Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsVideo Surveillance

How to Manage Surveillance Over the Private Cloud

By Keven Marier
December 1, 2012

In this article:

  • Private Versus Public Clouds

  • Why Managed Services?

  • Public Cloud Surveillance Hype

  • Think Evolution

What’s happening in the IT industry should be seen as a predictor for the future of networked surveillance. Approximately a year ago, a major indicator occurred that predicted that managed services would experience a period of accelerated growth and become a permanent segment of the IT services market. At the time a private equity firm invested in N-able Technologies, a Management Services Provider (MSP), and Zenith Infotech spun off from Zenith RMM. More mergers and acquisitions followed, along with increased venture capital activity, especially in the areas of small business cloud storage and online backup services.  

It has reached a point where the major players are not trying to gain market share from each other, instead they are focused on trying to grow the size of the market itself.  This will happen in the networked surveillance industry, and managed services delivered via a private cloud infrastructure will be the first examples of this. However, today the majority of the security marketplace is still focused on locally installed, operated and managed surveillance system deployment strategies, with much of today’s new-networked surveillance projects being migrations from analog cameras and DVR replacements. When the networked surveillance deployments make up the majority of the marketplace, manufacturers will start to shift their focus on growing the surveillance market as a whole. The enabling networked surveillance system design strategies will first be managed services delivered via a private cloud infrastructure.

 

Private Versus Public Clouds

The bulk of the market for security and surveillance managed services today revolves around onsite deployments and requires the service provider to operate and maintain the system at the customer’s location. A key objective initially will be to move the management of the system into the cloud, and we already see VMS and PSIM software providers making investments in these types of software technologies.

The public cloud right now is where anyone and everyone in a marketplace can get everything from a pool of shared surveillance applications and storage, over a public network and have it maintained by the same provider. Private cloud surveillance systems typically involve a single user with many locations accessing a private network or VPN (Virtual Private Network) and using their own dedicated hardware and software that is both onsite and in the private cloud. In either case, cloud-based solutions make perfect sense for the surveillance needs of a small to medium-sized business as well as large, multisite enterprise organizations.

 

Why Managed Services?

Private, cloud-based managed services will gain popularity because buyers still get the benefits of knowing they have control over where and which hardware they are using because they “specify” the system. However, they don’t have to take the risks of deploying, managing and maintaining these large complex surveillance systems. While the relative size of these deployments is only slightly larger than the analog systems, your security operations can benefit from centralized management and a common software interface. In addition, these designs offer you the opportunity to significantly reduce your locally deployed hardware footprint.  They also create buildable economic models for you and your service provider by being able to leverage highly trained resources to operate, manage and maintain solutions. For you, it creates a highly flexible and scalable surveillance system.

 

Public Cloud Surveillance Hype

There is a lot of discussion surrounding the benefits of public cloud surveillance – I believe that it is still very much in the hype phase of technology adoption. The challenges are very real with these types of public surveillance as a service offerings, because they require very large capital investments upfront and the hardware technologies used to power them have a relatively short life cycle of three to five years. This results in a big risk for the provider to be able to get enough customers to use the system in a very short period of time, which can result in poorly planned financial models.

 

Think Evolution

The most effective, economically sound cloud designs available today are the private cloud with managed services. Don’t think of it as “revolution,” instead, think of it as “evolution.”  

 

Read more Surveillance Strategies at SecurityMagazine.com/Columns/Surveillance
 


 

This article was previously published in the print edition as "Surveillance Managed Services Delivered via the Private Cloud."

KEYWORDS: cloud computing cloud security surveillance as a service

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Keven Marier is the founder and CEO of Connex International, Inc. He has a 20-year background in technology consulting, publishing and educating within the physical security technology and enterprise IT industries. Connex International Inc. is a 55-person global professional services company providing services to security manufacturers, distributors, systems integrators and end-users in 14 different languages.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • How to Measure the Effect of Megapixels

    See More
  • How to Implement Advanced Surveillance Training Policies

    See More
  • Adapting Surveillance for Security-as-a-Service

    See More

Related Products

See More Products
  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing