Enterprises across all sectors are leveraging cloud technology to reduce IT costs and streamline management
Determining how the cloud can best support your business depends on five factors: Bandwidth, storage, cost, security and accessibility

Until about a decade ago, most enterprises used their video surveillance systems primarily to view live video or review security incidents after the fact. Today, many are taking advantage of intelligent video solutions to reduce losses from theft and fraud, monitor and improve customer service, track commercial conversion rates and performance trends, and identify opportunities to strengthen their marketing, operations, compliance and sales strategies.

At the same time, enterprises across all sectors are leveraging technology solutions such as the cloud to reduce IT costs, streamline application management, and make their infrastructure more flexible and scalable. So it’s no surprise that these same companies are now turning their attention to emerging cloud applications for video surveillance.

Yet video surveillance solutions have some unique requirements that set them apart from other types of enterprise cloud applications. Video — especially high-definition video — demands much more bandwidth and storage than the consumer-oriented cloud services you may use at home. Security and privacy have to be considered, too, as regulations and corporate policies may all impose restrictions on the transport and storage of video footage. And the anticipated return on investment, of course, is always a consideration when evaluating any technology solution.

Ultimately, determining where and how the cloud can best support your business depends on a set of five primary requirements: bandwidth, storage, cost, security and accessibility. 

And while bandwidth speeds and accessibility will continue to improve, and therefore ease the barrier toward efficient video uploading to the cloud
Businesses should assess advantages & disadvantages of the cloud solution
compared to the existing VMS with respect to bandwidth, storage, cost,
security & accessibility

1. It All Begins With Bandwidth

The total bandwidth required for a video stream varies depending on the number of frames or images being captured per second, as well as the quality of the images being captured. Given that most enterprises are now replacing some (or even all) of their older analog cameras with new megapixel IP cameras, bandwidth becomes an even more important factor to examine. 

Many enterprises today, surprisingly, still do not have the bandwidth capacity to upload video captured by multiple IP cameras to the cloud. Even if they employ buffering, which can limit video streaming until a time when more bandwidth is available (such as after business hours), few organizations can access the required upload speeds consistently at all locations, especially those operating hundreds or thousands of sites.

And while bandwidth speeds and accessibility will continue to improve, and therefore ease the barrier toward efficient video uploading to the cloud, the trend toward multi-megapixel IP cameras may counteract that advantage.

Even the organizations that do enjoy high-speed, high-capacity upload connections across all of their locations may not be in a position to dedicate all (or even a sizeable portion) of their network resources to their video surveillance systems. In fact, it’s quite common for banks, retailers and other enterprises to restrict or ‘throttle’ the network capacity allotted to video to just 100–200 kb/s of their total bandwidth to ensure their corporate network has the capacity needed to transmit business-critical data.

Service provider caps on broadband services represent another constraint to sending and storing video in the cloud. Again, even locations with sufficient upload and download speeds may have limits on how much data they can push through the network. Exceeding the limit can incur additional — and often prohibitively high — costs. 

With video surveillance systems increasingly connected to the Internet, it is critical that they are secured against cyber risk and vulnerabilities
Even locations with sufficient upload and download speeds may have limits on
how much data they can push through the network

2. Making Sense Of Storage

Before moving video surveillance to the cloud, enterprises also need to consider that the majority of collected video is never used — at least by organizations that are not yet leveraging their video’s broader business analysis capabilities — because only specific events will trigger follow-up action. It is therefore important to determine when it makes sense to transmit video data for storage over potentially expensive network links.

Assuming that a company has been able to overcome the bandwidth barrier, the cloud could provide ‘unlimited’ storage, the cost of which will presumably continue to decrease as technology improves. Even so, companies should determine how long they need to archive their video and how much redundancy they require, as both factors may add to the total cost of their cloud storage solution. 

3. Cybersecurity Risks And Vulnerabilities

With video surveillance systems increasingly connected to the Internet, it is critical that they receive the same level of attention to cybersecurity risk and vulnerabilities as traditional IT systems such as servers and workstations. Given the legal, financial and reputational risks associated with data breaches and leaked video, enterprises are intensely concerned about ensuring the integrity and security of their video networks.

Port forwarding, firewalls, network topology and video encryption can all have a significant impact on the security and protection of a cloud-based video surveillance system, requiring a greater degree of expertise and effort in these areas on the part of an organization’s in-house IT support team.

At the same time, some companies have internal policies that strictly prohibit video data from leaving the corporate network or having it stored on a third-party server (even one run by a trusted and reputable provider); others prefer not to take the risk whether or not their formal policies preclude using the public cloud.

Even if video data is stored on a local server rather than in the cloud, security and privacy remain important concerns, with data protection and user authentication being two key considerations.

Enterprises are intensely concerned about the integrity and security of their video networks facing threats such as hacks and data leaks
Port forwarding, firewalls, network topology & video encryption can all
have an impact on the security & protection of a cloud-based video surveillance system

4. Local Network Access Vs. Third-Party Networks

Relying on a third-party network to upload or download video means any outage could cut your organization off from its video assets. Uploads may fail, data may be lost and information may be unavailable until the service comes back online.

Consider how frustrating it would be to sit in a security control room knowing that all your cameras are recording, but not being able to view what they’re capturing because the external network is down. In the very worst case, a network outage could cause data loss. Packets that can’t leave the location might be overwritten or discarded, leaving no video record at all. This would be especially unfortunate if a robbery or violent incident was not recorded as a result. 

When video is stored on premises, there’s always the comfort of having local access and control. Most enterprise-class servers and network video recorders (NVRs), for example, include battery backups to ensure video recording continues in the event of a temporary network outage.

5. Assessing Cloud Service Provider

Cloud-based video surveillance storage and management is an emerging approach with considerable potential. However, until the substantial bandwidth challenge can be overcome, it won’t offer a cost-effective alternative to today’s video surveillance solutions for most mid- and large-sized enterprises with multiple locations and more demanding video requirements.

As with most network technologies, the point of feasibility will be reached over time as new solutions emerge and build on previous technical capabilities. In the longer term, advances in video compression and faster, more affordable bandwidth services will help make cloud-based storage solutions a more viable option for many larger, multi-site enterprises.

When exploring the opportunities associated with the cloud, it is important to move beyond the hype and take the time to carefully consider the implications a cloud-based video solution may have on your business. This should include preparing an appropriate set of questions to ask of any potential cloud service provider so you can accurately assess the advantages and disadvantages of the solution compared to your existing video management system, especially with respect to bandwidth, storage, cost, security and accessibility.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

Author profile

Dan Cremins Global Leader of Product Management, March Networks Corporation

In case you missed it

How Can Remote or Internet-Based Training Benefit Security?
How Can Remote or Internet-Based Training Benefit Security?

Internet-based training has long provided a less-expensive alternative to in-person classroom time. There are even universities that provide most or all of their instruction online. However, the COVID-19 pandemic has expanded acceptance even more and increased usage of internet-based meeting and learning tools. We asked this week’s Expert Panel Roundtable: How can remote or Internet-based training benefit the physical security market?

How is AI Changing the Security Market?
How is AI Changing the Security Market?

Artificial intelligence is more than just the latest buzzword in the security marketplace. In some cases, smarter computer technologies like AI and machine learning (ML) are helping to transform how security operates. AI is also expanding the industry’s use cases, sometimes even beyond the historic province of the security realm. It turns out that AI is also a timely tool in the middle of a global pandemic. We asked this week’s Expert Panel Roundtable: How is artificial intelligence (AI) changing the security market?

Moving to Sophisticated Electric Locking
Moving to Sophisticated Electric Locking

In part one of this feature, we introduced the shotbolt – a solenoid actuator – as the workhorse at the heart of most straightforward electric locking systems. Shotbolts remain at the core of most sophisticated electric locking solutions as well. But they are supplemented by materials and technologies that provide characteristics suited to specialist security applications. Here we look at some more demanding electric locking applications and contemporary solutions. Preventing forced entry Where the end of the shotbolt is accessible, the electric holding force can be overcome by physical force. That’s why anti-jacking technology is now a frequent feature of contemporary electric solenoid lock actuators. Anti-jacking, dead-locking or ‘bloc’ technology (the latter patented by MSL) is inherent to the way the locking assembly is designed to suit the requirements of the end application. The patented bloc anti-jacking system is highly effective and incorporated into many MSL shotbolts deployed in electric locking applications. The bloc technology uses a ring of steel balls in a shaped internal housing to physically jam the actuated bolt in place. A range of marine locks is widely used on Superyachts for rapid lockdown security from the helm Real life applications for MSL anti-jacking and bloc-equipped shotbolts include installation in the back of supermarket trucks to secure the roller shutter. Once locked from the cab, or remotely using radio technology, these shutters cannot be forced open by anyone with ‘undesirable intentions’ armed with a jemmy. A range of marine locks is widely used on Superyachts for rapid lockdown security from the helm. While anti-jacking features are an option on these shotbolts, consideration was given to the construction materials to provide durability in saltwater environments. Marine locks use corrosion-proof stainless steel, which is also highly polished to be aesthetically pleasing to suit the prestigious nature of the vessel while hiding the innovative technology that prevents the lock being forced open by intruders who may board the craft. Rotary and proportional solenoids sound unlikely but are now common A less obvious example of integrated technology to prevent forced override is a floor lock. This lock assembly is mounted beneath the floor with round-top stainless-steel bolts that project upwards when actuated. They are designed to lock all-glass doors and are arguably the only discreet and attractive way to lock glass doors securely. In a prestigious installation at a historic entranceway in Edinburgh University, the floor locks are remotely controlled from an emergency button behind the reception desk. They act on twin sets of glass doors to quickly allow the doors to close and then lock them closed with another set of subfloor locks. No amount of stamping on or hitting the 15mm protruding bolt pin will cause it to yield, thus preventing intruders from entering. Or leaving! Explosion proofing In many environments, electric locking technology must be ATEX certified to mitigate any risk of explosion. For example, remote electric locking is used widely on oil and gas rigs for stringent access control, general security and for emergency shutter release in the event of fire. It’s also used across many industrial sectors where explosion risks exist, including flour milling, In many environments, electric locking technology must be ATEX certified to mitigate any risk of explosionpowder producers, paint manufacture, etc. This adds a new dimension to the actuator design, demanding not only intrinsically safe electrical circuits and solenoid coils, but the careful selection of metals and materials to eliminate the chance of sparks arising from moving parts. Resilience under pressure The technology boundaries of solenoids are always being pushed. Rotary and proportional solenoids sound unlikely but are now common. More recently, while not directly related to security in the traditional sense, proportional solenoid valves for accurately controlling the flow of hydrogen and gases now exist. Magnet Schultz has an extensive and somewhat innovative new range of hydrogen valves proving popular in the energy and automotive sectors (Fig. 2-6). There’s a different kind of security risk at play here when dealing with hydrogen under pressures of up to 1050 bar. Bio security Less an issue for the complexity of locking technology but more an imperative for the effectiveness of an electric lock is the frequent use of shotbolts in the bio research sector. Remote electric locking is commonplace in many bioreactor applications. Cultures being grown inside bioreactors can be undesirable agents, making 100% dependable locking of bioreactor lids essential to prevent untimely access or the unwanted escape of organisms. Again, that has proven to be topical in the current climate of recurring coronavirus outbreaks around the world. More than meets the eye In part one, I started by headlining that there’s more to electric lock actuation in all manner of security applications than meets the eye and pointed out that while electric locking is among the most ubiquitous examples of everyday security, the complexity often involved and the advanced technologies deployed typically go unnoticed.Integrating the simplest linear actuator into a complex system is rarely simple For end users, that’s a very good thing. But for electro-mechanical engineers designing a system, it can present a challenge. Our goal at Magnet Schultz is to provide a clearer insight into today’s electric locking industry sector and the wide range of locking solutions available – from the straightforward to the specialized and sophisticated. Integrating the simplest linear actuator into a complex system is rarely simple. There’s no substitute for expertise and experience, and that’s what MSL offers as an outsource service to designers. One benefit afforded to those of us in the actuator industry with a very narrow but intense focus is not just understanding the advantages and limitations of solenoid technology, but the visibility of, and participation in, emerging developments in the science of electric locking. Knowing what’s achievable is invaluable in every project development phase.