Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

The Perfect Host? It’s a Matter of Choice

By Bill Zalud
Nine West store

Brian David, security manager for The Jones Group, chose a software-as-a-service access control approach “because we wanted a remote, Web-based system that would enable us to control multiple locations at once.”

Graph showing reduction of costs
Here is an example of how Siemens helps compare the cost of a typical onsite system versus a remote security management solution comprised of hosted and managed services.
Antonio Piranio

Many buyers are flying blind, contends Antonio Piranio. “Cloud services are what the enterprise wants them to be. And people define vulnerability by what it matters to them.”

Nine West store
Graph showing reduction of costs
Antonio Piranio
April 1, 2012

No doubt, too many choices can lead to confusion. Still, and obviously, the ubiquitous Web and mobile devices, to a lesser extent, have spurred hosted and managed services, remote intelligent monitoring, software-as-a-service and in-the-cloud solutions that impact access control, security video, mass notification and even security guarding.

Such approaches continue to be more attractive and even fashionable, in a business-centric way.

Brian David, security manager for The Jones Group, a designer, marketer and wholesaler of branded apparel, footwear and accessories, knows. He chose a software-as-a-service access control approach “because we wanted a remote, Web-based system that would enable us to control multiple locations at once. One of our goals is to unite all of our brands by creating a strong and secure global badge, a consistent form of identification throughout the company. Unlike a proprietary system, the technology in a Web-based system allows us to minimize the number of personnel we need devoted to security, and in turn enables us to be a more efficient and secure company.”

David cut through the confusion to pick what he needed.

It is not an easy task.

For Eric Zurawski of Insurance Auto Auctions (IAA), headquartered in Westchester, Ill., it is more an evolution then a big leap. He says that his firm was “using live security video monitoring about two years ago” but has moved to more intelligent cameras with software analytics to protect 24 locations across the nation. The approach is more efficient and “better at recognizing people and vehicles” when compared to people looking at monitor screens.

 

Remote Monitoring Services

Zurawski also uses Viewpoint CRM, a video monitoring service. Using video analytic technology, Viewpoint’s remote monitoring center staff responds to the video surveillance system alarms in real-time. With IP video, “I also have the ability to look into video from my laptop or even my smartphone with an app,” Zurawski says. In addition, “almost all of our cameras are outdoors. And with some of them, legacy analog cameras, we have added encoders, too.”

In this new world, however, everything is not as cut and dried.

There are hosted security services – taking information from an enterprise site such as alarms, card access, video or a combination and taking some type of action including audit trails and video recording.

There are managed security services – the day-to-day monitoring and interpretation of important system events.

And there is software-as-a-service – software and its associated data that are hosted centrally (typically in the cloud) and typically accessed by users using a Web browser over the Internet.

They have their commonalities and their differences, based on return on investment, corporate culture, staffing, legacy technologies, number of facilities and, yes, security needs. In the old, old days – you know, 20 years ago – the concept was called outsourcing. But, with the Internet, Web browsers, tight budgets and the growing influence of IT’s love-it-hate-it concepts, there is that perceptible shift from do it yourself to pay someone else to do at least some of it.

 

A Win-Win Situation

The shift provides more choices for enterprise security leaders. But the shift also creates enlarging and new ways integrators and others can create a closer relationship and revenue streams, too. Not a bad deal for some. At The Jones Group, for instance, Protection 1 and Peace of Mind Security have both provided integration and installation expertise on this on-going project. And Jones will soon begin integrating video surveillance into its Brivo system.

But it all makes business sense for David. Installation of the technology has resulted in substantial savings and has given The Jones Group the ability to run multiple reports to view all activity in the company’s facilities and look for patterns that may suggest something is amiss. The staff also uses the system’s alert feature to notify them about temperature fluctuations, power failures and other critical events for which they want immediate information.

It is the same story specific to security guarding provided by firms such as VirSec Virtual Security and integrator Convergint Technologies, which works with it. For enterprise security executives frustrated by the high cost of security staffing, a virtual security officer is a solution. Virtual patrols, escorts and interventions make a VirSec officer an option for everything from critical infrastructure to vacant real estate. Security magazine has a free Webinar on the topic at www.securitymagazine.com and by clicking Events and then Webinars.

 

Need for More Robust Solutions

Security needs for small to medium size organizations have moved into the cloud due to lack of resources and capital funds. “However, the challenging questions are typically not from the small to medium size companies, but from the large enterprise class companies struggling with if and how SaaS solutions can help them,” says Phil Atteberry, director of managed security services with Siemens Building Technologies. “The answer is a more robust solution than just SaaS alone. It should be combined with managed services such as remote access management and remote video monitoring services. Through this combination of hosted and managed services, enterprises can reduce their upfront capital costs and further reduce their total cost of ownership of the solution by reducing their IT and security spend over time.”

Moving into the cloud demands more inspection beyond working with an integrator, though.

Security or an integrator may use a managed service provider (MSP). MSPs are service providers that remotely manage and monitor portions of a client’s infrastructure, says Siobhan Byron, president, Forsythe Technology Canada, and vice president, managed services. “A company can hand over the maintenance of their devices or appliances without compromising their people or policies. Engaging an MSP is a fairly affordable and easy way for a company to operate more efficiently. Outsourcing lost some popularity after the 1990s because many companies felt they lost control and outsourced too much of the business operations, but today selective sourcing is a growing trend. Businesses can engage an MSP as a partner who can work as an extension of their in-house team. The MSP manages parts of their technology environment, while the necessary business functions and policies are still managed in-house.”

 

Managed Service Providers

   When considering working with an MSP, according to Byron, there are a few things to keep in mind. Among them:

•  Research the provider. Understand the vendor’s strengths and weaknesses and select a provider that’s a good culture fit. When establishing a long-term relationship, find a comfort level with a partner that offers good communication, so that they act as an extension of the in-house team.

•  Think about location. The physical location of the MSP can be a factor for some organizations.

•  Consider the capabilities of the MSP. Look at the provider’s overall capabilities. For instance, what are their on-site consulting capabilities? What types of tools and processes do they have in place to ensure quick diagnoses and remedy? What is the full value the partnership can bring now and in the future?

•  Define policy ownership. Consider the policy ownership model the provider uses. Can your business maintain ownership and decision-making responsibilities for policies or does the MSP dictate?

At the heart of many cloud services is a data center, in which its own security and business continuity play a significant role.

Matt Krebs, business develoment manager for hosted video at Axis Communications, with a software platform for creating a service provider-specific portal to manage video monitoring services over the Internet, has some solid advice. When evaluating providers, “beware of so-called benchmarks. A Tier 2 data center is the minimum you should look for.” Tier 1 to 4 data center ratings are nothing but a standardized methodology used to define uptime of data center. This is useful for measuring:

 

•  Data center performance

•  Investment

•  ROI

 

Tier 4 data centers are considered as the most robust and less prone to failures. Tier 4 is designed to host mission critical servers and computer systems, with fully redundant subsystems (cooling, power, network links, storage etc.) and compartmentalized security zones controlled by biometric access controls methods. Naturally, the simplest is a Tier 1 data center used by small businesses.

 

•  Tier 1 = Non-redundant capacity components (single uplink and servers)

•  Tier 2 = Tier 1 + Redundant capacity components

•  Tier 3 = Tier 1 + Tier 2 + Dual-powered equipment and multiple uplinks

•  Tier 4 = Tier 1 + Tier 2 + Tier 3 + all components are fully fault-tolerant including uplinks, storage, chillers, HVAC systems, servers, etc: Everything is dual-powered.

 

No matter hosted to managed, no matter the service provider, when some go up in the cloud, “many are flying blind,” contends Antonio Piranio, chief technology officer at ScienceLogic, which simplifies data center and cloud management for service providers. Often, “cloud services are what the enterprise wants them to be. And people define vulnerability by what it matters to them.”

KEYWORDS: cloud computing data center security hosted services mass notification

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber software freepik

    When it comes to cyber risk, company size doesn't matter

    See More
  • insurance-freepik

    The beginning of a beautiful friendship: How the insurance industry can partner with IT to create true digital transformation

    See More
  • healthcare security freepik

    Healthcare + Security: Why it needs to matter to everyone

    See More
×
Brian David, security manager for The Jones Group, chose a software-as-a-service access control approach “because we wanted a remote, Web-based system that would enable us to control multiple locations at once.”
Here is an example of how Siemens helps compare the cost of a typical onsite system versus a remote security management solution comprised of hosted and managed services.
Many buyers are flying blind, contends Antonio Piranio. “Cloud services are what the enterprise wants them to be. And people define vulnerability by what it matters to them.”

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!