SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One System, One Card
    One System, One Card
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One System, One Card
    One System, One Card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • High-Security Wedge Barriers By Delta Scientific
    • SCD Wins Major Contract For HD MWIR Detectors
    • ASSA ABLOY And Honeywell Discuss Security Innovation
    • VIVOTEK's Role In Ecological Restoration & Safety
    One System, One Card
    One System, One Card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    One System, One Card
    One System, One Card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One System, One Card
    One System, One Card
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One System, One Card
    One System, One Card
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Wire-Free Locks
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

True Cloud Video Surveillance: Do We Need Cloud Police?

True Cloud Video Surveillance: Do We Need Cloud Police?
Ken Francis
Ken Francis
Contact company
Contact Eagle Eye Networks, Inc.
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • True cloud video solutions offer scalability, remote management, and enhanced cybersecurity.
  • Cloud misuse occurs when systems lack core cloud computing characteristics, harming potential benefits.
  • SOC 2, ISO 27001 audits validate vendor cybersecurity; crucial to confirm independent credentials.
Related Links
  • Why People Will Power Business Security In 2022
  • Choosing New Security Products Versus The Tried-And-True
  • Deep Learning Solves Nuisance Alarms And Tailgating In Access Control

Currently and unfortunately, there is no such thing as Cloud Police. If there were, two-thirds or more of the companies using ‘cloud’ in their advertising and documentation would be in Cloud Jail for seriously misusing the word in their marketing.

The term ‘Cloud’ is over-used and misused—sometimes intentionally and knowingly, but also often in ignorance. It’s just a word—but in the context of cloud computing technology, it does have a specific meaning in the United States. We may lack cloud police, but we do have a resource that defines cloud.

Video surveillance system

The National Institute of Standards and Technology (NIST) spells out the requirements in The NIST Definition of Cloud Computing. Regardless of where in the world your video system is located, there are certain, fundamental attributes of a ‘Cloud Video Surveillance System.’

A true cloud system would have significant advantages over a traditional on-premises server-based system

A modern security video surveillance system is composed of securely connected video cameras (IP cameras and/or analog cameras with encoders), video recorders, video display monitors, and video management software for managing equipment configuration and system performance configurations and for providing system operations functionality. Based on the NIST definition of cloud computing and its essential characteristics, a true cloud system would have significant advantages over a traditional on-premises server-based system.

Cloud video management system

Here's what a cloud video management system should provide:

  • Infinite Scalability and an ‘Only Pay for What You Use.’ Cloud video surveillance systems are a subscription-based business model. Integrators derive recurring monthly revenue from the subscription, and the end-user only pays for what they use. True cloud systems do not charge you for unused disk space.
  • Cloud Video System can be Operated and Managed from Anywhere. System management capabilities are off-site from camera locations for all system functionality. It should not be necessary to be on-site to view or export video or change system or device
  • Redundant System Functionality. The software system functionality is redundant, so in the event of a computing or networking failure, alternate computing and/or networking resources immediately take over without human interaction.
  • Recorder Isolation. Camera locations should transmit video off-site to a secure, SaaS service provider location.
  • Redundant Video Storage. Video should be stored redundantly for business continuity and disaster recovery purposes, and automatically swap-in redundant storage if primary storage fails.
  • Cybersecure Systems and Devices. On-site hardware, data transmission, and cloud systems must be cybersecure. Individual cameras must be protected from other cameras or devices on the network that could be malware-infected.
  • Intelligent Video Data Transmission and Video Data The installer and users should be able to configure and adjust video traffic bandwidth usage--such as the percentage of available bandwidth. On-premises appliances should intelligently buffer video being sent to the cloud to accommodate fluctuations in internet bandwidth availability.
  • Retention Assurance for Every Camera. Recorded video retention periods must be individually configurable on a per-camera basis.
  • Instant Changes. Changes to video retention and/or user privileges must be instantly accomplished with the flip of a switch.
  • Internet-Based Integrations. Integrations with system functionality must be available through a single secure and well-engineered applications programming interface (API) available via a secure internet connection to the cloud-based system software.
  • Service Provider Account Management. Centralized monitoring and management of reseller accounts dashboard.
  • System Performance Metrics. Maintain and chart a seven-day performance window of Camera LAN and internet packet loss, Camera LAN and Cloud Bandwidth Usage, per-camera video storage in hourly increments.
  • Automatic Cloud System Upgrades. Feature and system security upgrades to cloud system software and cloud user applications, including periodic software and firmware updates on-premises appliances, should be automatically provided as they are released.
  • On-Demand Periodic Full Hardware Replacement. To keep subscribed on-premises system physical hardware technologically current, provide on-demand complete hardware replacement at no charge every six years.

Cloud computing characteristics

Cloud mis-marketing commonly occurs when vendors use public cloud data center capabilities—such as AWS, Google or Azure--to provide parts of their customer solution, without actually providing the customer with the full benefits of cloud computing. In these cases, vendors are wrongfully labeling the products or services ‘cloud’ offerings.

Common mis-labeling includes:

  • On-Premises System Backups to Cloud Data Center Locations. Whether it is a private or public cloud data center storing a system backup in a cloud location, if a manual action is required to restore the backup system, this is not a cloud system.
  • Client-Server Based Applications Running in a Virtual Server. When a client-server application is installed in a virtual server in a public cloud—the same way it is done within an on-premises virtual server data center—this is not a cloud application and does not provide the end-user with the benefits of cloud computing.
  • Browser-Based Client-Server Applications. Software running in a ‘cloud’ data center can provide a browser-based interface without conforming to the essential cloud computing characteristics. The browser is not the determining factor in a cloud system.
  • Server Database Partitioning. The partitioning of a single client-server application database into separate customer partitions is not a cloud ‘multi-tenant’ model, because a shared database does not provide ‘different physical and virtual resources dynamically assigned and reassigned according to consumer demand,’ this is not a cloud-system architecture.
  • Client-Server Camera Licences ‘Priced’ as a Subscription. Software companies that re-price their client-server software licenses into monthly billings and call them cloud subscriptions are not providing a cloud subscriber application
  • Remotely Executed Upgrades. Remotely executed periodic upgrades of on-premises system software, performed as part of a service or support fee, are not a cloud computing service—regardless of whether the software upgrade image is stored in a cloud location.
  • Assumed Cybersecurity. Service providers will on occasion mistake the cybersecurity credentials and certifications of their public cloud partner with the cybersecurity of the software service provider’s own application. See sidebar ‘Assessing A Vendor’s Cybersecurity Credentials.’

Cloud-Based applications

Based on the nature of its software functionality, true cloud provides maximum value for the subscriber

So how do we sum up true cloud? Based on the nature of its software functionality, true cloud provides maximum value for the subscriber because it’s engineered to take advantage of the characteristics of cloud computing to be cost-effective, flexible, and high performing for all use cases.

Any vendor providing cloud-based applications should be able to explain in detail how they have applied the cloud computing characteristics--on-demand self-service, broad network access, resource pooling, rapid elasticity or expansion, and measured service--for the benefit of the subscriber.

Provide independent validation

Assessing a Vendor’s Cybersecurity Credentials - When end-users and resellers assess the cybersecurity credentials of vendors, it’s essential to check the documentation, read the fine print, and ask the right questions. Fortunately, there are some easy best practices to follow.

SOC 2 Type 2 and ISO 27001 are rigorous assessments that take six months or more to complete

It’s good news if your vendor has completed audits such as SOC 2 Type 2 and ISO 27001. Considered the gold standard of security audits, SOC 2 Type 2 and ISO 27001 are rigorous assessments that take six months or more to complete, and they provide independent validation that vendor’s policies and procedures meet and exceed cybersecurity standards.

Internal vendor network

Always take a close look at audits and credentials to determine if your vendor holds the cybersecurity credential themselves, or if the credential is held by one of their vendors. For example, some vendors who host software in the cloud—whether cloud applications or virtualized client-server applications—make the mistake of pointing to a SOC 2 Type 2 or ISO 27001 certification held by AWS or Azure or another public cloud whose services the vendor uses to run their software.

However, such reports and certifications apply only to the cloud infrastructure on which the vendor’s software is running. The reports do not apply to the vendor’s software and the vendor’s own cybersecurity and data privacy practices, the vendor’s development environment, its technical support personnel or any internal vendor network that connects to its cloud system.

Popular cloud computing

The vendor itself must establish SOC 2 and ISO 27001 compliance for itself and provide that documentation

The vendor itself must establish SOC 2 and ISO 27001 compliance for itself and provide that documentation. Other publicly available resources can be extremely helpful in assessing vendors’ cybersecurity credentials.

A great example is the Security, Trust, Assurance, and Risk (STAR) Registry provided by the Cloud Security Alliance (CSA), that documents the security and privacy controls of popular cloud computing offerings. Vendors can submit a free questionnaire to show their security and compliance postures, including the regulations, standards, and frameworks they adhere to.

Any cloud application service provider stating they have engineered sound cybersecurity for their cloud offering should back up that assertion by participating in the STAR registry program.—Ken Francis.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Application security
  • Prison security
  • Security devices
  • Security cameras
  • PTZ cameras
  • Covert cameras
  • Security camera systems
  • Security monitoring system
  • Security access systems
  • Institute security
  • Network cameras
  • Security software
  • Security service
  • Physical Security Information Management (PSIM)
  • Covert Surveillance
  • Prison surveillance
  • Integration software
  • Cyber security
  • Video Management System
  • IR cameras
  • Network Video Recorders
  • Body worn video cameras
  • Video surveillance
  • Related links
  • Eagle Eye Networks Video Surveillance software
  • Access Control Software Access control software
  • ANPR Software Video Surveillance software
  • Infrared Surveillance cameras
  • LED Security Monitors
  • Detection Software Video Surveillance software
  • TFT LCD Security Monitors
  • PCB Surveillance cameras
  • Contact Access control software
  • Broadcast Messenger Access control software
  • Mifare Access control software
  • Drawing Software Video Surveillance software
  • Thermal Surveillance cameras
  • IP Surveillance Software Video Surveillance software
  • Wireless Surveillance cameras
  • Carpool Anti-passback Access control software
  • Proximity Access control software
  • Central Monitoring Option Access control software
  • Smart Card Access control software
  • Centrally managed access solution Access control software
  • Monitoring Software Video Surveillance software
  • Surveillance Software Video Surveillance software
  • Door Monitoring Option Access control software
  • Face Recognition Software Access control software
  • Guard tool module Access control software
  • Issuance and identification system Access control software
  • Management Systems Upgrade Access control software
  • Redundant System Software Access control software
  • Reporting Option Access control software
  • Server software for MSDE Access control software
  • Visitor Management tool Access control software
  • Articles by Ken Francis
  • Related categories
  • Video Surveillance software
  • Access control software
  • Surveillance cameras
  • Digital video recorders (DVRs)
  • Security Monitors
Related white papers
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Combining Security And Networking Technologies For A Unified Solution

Combining Security And Networking Technologies For A Unified Solution

Download
System Design Considerations To Optimize Physical Access Control

System Design Considerations To Optimize Physical Access Control

Download
Related articles
How Physical Security Consultants Ensure Cybersecurity For End Users

How Physical Security Consultants Ensure Cybersecurity For End Users

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Expert commentary
About this page

Explore the benefits of true cloud video surveillance, enhancing police workflow, security, and evidence management through secure remote accessibility.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One System, One Card
One System, One Card
Understanding AI-Powered Video Analytics
Understanding AI-Powered Video Analytics
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec