Security as a Service: What It Can Do for Your Business

Managing installed access control and video surveillance systems on a subscription basis is a highly promising path to generating more RMR.

SaaS Offers Ease of Installation

Installation of a cloud-based SaaS system begins at the protected site where card readers, electromagnetic and electromechanical locks, egress motions, manual release devices, cameras, displays and other hardware must first be installed. Every bit of this is performed in the same manner as a traditional onsite head-end system for access and video, although in some cases having onsite DVRs, HDVRs and NVRs, in addition to SaaS, has its advantages. In this case, high-resolution images can be stored at the premises while streaming lower-res images to the cloud.

In most corporations there’s already a LAN (local area network) in place where there’s a data switch. Category-5e or -6 UTP (unshielded twisted pair) cable is extended from the Ethernet port on the access controllers as well as the DVR to the LAN’s switch. And if you’re not clear on the network issues, in most cases there’s an IT technician onsite to assist you with this connection (be sure to add the appropriate language to your contracts). Once connection and communication is established with the Internet, the headend equipment on the cloud automatically connects to the onsite equipment.

Software/hardware setup is achieved either from an onsite computer or a smartphone using a special app provided by the manufacturer of the integrated cloud-based SaaS solution. By inputting the MAC address of each access controller and DVR, the head-end is able to enroll them. The MAC address of each one is then matched to internal IP addresses and recorded. In the case of a hybrid DVR, both analog and digital IP cameras are enrolled. This is the same as it has always been, inputting the MAC address of each camera and allowing the DVR to assign IP numbers accordingly.

The fact is, it’s actually easier to install the cloud-based SaaS solution than a traditional head-end simply because it’s someone else that takes care of the installation of that network equipment as well as its initial programming.

Cloud Transparency and Security

Having the head-end off premises makes the technology seem a little more transparent to the client. “One of the things that we do that is unique is that we have a file system called StorNext that was developed 19 years ago,” says Wayne Arvidson, vice president of surveillance and security solutions with Quantum. “What it does is allows you to create a single access point, which is important because it means the VMS application uses it as a single drive.”

According to Arvidson, even though there may be multiple types of technology underneath the hood storing data in a variety of ways, the end user is never bothered with the what, where and how. “We have the ability to have multiple tiers of storage appear as a single drive letter, so we can build out the total capacity much more cost effectively,” he says.

And concerning security on the cloud, the data housed on the cloud as well as the real-time control of the onsite, connected access and video equipment, are actually better secure there than in legacy systems where the head-end equipment is housed on premises.

“Our encryption level in our SaaS equipment that connects to the cloud uses a high level of data encryption, although the cloud itself has multiple layers that meet all of the top standards that are out there today for data security,” says John Smith, senior channel marketing manager with Honeywell.

“We use all kinds of encryption algorithms that we run to secure our SaaS platform. We can also do things like providing write-once technology so once it’s recorded you can show that it’s not been altered,” says Quantum’s Arvidson. “We also have a technology called object-based storage that creates these unique identifiers for every block of data that is written, and again it can be locked down and made unalterable. So there are all kinds of components like that involved in the data path that people can use.”

Generally SaaS cloud platforms use 256-bit encryption or higher. Honeywell’s Smith says that the end user actually can decide how much data protection he needs and pay for that level of encryption. This is in addition to the data protection built into many of today’s IP cameras.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our FREE digital newsletters!

About the Author

Contact:

Al Colombo is a long-time trade journalist and professional in the security and life-safety markets. His work includes more than 40 years in security and life-safety as an installer, salesman, service tech, trade journalist, project manager,and an operations manager. You can contact Colombo through TpromoCom, a consultancy agency based in Canton, Ohio, by emailing [email protected], call 330-956-9003, visit www.Tpromo.Com.

Security Is Our Business, Too

For professionals who recommend, buy and install all types of electronic security equipment, a free subscription to Commercial Integrator + Security Sales & Integration is like having a consultant on call. You’ll find an ideal balance of technology and business coverage, with installation tips and techniques for products and updates on how to add to your bottom line.

A FREE subscription to the top resource for security and integration industry will prove to be invaluable.

Subscribe Today!

Get Our Newsletters