Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Newswire

Bob Beliles Exclusive Blog from ASIS – Day Two: Hosted Services More than Just Outsourcing

October 13, 2010

In my continuing three-day ASIS exhibit floor mission to find products that are and will be impactful, I have come across several vendors that are leveraging proven technology from the IT world to address various security challenges.  Yesterday, I focused on virtualization. Today, it is all about hosted services. Based on discussions with vendors and integrators alike, my guess is that you are going to see more vendors and integrators jumping on board this bandwagon and end users will welcome the move.

Hosted services are a bit of a twist on a couple of older business / technology models. A key component of hosted services is the software application itself, which you may hear referred to as “software as a service.”  For physical security, that could be video surveillance, access control, video content analysis (video analytics) or mass notification.  This software is typically deployed in some remote location under the control of the hosted services provider and is not situated on the customer / user’s premises.  Since these physical security applications typically interact with hardware, physical security hosted services may also have a hardware component which is deployed at the customer’s location to ensure security functions can continue to operate in the event of a wide area network connection failure.  

In addition to maintaining the software, you will frequently find that hosted service providers also support off-premises application memory, data storage, and a web-server.  The hosted services provider also has network security mechanisms to protect the physical security software, memory, storage as well as the security information itself.  As you might infer, this frees the customer from maintenance tasks (operating system and application updates, security / virus protection and remediation), thereby reducing operation and configuration complexity.  Customers effectively out-source maintenance costs for a very predictable and consistent recurring fee.  Additionally, hosted services providers can allocate maintenance resources and costs for the software and hardware used by multiple customers much more effectively than the customer can support a single, non-hosted version of the software application. 

In some cases, the hosted service provider will configure the application, but in others the customer may configure and operate the hosted application. As described above, the hosted services application is available to the customer through a web interface.  Information / data generated at the customer premises is sent to the hosted software application.  Essentially, someone else (the services provider) is maintaining servers, patches, cooling and power, etc.  Customers simply run the application, and perform common tasks. 

In contrast, managed services are offered by a service provider will always handle maintenance, configuration and, to a large degree, operation.  Managed services are more akin to having someone behind the curtains, pulling all the strings.  The customer has very little control over the application.

So what vendors are offering hosted services? As I mentioned the list is growing, but you will find hosted services offered by Axis Communications (cameras), Brivo (access control), IPVision Software (video surveillance), Jemez Technology (intelligent video image reconnaissance, e.g. video analytics), and AquilaVision (mass notification).   Next Level Security Systems (video surveillance and access control) will offer their forthcoming product as a hosted service.  It should be understood that vendors may also offer traditional versions of their products as well.  Hosted services and traditional products are not mutually exclusive.  And to be fair, Axis has quietly offered software as a service to go along with their cameras for several years.  Although, they became more visible with this offering, earlier this year.  

While not necessarily the case for any of the above named vendors, systems integrators / dealers and end user system owners / operators should check to see if the hosted application provides full or limited functionality as compared to the traditional product offering.

To summarize the benefits, end security system owners / users will be able to focus more on security and less on system maintenance which is now outsourced to the manufacturer.  They will get this outsourcing benefit while also getting a consistent and predictable operations cost (e.g. a monthly bill).

It’s no wonder that IT business applications, such as Salesforce have seen phenomenal growth as a result of offering their software as a hosted application. They have a very compelling value proposition that dealers and customers really appreciate.  The same should be true for physical security applications.  All aboard!

Bob Beliles is president at B2 Convergence Consulting. Previously he was vice president of enterprise business development for Hirsch Electronics. Check out Bob's first blog from ASIS. Use link below.

 



Links

  • First Beliles Blog

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Bob Beliles Exclusive Blog from ASIS – Day Three: Integration and Plug 'N Play

    See More
  • Bob Beliles Exclusive Blog from ASIS: Virtualization Means Less Gear, Less Complexity

    See More
  • ASIS Day Two: It’s a Solutions World Ranging from U of Illinois and Arkansas School District to Courthouses

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • Optimizing Social Media from a B2B Perspective

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing