Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityAccess Management

Haven't Considered Cloud? Now may be the Time

By Per Björkdahl
cloud-enews
May 26, 2020

Ready or not, cloud is already making its impact on the industry. While it’s not a new technology to the industry, it continues to see growth, driven by growing possibilities in the IoT space. Security end users and their organizations are shifting to truly embrace the cloud, with worldwide spending on public cloud services and infrastructure forecasted to reach $210 billion in 2019 – an increase of 24 percent over 2018. Cloud services can provide benefits not only to large enterprise organizations, but small and mid-sized businesses as well by providing cost-effective solutions and increased flexibility. These aspects are particularly important now as the COVID-19 pandemic is causing many organizations to reevaluate the traditional usage of corporate office space.

With cloud-based video and access control services, organizations can save on hardware and service costs by reducing the purchase of hardware – NVRs, access control servers or controllers – and enabling end users to increase or decrease the level of service as needed.

In particular, cloud-based access can be more accessible, flexible and easier to manage than ever before. For a small business owner searching for easier credential management, cloud connectivity capabilities include granting and revoking access rights, creating schedules and remote monitoring of their access control system.

 

Remote Monitoring

As cloud grows in popularity, the demand for integration and enriched service offerings – such as the ability for remote monitoring – is also on the rise. With many facilities still temporarily closed due to COVID-19, the ease of remote monitoring is especially important and is expected to play a part in the reopening of facilities. Cloud services can help determine overall system health and device status, such as whether damage has been done to the camera, if there were errors – providing notifications long before an onsite manager would be notified. These are crucial capabilities to facility managers who are navigating the management of empty spaces and storefronts from a remote location.

 

Hybrid Solutions

Another area of industry growth, driven by cloud solutions, is being offered by Video Management Systems (VMS) manufacturers to ease the transition to cloud, for those users for whom it makes sense. While a migrating fully to the cloud can be challenging for large, enterprise organizations, a hybrid solution featuring both onsite and offsite capabilities offers an ideal alternative. End users are able to choose what events are uploaded to the cloud, thus saving on bandwidth and storage costs. These hybrid options, coupled with the growing popularity of cloud, is increasing the demand for integration, as well as bringing about a greater demand for open protocols. As the demand for hybrid solutions increases, more and more services are built up around this model, such as remote monitoring.

 

Cybersecurity

Cloud-based physical security systems come in many different shapes and sizes, and each poses its own cybersecurity challenges. As many vendors rely on large cloud providers, who make cybersecurity a core part of their offering, security systems in the cloud can take advantage of these large investments in cybersecurity. However, as access control and video systems have become more connected, they face the same cyber requirements as any device within the corporate network. If the end user and manufacturer fail to have a set of cybersecurity policies in place that take into account sound cyber practices, any device can become the victim of a cyberattack. It’s important for all stakeholders – end users in security and IT, integrators and manufacturers – to ensure that sure best practices are followed throughout every step of implementation.

KEYWORDS: access control cloud security cyber security remote monitoring

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Per Björkdahl, ONVIF Steering Committee Chair

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • physical security technology systems migration to the cloud

    Now is the time to move your physical security to the cloud

    See More
  • Cybersecurity with username and password

    It May be Time to Review Your Cyber Hygiene

    See More
  • security-strategy-fp1170x658v5.jpg

    With record-high data breaches, now is the time for cybersecurity storage adoption

    See More

Events

View AllSubmit An Event
  • May 22, 2012

    Cloud Security Alliance CCSK Training

    This class is geared towards security professionals, but is also useful for anyone looking to expand their knowledge of cloud security.
  • May 2, 2012

    Cloud Security Alliance CCSK Training

    This class is geared towards security professionals, but is also useful for anyone looking to expand their knowledge of cloud security.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing