SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 Sets Sales Record In Security Market
    • A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design
    • IDIS Launches New AI PTZ Cameras With NIR Performance
    • Leuze AI Boosts Optical Distance Sensor Accuracy
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Self-Service Access Control
  • AI special report
  • Cybersecurity special report
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

What Is Driving The Growth Of Cloud Systems In Physical Security?

7 Sep 2018

What Is Driving The Growth Of Cloud Systems In Physical Security?
6 Sep 2018
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Cloud solutions dominate physical security, especially in video and access control markets.
  • Shared IT resources drive security industry toward cloud adoption for efficiency and scalability.
  • Both large and small security companies increasingly embrace cloud-based systems.

Editor Introduction

The physical security industry is embracing the cloud in a big way. Cloud-based systems – which involve accessing a shared pool of information technology resources via the Internet – are much higher-profile in the video and access control markets, and large and small companies are getting on the cloud bandwagon. We asked this week's Expert Panel Roundtable: What factors are contributing to growth in cloud systems in the security market?


Card image cap
Ron Virden ACRE, LLC

More and more businesses are realizing that leveraging the cloud is the most efficient way to solve emerging challenges. Cloud-based applications offer significant financial savings by enabling more cost-effective scaling, as well as a reduction in hardware maintenance and management costs, more resilience, ease of mobile support, flexibility, and greater user experience. All of these elements are making the cloud an attractive option for customers. As a result, these solutions are contributing to the push from a more reactive approach to the protection of assets to a more proactive security plan for end users.

Card image cap
Hilding Arrehed HID

A big growth driver for the cloud is demand from enterprises that no longer look at access control simply for securing doors, data and other assets. They want to create trusted environments within which they can deliver valuable new experiences to users. Cloud technologies make this possible by enabling people to use mobile devices for new applications and capabilities, while creating smarter, more data-driven workplaces. For example, cloud-based platforms will provide the backbone for quickly adding complementary applications like biometrics, secure print, virtual photo IDs, and vending as well as other access control use cases and emerging permission-based capabilities yet to be developed. Cloud-based platforms facilitate new managed service models for mobile IDs and secure issuance and will fuel simplified development environments and easy integration into vertical solutions. They have the potential to give organizations greater flexibility to upgrade and scale security infrastructure, improve maintenance and efficiency, and accelerate ROI.

Card image cap
John Davies TDSi

There are two key factors when it comes to the growth of cloud systems in the security market – end users and installers. This symbiotic relationship creates a “push me, pull you” effect on demand and supply. On the one side, end users have become accustomed to purchasing and booking services online from the dominance of the online economy and broader retail industry. Cloud-based service delivery is already proven to work well. The wider online economy has also influenced security providers, who know they must cater for online business to compete. Using a cloud-based approach allows them to provide products and services while reducing overheads and delivery costs. Both sides have come to trust the cloud-based approach to providing security systems. It is a win-win. End users can rely on a service that is always up to date, while security installers are making considerable savings on their costs and infrastructure needs.

Card image cap
Ross Wilks Vanderbilt Industries

The simplicity of the set-up! Setting up cloud solutions on site can be as simple as the purchase transaction itself. All you need to get started is a username and password. Contrast this with the lengthy, complex, and sometimes extensive setup and configuration period for some on-premise applications. And when it comes down to software updates, instead of pushing updates to the client and requiring the channel to update the system, the end customer remains on the latest version and no longer has a risk of getting bugs or an update being done incorrectly. With flexible pricing models, cloud platforms also eliminate the cost of acquiring, provisioning, and maintaining the hardware needed to host business-critical software. From the installer’s perspective, this means they have the chance to create recurring revenue opportunities.

Card image cap
Kevin Berry The Ava Group

Cloud adoption continues to accelerate across multiple industries including the security market. The rapid deployment of cloud-based solutions ensures that organizations can be up and running quickly, while providing standardized and relatively secure global access. Often little or no infrastructure investment is required, thereby reducing the need to procure, manage and maintain expensive data center computer resources. Software maintenance, support and remediation are handled by the cloud provider rather than internal support teams and often with a higher system uptime rate than in-house infrastructure can offer. This can free up technology and security teams to focus on delivering superior security services rather than spending time and resources managing technology infrastructure. Finally, organizations may see financial benefit from moving traditional capital-based investment in security technology infrastructure into a predominately OPEX model, allowing for accurate budgeting over time and without the need for major capital investment every 3-5 years for technology refresh.

Card image cap
Bud Broomhead Viakoo

Physical security systems generate valuable operational data, and lots of it. If the physical security system operator must be compliant to an audit standard (PCI, NERC, NIST, etc.), that data is their “entry-fee” for being in business. If the physical security system is there to fulfill a mission (e.g. capture video evidence), then knowing how often it accomplishes that is a measure of system ROI (a $1M system working 70% of the time is the same as a $1.43M system working 100% of the time). And there is the value that comes from benchmarking, to guide operational improvements based on key performance indicators tracked over time. Lifecycle management and forecasting replacements can be based on such data. Cyber-security vulnerabilities in physical security systems have brought renewed focus on specific system data; abnormal bandwidth utilization, default passwords being in use, and whether the firmware on the system is current and compliant.

Card image cap
Oktay Yildiz Genetec, Inc.

One of the key contributing factors in the growth of the cloud in our industry is security: cloud service providers offer the highest levels of physical security for their data centers. Replicating similar security and redundancy practices would be cost-prohibitive for most businesses. Using the cloud to deploy any workload allows you to only pay for your actual usage. You benefit from the elasticity and scalability of the cloud while reducing CAPEX. It is also a step in implementing an appropriate backup plan by having your data stored offsite and in multiple copies. It could also help in your recovery plans in case of a disaster. Also, since the cloud and its solutions are fully maintained by the service providers, it means that you always have the most up to date version of the service without having to go through manual updates.

Card image cap
Hank Monaco Johnson Controls, Inc.

The security market is seeing a growth in cloud systems due to the safety and operational benefits the cloud provides, specifically when integrated with other building systems. Implementing cloud-based solutions into a security strategy can not only help safeguard facilities but also limit associated on site management costs. For example, 24/7 video surveillance monitoring and data analysis can be connected to the cloud, enabling one remote location to be responsible for managing surveillance footage from multiple cameras across multiple geographies, while gathering important information around site activity. This efficient and holistic cloud-based solution provides facility owners and managers access to their business insights anytime from anywhere and can ensure the safety of a building and its occupants.

Card image cap
Wayne Jared 3xLOGIC, Inc.

The security industry tends to follow (albeit slowly) the general IT industry, so the maturation and adoption of cloud systems in general has made cloud security solutions more acceptable. Users now start with the expectation that their security system will be accessible from anywhere, and cloud systems fit this requirement by default. With a browser-based user interface and proper IoT devices such as IP cameras and IP door controllers at the edge, a cloud solution dramatically simplifies the installation, thus eliminating required hardware and substantially reducing installation costs.

Card image cap
Eric Widlitz Vanderbilt Industries

Cloud-based systems are gaining traction in the small- to medium-sized businesses market as a way to implement a robust security solution at a lower price point and with less maintenance overall. It saves the SMB market with the reduction of expenses like installing, maintaining and upgrading on-premises IT infrastructure, versus the operational cost of a Security-as-a-Service (SaaS) cloud-based subscription. For integrators, cloud is still gaining traction as a source for recurring monthly revenue (RMR), but we've seen the struggle of trying to shift the entire industry toward a service-based model rather than a per-project basis. There's still room for improvement and a lot of work that needs to be done before cloud-based/SaaS gains even more momentum with customers across industries.


Editor Summary

Systems that are simpler to install and can be deployed rapidly. Lower cost and more efficient operation. Expanding capabilities. These are just a few of the benefits of cloud-based systems pointed out by our Expert Roundtable Panelists. Cloud-based systems are even changing the way security systems are configured and sold: They are a major factor in the industry transition to a recurring monthly revenue (RMR) model. Best of all, the cloud is helping to expand the capabilities of systems and providing additional useable data that yields greater value to end user customers. It’s no wonder you hear so much about the cloud in the physical security market.

  • Related links
  • ACT Access control software
  • Genetec Access control software
  • Genetec Video Surveillance software
  • HID Access control software
  • TDSi Access control software
  • TDSi Video Surveillance software
  • ACT Access control readers
  • Genetec IP cameras
  • HID Access control readers
  • Johnson Controls Limited Access control readers
  • TDSi Access control readers
  • TDSi IP cameras
  • Biometric Access control software
  • Biometric Access control readers
  • Network IP cameras
  • IP Surveillance Software Video Surveillance software
  • Monitoring Software Video Surveillance software
  • Related categories
  • Access control software
  • Video Surveillance software
  • Access control readers
  • IP cameras
Related white papers
Milestone Cloud Deployment Guide

Milestone Cloud Deployment Guide

Download
Maximizing Enterprise Security Systems In The Cloud

Maximizing Enterprise Security Systems In The Cloud

Download
Using Artificial Intelligence (AI) To Automate Physical Security Systems

Using Artificial Intelligence (AI) To Automate Physical Security Systems

Download
Related articles
Abnormal AI Leads 2025 Gartner Magic Quadrant For Security

Abnormal AI Leads 2025 Gartner Magic Quadrant For Security

DigiCert's 2026 Security Predictions: AI & Quantum

DigiCert's 2026 Security Predictions: AI & Quantum

Zimperium's ClayRat Spyware: New Android Threats

Zimperium's ClayRat Spyware: New Android Threats

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Round table discussions
About this page

Explore accelerating growth in cloud systems, driven by IoT, cybersecurity, cost effectiveness, and AI-enhanced remote management.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Enhancing Physical Access Control Using A Self-Service Model
Enhancing Physical Access Control Using A Self-Service Model
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec