lets the experts manage the system/environment – for large corporations this isn’t an issue, but for small- to medium-sized companies, each new application adds a requirement for increased knowledge by a limited group of IT people. By letting the manufacturer manage the environment, you take the burden off stretched or even non-existent IT staff;
  • The Cloud is accessible from anywhere, and it can be deployed without allowing anything into a company’s network — offering ease of use and access coupled with higher level security is a powerful combination.


Editor Summary

Removing the burden of maintaining an IT infrastructure is an attractive aspect of cloud-based systems, especially for small- to medium-sized businesses. The ability to keep cloud systems perpetually updated is another strong benefit in our age of heightened concerns about cybersecurity. More flexibility, universal accessibility, no geographic boundaries, and ease of deployment are some of the other benefits mentioned by our Expert Panel Roundtable. In short, cloud systems provide plenty of value for end users, which will likely push even more systems to the cloud in coming years.

  • Related links
  • ACT Access control controllers
  • ACT Access control software
  • March Networks CCTV software
  • March Networks IP cameras
  • March Networks IP Dome cameras
  • Related categories
  • CCTV software
  • Access control controllers
  • Access control software
  • IP cameras
  • IP Dome cameras
  • Storage
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Understanding AI-powered video analytics

Understanding AI-powered video analytics

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
Related articles
IDIS launches new AI PTZ cameras for enhanced security

IDIS launches new AI PTZ cameras for enhanced security

Everon & Alarm.com unify commercial security solutions

Everon & Alarm.com unify commercial security solutions

Axis joins CISA Secure by design for cybersecurity

Axis joins CISA Secure by design for cybersecurity

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Video surveillance
  4. News
  5. Round table discussions
About this page

Discover top cloud features enhancing physical security systems, including scalability, cost-effectiveness, remote access and simplified, centralised data control.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec