Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Look to the Clouds and Ask, “Why?”

February 1, 2012

As Cloud Computing becomes the new platform for many aspects of our lives, from Google Mail to iTunes to banking and more, the discussion specific to security tends to focus on the What. It may be helpful to look at the Why.

Security Cloud Computing (SCC) is changing the very fabric of how security is sold, delivered, used and as a result, valued. While SCC is nothing new to the security monitoring business model, SCC may benefit your security program. You will hear concerns that the cloud is not secure. But that is not our cloud. Securing the cloud is important, and very smart people are working to ensure that happens. Our opportunity is to use the cloud to secure our organizations, not to secure the cloud.

As a definition, any security related application (video, identity, access, fire, intrusion, life safety) that is traditionally purchased, installed and managed can become a cloud-based service with recurring payments as the model versus capital expenses.

What is driving Security Cloud Computing, and is it time for an upgrade to your plan?

 

WHAT is Changing?

   Three technology trends are combining to enable successful cloud computing models and the layering of applications on the cloud. In our case, security is the application on the cloud platform.

  1. The digitalization of all things, including security technologies
  2. The delivery of software as a service replacing software purchase and upgrades
  3. Mobilization forcing the distribution of information to more than 2 billion and growing smart phone devices.

 

Digitalization has occurred, as the move from analog to IP is in full force with more than 65 percent of all DVRs sold including Ethernet connections. IMS Research identifies that more than 50 percent of all 32 or more camera installations are now IP (with analog dominating the under 16 camera installations).

Software as a Service (SaaS) is logical, efficient and now technically practical. The days of buying and installing software that ages quickly and requires upgrades/replacement by users are in the rear view mirror. SaaS changes the way we live our lives and access information from music on iTunes, to customer information on Salesforce.com to books from Amazon to entertainment via on demand video at home. Those failing to meet this call will go the way of Blockbuster and Borders. Having the latest version of software each time you log in and having subject matter experts upgrade and maintain that software is a good thing. The move to virtualization is in full force.

Mobilization, especially the 2-4 billion smart phone devices where people want to get their information, video and the latest issue of Securitymagazine is changing where we work and how we live. This information has to be collected in and distributed from a cloud platform with the latest software in place.

Combined, this tsunami of change is impacting every business, including security.

“There are some very powerful technologies available today. And those that are not using them are running out of excuses,” notes Bud Broomhead, CEO of Intransa.

 

WHY it is Changing

Enterprise goals have moved from event response to risk management. The goal is to achieve situational awareness and event prevention as well as provide an effective response to unforeseen events. Organizations like yours are demanding access to all business information when, where and how you want it, and that includes security-related information.

At the same time, organizations are more focused on putting resources into strategic initiatives and outsourcing non-strategic activities. For example, an investment company will outsource payroll to ADP but not the development of algorithms that create a competitive advantage on their trading floor. SaaS for security fits perfectly into that goal.

SCC delivers powerful information to achieve a broader array of business goals. Customer metrics, including people counting at stores or crowd control in public venues, are enabling both business and security decisions during fluid situations that benefit all your stakeholders. 

Even more, SCC is being adopted due to internal corporate responsibilities, legislation, insurance and risk management. For example, drug treatment facilities are required to host video content offsite. The value in the physical security application must transcend security and create broader business value to be justified. For your consideration, these are the WHYs of SCC.   

KEYWORDS: cloud computing cloud security saas SCC

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • stadium_enews

    When It Comes to Event Security, Colleges Can Look to the Pros

    See More
  • cloud-computing-freepik

    CISOs to developers: Changing the way organizations look at authorization policy

    See More
  • boon edam

    Touchless access control solutions look to alter the landscape of higher education

    See More

Related Products

See More Products
  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • The Complete Guide to Physical Security

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing