Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Look to the Clouds and Ask, “Why?”

Mark McCourt
February 1, 2012

As Cloud Computing becomes the new platform for many aspects of our lives, from Google Mail to iTunes to banking and more, the discussion specific to security tends to focus on the What. It may be helpful to look at the Why.

Security Cloud Computing (SCC) is changing the very fabric of how security is sold, delivered, used and as a result, valued. While SCC is nothing new to the security monitoring business model, SCC may benefit your security program. You will hear concerns that the cloud is not secure. But that is not our cloud. Securing the cloud is important, and very smart people are working to ensure that happens. Our opportunity is to use the cloud to secure our organizations, not to secure the cloud.

As a definition, any security related application (video, identity, access, fire, intrusion, life safety) that is traditionally purchased, installed and managed can become a cloud-based service with recurring payments as the model versus capital expenses.

What is driving Security Cloud Computing, and is it time for an upgrade to your plan?

 

WHAT is Changing?

   Three technology trends are combining to enable successful cloud computing models and the layering of applications on the cloud. In our case, security is the application on the cloud platform.

  1. The digitalization of all things, including security technologies
  2. The delivery of software as a service replacing software purchase and upgrades
  3. Mobilization forcing the distribution of information to more than 2 billion and growing smart phone devices.

 

Digitalization has occurred, as the move from analog to IP is in full force with more than 65 percent of all DVRs sold including Ethernet connections. IMS Research identifies that more than 50 percent of all 32 or more camera installations are now IP (with analog dominating the under 16 camera installations).

Software as a Service (SaaS) is logical, efficient and now technically practical. The days of buying and installing software that ages quickly and requires upgrades/replacement by users are in the rear view mirror. SaaS changes the way we live our lives and access information from music on iTunes, to customer information on Salesforce.com to books from Amazon to entertainment via on demand video at home. Those failing to meet this call will go the way of Blockbuster and Borders. Having the latest version of software each time you log in and having subject matter experts upgrade and maintain that software is a good thing. The move to virtualization is in full force.

Mobilization, especially the 2-4 billion smart phone devices where people want to get their information, video and the latest issue of Securitymagazine is changing where we work and how we live. This information has to be collected in and distributed from a cloud platform with the latest software in place.

Combined, this tsunami of change is impacting every business, including security.

“There are some very powerful technologies available today. And those that are not using them are running out of excuses,” notes Bud Broomhead, CEO of Intransa.

 

WHY it is Changing

Enterprise goals have moved from event response to risk management. The goal is to achieve situational awareness and event prevention as well as provide an effective response to unforeseen events. Organizations like yours are demanding access to all business information when, where and how you want it, and that includes security-related information.

At the same time, organizations are more focused on putting resources into strategic initiatives and outsourcing non-strategic activities. For example, an investment company will outsource payroll to ADP but not the development of algorithms that create a competitive advantage on their trading floor. SaaS for security fits perfectly into that goal.

SCC delivers powerful information to achieve a broader array of business goals. Customer metrics, including people counting at stores or crowd control in public venues, are enabling both business and security decisions during fluid situations that benefit all your stakeholders. 

Even more, SCC is being adopted due to internal corporate responsibilities, legislation, insurance and risk management. For example, drug treatment facilities are required to host video content offsite. The value in the physical security application must transcend security and create broader business value to be justified. For your consideration, these are the WHYs of SCC.   

KEYWORDS: cloud computing cloud security saas SCC

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Web Exclusive Logo

    Working in the Cloud: Critical Security Questions to ask any SaaS provider

    See More

Related Products

See More Products
  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing