Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalPhysical Security

Hybrid-cloud: The best of both worlds

By Laurent Villeneuve
Video cameras on wall with people looking at them

Image via Unsplash

April 19, 2024

The advent of cloud technology has facilitated faster, easier physical security deployments. As businesses rationalize their costs, concerns and approach to migrating to the cloud, hybrid-cloud deployments are gaining traction across the physical security industry. Recent research conducted by Genetec shows that 60% of organizations are moving towards a blend of on-premises (on-prem) and cloud-based solutions. Such deployments offer organizations the benefits of the cloud while enabling them to keep some infrastructure on-premises.

Becoming more agile 

A hybrid approach gives organizations freedom and flexibility when implementing solutions. Businesses with numerous locations can consider each site’s unique requirements. For instance, they might run some larger density sites on local infrastructure, monitor global deployments in a fully hosted environment, and set up smaller remote sites with direct-to-cloud devices.

No matter how many systems are running on local devices or connected to the cloud, organizations can bring them all back to a central head end. This allows them to streamline monitoring, response and maintenance tasks across their operations to boost efficiencies. To the user, it’s a seamless experience.

Simplifying maintenance and cybersecurity tasks 

With hybrid-cloud solutions, security teams no longer need to travel to various locations to manage infrastructure or check system health. Cloud-based physical security software providers invest significant time and resources in cybersecurity, upholding various standards and certifications around the world. They monitor the latest threats and initiate regular third-party penetration testing and auditing. Thus, operators get immediate access to the latest updates and benefit from continuous innovation. This helps teams quickly address issues and strengthen their organization’s cyber posture.

When is hybrid-cloud the right solution?

Here are some of the most common scenarios when an organization might want to consider a hybrid-cloud deployment model.

Long-term retention

Cloud computing resources and capabilities have surged in the last few years. Many organizations are now taking advantage of the cloud for long-term video retention while keeping short-term, high-resolution archives on local infrastructure. It can provide added layers of redundancy or simply allow them to keep video for longer periods.

Visibility and control over independent sites

Cloud technology is highly scalable, making it easier for businesses to extend security across multiple sites. Organizations can connect their on-prem system to the cloud and manage security across their independent sites with more control. For example, they can easily add cameras or access control readers to remote locations using cloud services, simplifying the set-up process.

Manage heavy in-office traffic

Larger organizations may combine an on-prem video management system (VMS) and cloud-based access control as a service (ACaaS) to lessen the load on their servers and reduce costs.

With this strategy, on-premises infrastructure does the heavy lifting required for video management, while less demanding access control applications are hosted in the cloud.

Busting long-held myths about the cloud

For many businesses, migrating to the cloud can seem unnecessarily risky or just not the right fit. There are a few long-held beliefs about cloud services that may be holding them back. However, hybrid-cloud solutions have progressed significantly, and these beliefs are often no longer true.

The cloud isn’t optimized for larger organizations

The larger the deployment, the more bandwidth throughput you need to stream to the cloud. Adding cloud-connected appliances can help alleviate this challenge by customizing how and when you store information or stream video.

Moving to the cloud will require a total technology replacement

Transitioning to the cloud doesn’t have to happen all at once. Moving one site at a time or using a cloud-connected appliance to get existing infrastructure cloud-ready can happen in a phased approach.

Migration means re-training the entire security team

With hybrid-cloud infrastructure, organizations can manage all of their on-prem, edge computing, and cloud systems using one single unified platform. This simplifies setup, training, and operations.

The cloud isn’t as secure

Cloud solutions come with myriad built-in cybersecurity features and tools that help automate processes and stay on top of threats.

Hybrid-cloud systems allow organizations to leverage their investment in on-prem security devices and infrastructure, while adopting cloud technology such as video and access control as-a-service at their own pace, and to accommodate specific sites or use cases. They provide a cost-effective way to leverage the benefits of both technologies and stay flexible to changing requirements across an organization. 

KEYWORDS: cloud computing cloud migration cloud security security management security solutions

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

With a focus on unified security, video surveillance and analytics, Laurent Villeneuve, Product Marketing Manager for Genetec, Inc., keeps up with the latest trends in the industry. As part of his mandate, he manages go-to-market planning and marketing programs to further build brand equity and generate sustainable business development.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • gdpr-enews

    The GDPR and Privacy: What Security Leaders Need to Know

    See More
  • Safety in the Cloud - Best Practices for Private and Public Models

    See More
  • surveillance camera in city

    44% of organizations utilize hybrid-cloud for data storage

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • The Database Hacker's Handboo

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing