Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalTechnologies & SolutionsAccess ManagementIdentity ManagementPhysical Security

Now is the time to move your physical security to the cloud

By Mark Rowan
physical security technology systems migration to the cloud
July 26, 2021

Who could have predicted two years ago that a global pandemic would bring such unprecedented change to our working culture?

As COVID-19-19 swept the globe in 2020, remote working became the new norm and organizations were forced to adapt their practices almost overnight to ensure business could continue. The ability to manage employees, access documents and applications from anywhere and collaborate with colleagues and customers seamlessly and securely became essential.

In the IT space, the pandemic only accelerated a shift that was already well underway. Since the mid-‘90s, organizations have been gradually moving IT services and infrastructure to the cloud. From Microsoft Office 365 to document management, collaboration tools, CRM, HR or payroll — much of IT already runs seamlessly and securely in the cloud. In fact, according to a recent Accenture report, 50% of all corporate data is now stored in the cloud.  

For physical security, the picture is quite different. Whilst there has been much written about the many benefits of the cloud, there is still a slow uptake when it comes to using cloud for physical security applications. Traditionally, security applications have been built on hardware housed on site, designed to be locked down with limited access, reduced remote capabilities and in many cases hidden from the internet altogether. When speaking to clients, the most common concerns around adopting cloud tend to be around migration and infrastructure challenges, cybersecurity and compatibility.

However, COVID-19 has been a wakeup call: the future is uncertain and it’s essential to be prepared for any eventuality, especially when it comes to our most crucial systems. The cloud is the agile solution that lets organizations scale and adapt as needed.

Key benefits of the cloud

As workforce locations change either by design or through circumstances — such as in the case of the pandemic lockdowns — fluidity and agility in any solution are key. First and foremost, the cloud is always on and easily accessible from anywhere you have internet access, so the ability to connect remains unaffected. Add to this that many cloud security solutions can be viewed via a web browser or mobile device, so you are no longer tied to a desktop with dedicated applications, again removing the accessibility restrictions of an on-premise solution.  Security or administration personnel can continue to monitor and manage the system from anywhere.

Of course, with the ability to access security systems over the internet thoughts often turn to the risks and cybersecurity threats. Cybercrime continues to grow at an alarming rate and over the pandemic it increased dramatically. However, cloud architecture providers will typically observe the latest best practices when it comes to cybersecurity threats. Patches, hotfixes, updates etc. are all automatically done and kept up to date, providing assurance that backdoors or breach points are not introduced. In many cases, this makes them more secure than most on premise solutions.     

As the fallout of the pandemic subsides and the dust starts to settle, many organizations are starting to review their working location practices and potentially offering more home or remote working options for staff. This allows for reducing or better utilizing their real estate and, whilst there will still be requirements for security hardware such as cameras or access control readers, moving the backend to the cloud means a dedicated location for housing racks, along with power, cooling systems and all the rest will no longer be required. This space can then also be repurposed as part of these changes. 

Considerations

With all these changes and uncertainty, you may already be considering taking the steps to move to the cloud. As the market for cloud-based physical security solutions and applications continues to grow, there are many manufacturers with lots of offerings and it can be somewhat confusing to determine which may be right for you. There are however a couple of key areas you may want to consider when making your assessments.

1. There are different types of cloud implementation

Firstly, when considering a cloud migration it is important to understand the different options available. There’s a difference between true cloud, cloud-managed and hybrid cloud. For example, from a CCTV perspective, true cloud would mean all video and software was hosted in the cloud, cloud-managed would typically mean the video was stored on the camera, but the software was in the cloud and lastly hybrid cloud would mean the video is stored on an on-site box with the software in the cloud.

Which is right for you will depend on how you are looking to adapt to the changes that COVID-19 has presented to your business. For instance, if you are looking to reduce real estate, then you might want to consider a true cloud solution. Moving all backend recording and storage hardware into the cloud will mean that you will only require the cameras and a network infrastructure on site.

2. The right manufacturer is essential

Due diligence in the manufacturer assessment and selection is vital to the success of any cloud deployment. Whether you are looking for a Software as a Service (SaaS), Infrastructure as a Service (IaaS), or Platform as a Service (PaaS) offering, it is vital to select a provider that has a security by design approach, a reputation of trust and that provides transparency on how your data is managed and protected in their systems.

Will they highlight potential risks and vulnerabilities rather than hide them? What levels of penetration testing do they undergo and how frequently? Do they provide clear detail on the data communication flows? Do they require you to open multiple firewalls ports or ways of injecting potential exploits and what level of encryption do they employ for your connectivity and data in transit or at rest? These are just a few questions you may look to ask in order to understand how they protect you from cyber risks and threats.

3. Small steps can make a large difference

You may have been impacted by some of the challenges mentioned above during the pandemic and come face to face with the task of migration but are concerned that a project of such scale may require a huge uplift and therefore a huge budget. It is important to note that a migration to the cloud doesn’t have to be an all or nothing approach—you do not have to move your whole system from day one. It is possible to migrate slowly and to break the deployment into chunks.

For example, take footage from low-priority cameras first, or if you have a multi-site deployment and are looking at reducing space moving one site across first and then scaling as need or budget dictates. This approach not only provides a step change but allows you to build confidence and comfort and manage the budgets.

4. Legacy systems don’t need to hold you back

If your current provider does not have a cloud solution or a near-term strategy, this does not have to be a limiting factor. Again, you do not need to consider a rip and replace approach. There are products on the market that will sit alongside your existing system and take video feeds and record to the cloud without impact, providing both on premise and cloud functionality with a migration path as and when budget or demand allows.

It is impossible to predict what the next change might be and where it may come from or the impacts it could have. Hopefully we will not see something of this scale again but migrating your security platform to a cloud-based architecture gives you a futureproof platform that will offer you the ability to adapt and change as demand dictates. It will provide the security, agility, flexibility and assurance so that, come what may, operations can continue unaffected.

 

KEYWORDS: cloud migration cloud security cloud-based access control physical security systems security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mark Rowan is founder and Managing Director of QCIC, a global security engineering company specializing in designing, building and running security systems. Rowan has over 30 years of experience working within the built environment, the past 20 of which have been dedicated to security engineering.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • security guard freepik

    Why now is a crucial time to protect the mental health of security workers

    See More
  • employee at computer

    Now is the time to prioritize cybersecurity

    See More
  • The Long and Winding Road to Cyber Recovery

    Shadow IT was a security crisis. Now Shadow IT 2.0 is looming. Let’s skip the crisis this time.

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products

Events

View AllSubmit An Event
  • September 25, 2024

    How to Incorporate Security Into Your Company Culture

    ON DEMAND: From this webinar, you will learn how to promote collaboration between IT and physical security teams to streamline corporate security initiatives.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!