Put Your Physical Security Into The Cloud

We’re in the midst of a revolution in the physical security world. The cloud era has the potential to change every aspect of physical security, offering alternative ways of doing things, opportunities to realise greater long-term value from legacy systems, and capabilities that have simply never existed before.

Working together, smart devices and IP networks can realise remarkable benefits in diverse areas, including cost, installation, efficiency, integration, business automation, monitoring, situational awareness and ease of use. Software is always up to date without the need for on-site work and systems can be quickly and easily adapted to user requirements.

One of the perhaps unexpected effects of cloud is that, for many organisations, and particularly those operating or moving towards ‘smart’ environments, security systems are shifting from being ‘grudge purchases’, made only when they absolutely must be, to desirable investments that can secure specific, tangible, measurable business benefits.

The extent of this shift and the speed with which it can take effect, though, are dependent on how effectively security providers address the challenges arising for organisations wishing to take advantage of the new capabilities and benefits offered by cloud. This is particularly the case when a move away from a traditional systems approach is being considered.

Choose the right provider

Many longstanding security providers are simply lack the necessary skills and knowledge to address the complexities inherent in the integration of diverse systems, particularly over IP networks.

Conversely, new entrants to the market from the world of IP networks, while bringing networking expertise, often lack understanding of security systems. Furthermore, they often do not fully understand, or sometimes even perceive, the complex legal and technical issues that can arise.

It is beyond question, though, that in the world of physical security, the cloud is here to stay, just as it is in the consumer world of smart watches, fitness trackers and satnavs. Earlier this year, Gartner predicted that in 2017 we would see 8.4 billion connected ‘things’ – an increase of over 30% on 2016.

It would be foolish indeed to ignore such growth and the immense benefits that the technologies driving it can deliver as they connect previously disparate devices and data sources.

Nevertheless, the security sector has been slow to adopt cloud technology, in part because of natural, but now somewhat out of date concerns over putting security services ‘out there’ rather than keeping them ‘safely’ in-house.

At Reliance High-Tech, where we’ve been innovating in the security arena for more than 40 years, we can see the parallels between this technology shift and previous trends, including the ongoing migration to IP solutions (which was much slower than many expected).

Cloud integration essentials

Appropriate expertise and experience are essential when it comes to cloud integration. Decisions must be made as to which facilities, services and infrastructure to move to the cloud right away, which to move later, and which should stay on-premises for the foreseeable future.

There will be pros and cons for each device and service, which need to be fully understood to make the right decisions. Often a hybrid or staged approach is the right choice – for example, embracing secure hosted services now with a view to full cloud migration as part of a longer-term plan.

When planning the implementation of new and migrated systems, a seamless transition is usually essential. Risks must be fully understood and mitigated, and users and others brought up to speed rapidly, and then supported effectively on the new facilities.

Such issues mean you need a security partner that can provide expert counsel on both technical and commercial matters from the very start of the engagement.

Exploring the idea

Often, the first major challenge with any new technology comes at the exploratory stage, before any actual migration is even planned.

Exploring potential risks and benefits, and convincing key players within the organisation that a move towards cloud should be made, can be challenging indeed without specialist knowledge in a variety of arenas, including IP networking, cloud infrastructure, applications and services, legacy systems integration and, of course, the cloud-based solutions available.

A capable, experienced security systems integrator will work closely with you to fully understand the detail of your existing infrastructure, and your aims and objectives, as well as budgetary, technical and other constraints.

Working from that basis they can then advise on strategic options and help you communicate the benefits to interested parties across your organisation.

IFSECGlobal:

You Might Also Read:

4 Ways to Simplify Your Business Data Management:

Cloud Portability Is Still Science Fiction:

 

« India Cracks Down On Drones
AI Is Streamlining Marketing & Sales »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Landry & Associates

Landry & Associates

Landry & Associates is a multidisciplinary firm specializing in risk management, performance and technology management.

NCC Group

NCC Group

NCC Group is a global cyber and software resilience business operating across multiple sectors, geographies and technologies.

JumpCloud

JumpCloud

JumpCloud's Directory-as-a-Service (DaaS) is the single point of authority to authenticate, authorize, and manage the identities of a business’s employees and the systems and IT resources they need.

Silicom Denmark

Silicom Denmark

Silicom Denmark is a premier developer and supplier of FPGA-based interface cards for cyber-security, telecommss, financial trading and other sectors.

ENEA Qosmos Division

ENEA Qosmos Division

Qosmos, a division of Enea, leads the market for IP traffic classification and network intelligence technology used in physical, SDN and NFV architectures.

Armis

Armis

Armis offers the markets leading asset intelligence platform designed to address the new threat landscape that connected devices create.

DeuZert

DeuZert

DeuZert is an accredited German certification body in accordance with ISO/IEC 27001 (Information Security Management).

Nominet

Nominet

Nominet's cyber division offers network detection and response services to governments and enterprises worldwide.

Inetum

Inetum

Inetum (formerly Gfi Informatique) is an agile IT services providing digital services and solutions, and a global group that helps companies and institutions to get the most out of digital flow.

IMQ Group

IMQ Group

IMQ is one of Europe’s top players in the field of conformity assessment. We offer certification services to support all the major sectors of the manufacturing and service industries.

Outsource Group

Outsource Group

Outsource Group is an award winning Cyber Security and IT Managed Services group working with a range of SME/Enterprise customers across the UK, Ireland and internationally.

Plante Moran

Plante Moran

Plante Moran is a leading audit, tax, consulting, and wealth management firm. Areas of consulting expertise include cybersecurity.

RecoLabs (Reco)

RecoLabs (Reco)

Reco empowers organizations to discover their SaaS applications, identities, and data, control access and prevent the risk of exposure.

Royal United Services Institute (RUSI)

Royal United Services Institute (RUSI)

The Royal United Services Institute is an independent think tank engaged in cutting edge defence and security research. Areas of research include cyber security and resilience.

Kusari

Kusari

Securing your software supply chain starts with understanding. Kusari is on a mission to bring transparency to your software supply chain and power secure development.

FOSSA

FOSSA

FOSSA is a leading SBOM (software bill of materials) and software supply chain risk management platform.