Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementSecurity & Business ResilienceVideo Surveillance

Migrating video surveillance to the cloud can improve overall security

By Phil Coombs
Cloud network security
October 22, 2021

As cloud software becomes more widely adopted across the professional security industry, questions around whether it is secure are mounting. Understandably, users may wonder whether cloud video surveillance is secure after the major security failure of a well-established cloud player.

The truth of the matter is that security systems remain high on hackers’ preferred gateways to users’ networks and data. Thus, it’s important to note that, just like other classifications of network-related service providers, not all cloud video surveillance companies are created equal when it comes to security. There are a multitude of factors affecting the security of cloud platforms, from their ownership model to the security protocols they take. And when cloud service providers get security right, cloud usage can be more secure than traditional security systems, both in terms of cybersecurity, video integrity and security operations overall.

The growing popularity of cloud video surveillance

One of the main reasons enterprises (and individuals) are adopting cloud-based security systems is ease of use. Specifically, the cloud allows users to remotely access and control their video surveillance systems. Users can access footage from anywhere, at any time, and video events are easy to download and share. Users can also easily grant trusted associates and partners access to their footage with multi-user permissions.

Equally important, local storage hardware isn’t required for cloud users. Users can store video footage on the cloud, meaning they don’t have to buy or maintain local recorders. However, while cloud security systems are becoming more popular, one of the main reasons that it isn’t being adopted universally is due to concerns about its security. 

The shared responsibility model

There are multiple entities that are responsible for the security of cloud video surveillance, including the cloud provider, the cloud platform and the cloud customer. The cloud providers are companies who provide the computing infrastructure to store video for the cloud platform, while the cloud platforms are the companies that provide cloud applications using the cloud infrastructure. For example, cloud platforms that use AWS as their cloud provider include Netflix, Twitch and LinkedIn. For security systems, the cloud customer is the enterprise, security leader or other user of the cloud-based system.

It’s important to distinguish between these different actors, as they all play an integral role in what is called the “shared responsibility model,” in which the security of the system simultaneously falls on the cloud provider, the cloud platform and the end user. The cloud provider is responsible for ensuring the integrity of its resources and equipment. Essentially, the cloud provider has responsibility for the cloud, while those using the cloud have onus for security in the cloud.

The cloud video surveillance company is responsible for keeping their customers' footage secure when transmitting video to the cloud and storing it there. The security leader or user of the platform has responsibility for the security of their system and its devices. They should use unique and strong passwords which they keep private and be sure to keep device firmware updated to remain vigilant against cyber phishing attacks.

While cloud security is a shared responsibility across these different groups, the majority of concern in the professional security industry is linked to the integrity of the cloud platform provider. 

The security of cloud video surveillance platforms

As history has proven, cloud video surveillance companies are not all created equal when it comes to security. A major security breach at a well-known video platform provider has given the cloud video surveillance industry a bad name, scaring potential users from adopting cloud-based systems. One of the key mistakes made by this platform provider is that it allowed many employees to access video content from their users. By contrast, only a very limited number of senior employees should have permission to access video content under extreme circumstances when a customer gives permission.

Questions have also been raised about the security of cloud video surveillance solutions provided by key camera manufacturers. However, independent cloud video surveillance companies that add an independent bridge to the security system do not allow device or software suppliers to access users’ video footage.

Another potential security issue, which can be overcome, is to change the default usernames and passwords of cameras and other edge devices upon installation. Using unique strong passwords helps protect networked systems from harmful breaches such as those widely experienced over the last few years.

A common concern held by security system users is the safety and reliability of surveillance footage and making sure it won't “disappear” on the cloud. Traditional security systems with local recorders are vulnerable to accidental damage caused by fire or flooding or deliberate damage by intruders. Backing up locally recorded video to the cloud may remove these risks, and, in some cases, can eliminate the local recorder altogether and record video straight to the cloud.

With local surveillance recording, such systems may have limited storage capacity and may overwrite previous footage. With cloud, enterprises can choose their storage duration and increase capacity when needed. In addition, offsite cloud storage solutions have the ability to notify users when and if a problem with storage or recording ever arises.

Another significant security issue with traditional local recorders is that port-forwarding is often required to allow for internet connection and remote viewing. With port-forwarding users get around their own firewall by creating a hole in their system, possibly leaving it vulnerable to infiltration. 

Carefully choose your cloud provider

Cloud’s popularity in the security industry will continue to grow as more users establish proof of performance and share their experiences. The bottom line is that when the proper established security measures are taken, cloud video storage solutions is secure and offers many benefits to the end user.

Selecting the right platform provider will ensure that all the proper security protocols and practices are in place, further accelerating the industry’s inevitable migration to video surveillance in the cloud.

KEYWORDS: cloud cloud security cyber security threat phishing attack surveillance cameras surveillance cybersecurity video feeds for security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Phil coombs

Phil Coombs is Chief Technology Officer at Videoloft. He has 30 years of experience in software and systems development. Coombs developed and published several video games while at school, including a top 10 hit. He attended Birmingham University.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • the cloud

    Migrating Physical Security to the Cloud: Understanding the Total Cost of Ownership

    See More
  • 7 Benefits of Migrating to IP Video Surveillance

    See More
  • Olymbec installs Hanwha video surveillance security cameras to increase rentability and improve investigations

    Industrial real estate holder Olymbec installs video surveillance to add security and improve rentability

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing