The Security Integrator’s Guide to Profiting From Cloud Services

Cloud-based video recording, retrieval and storage solutions are leading the charge for cultivating video surveillance as a service (VSaaS) offerings and profits. Discover current capabilities and demand, and pick up operational, marketing and sales tips.

The Security Integrator’s Guide to Profiting From Cloud Services

Addressing Bandwidth Issues

Internet bandwidth is one of the most important links in the remote VSaaS chain of command and control. Although bandwidth has in general improved across the board, today, as in years past, it’s still an issue for some home and business owners, especially when it comes to streaming video to the Cloud.

Kravjansky says that alarm events get passed on to the monitoring station and clients optionally pay for a plan where the cameras record to SecureNet servers, for example. These systems, he says, are basic with virtually no analytics.

“The system records internally to SD cards in the cameras when an alarm event happens as well as to the Cloud. In a residential environment this works well because video recording offsite all the time would have significant effects to their bandwidth and their monthly bill.”

All of this applies equally to small to midsize commercial accounts that want just the basics. Similar to how YouTube and other video entertainment firms buffer streaming video based on available bandwidth, Eagle Eye Networks uses this same technique.

“We have an onsite appliance that buffers the video locally until bandwidth is available to send [it] to the Cloud. In fact, we can even store the video long term locally for sites with minimal bandwidth. This keeps the other features of the Cloud, for example centralized user management, patches, constant delivery of new features, etc., available, while storing the video locally,” says Francis.

Avigilon embraces the same philosophy, recording fulltime to a device onsite while sending critical video and analytics-based intelligence back to the Cloud, where it is then pushed to the end user over their smartphone, tablet or stationary PC.

“The Avigilon Blue system integrates an on-premise Avigilon Blue Connect device that supports local storage as well as Avigilon and ONVIF-compliant cameras. Powered by patented Avigilon self-learning video analytics, it sends critical events to the Cloud for customers to view and verify from their web-connected desktop or mobile device,” says Ryan.

There is no doubt the changes that have taken place in Cloud-based VSaaS up until now are enormous, but they surely pale by comparison with those that will inevitably occur from this point forward.

Considering current plans to one day deploy a faster, more responsive, global-oriented Internet infrastructure, many of the problems the industry continually works to overcome now will soon become a thing of the past. Looking back to today’s technology, it is almost sure to invoke a sense of future shock.

Avigilon’s Blue system records to a device onsite while sending critical video and analytics-based intelligence back to the Cloud, where it is then pushed to the end user over their PC or device.

Negating the Threat of Cybercrime in the Cloud

The need for security not only pertains to the client’s physical assets but also to the data that is commonly collected, stored, and transmitted via the Internet from onsite cameras, network gear, on up to the Cloud where a computer center processes, acts on, and stores it.

With all the data breaches that appear to happen almost daily, it’s no wonder that some clients are sure to ask the really big question, “How do I know that my video cameras won’t be used by criminals to break into my facility?”

“Cybercrime is a real problem, and of course we’re concerned about it. A comprehensive cybersecurity approach is a part of our offering. We have teams of experts who are constantly monitoring our infrastructure as well as threats in general,” says Ken Francis, president of Eagle Eye Networks. “Additionally, due to the centrally managed nature of our platform, we are able to react quickly to apply patches as needed. Best practices include encryption, infrastructure monitoring, code reviews, penetration testing and other techniques.”

There are many methods designed to protect a Cloud-computing center from hackers. Today, the use of virtual servers (VS) and next-generation firewall technologies enable IT professionals to prevent catastrophic system failures due to data breaches.

This is done by isolating the actionable account data in one VS from others in the same VSaaS server. Even if a hacker is successful in penetrating one VS, they face an enormous amount of work to move further into the network.

This new network tech also enables IT to monitor in real time when someone has hacked the system, enabling them to deal with the issue immediately and in real-time.

“Our engineering practices include stringent review of all code to ensure it complies with industry standards to prevent buffer overruns,” adds Willem Ryan, vice president of global marketing and communications for Avigilon. “Our vulnerability handling procedures are designed to ensure exceptional response, compliance with established standards ISO/IEC, and continued focus on protecting customers and customer support.”

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our FREE digital newsletters!

About the Author

Contact:

Al Colombo is a long-time trade journalist and professional in the security and life-safety markets. His work includes more than 40 years in security and life-safety as an installer, salesman, service tech, trade journalist, project manager,and an operations manager. You can contact Colombo through TpromoCom, a consultancy agency based in Canton, Ohio, by emailing [email protected], call 330-956-9003, visit www.Tpromo.Com.

Security Is Our Business, Too

For professionals who recommend, buy and install all types of electronic security equipment, a free subscription to Commercial Integrator + Security Sales & Integration is like having a consultant on call. You’ll find an ideal balance of technology and business coverage, with installation tips and techniques for products and updates on how to add to your bottom line.

A FREE subscription to the top resource for security and integration industry will prove to be invaluable.

Subscribe Today!

Leave a Reply

Your email address will not be published. Required fields are marked *

Get Our Newsletters