You are on page 1of 2

February 2012 SECURITY SecurityMagazine.

com 10
A
s Cloud Computing becomes the ne w platform
for many aspects of our liv es, from Google Mail
to iTunes to banking and mor e, the discussion
specific to security tends to focus on the What. It
may be helpful to look at the Why.
Security Cloud Computing
(SCC) is changing the v ery fabric
of how security is sold, deliv ered,
used and as a result, valued. While
SCC is nothing ne w to the secu-
rity monitoring business model,
SCC may benefit y our security
program. You will hear concerns
that the cloud is not secur e. But
that is not our cloud. Securing the
cloud is important, and very smart
people are working to ensure that
happens. Our opportunity is to
use the cloud to secure our organi-
zations, not to secure the cloud.
As a definition, any security
related application (video, iden-
tity, access, fir e, intrusion, life safety) that is traditionally pur-
chased, installed and managed can become a cloud-based service
with recurring payments as the model versus capital expenses.
What is driving Security Cloud Computing, and is it time for
an upgrade to your plan?
WHAT is Changing?
Three technology trends are combining to enable successful
cloud computing models and the lay ering of applications on
the cloud. In our case, security is the application on the cloud
platform.
1. The digitalization of all things, including security technologies
2. The delivery of software as a ser vice replacing software pur-
chase and upgrades
3. Mobilization forcing the distribution of information to mor e
than 2 billion and growing smart phone devices.
Digitalization has occurred, as the move from analog to IP is
in full force with more than 65 percent of all DVRs sold includ-
ing Ethernet connections. IMS R esearch identifies that mor e
than 50 percent of all 32 or mor e camera installations ar e now
IP (with analog dominating the under 16 camera installations).
Software as a Service (SaaS) is logical, efficient and now tech-
nically practical. The days of buying and installing software that
ages quickly and r equires upgrades/replacement by users are in
the rear view mirror. SaaS changes the way we live our lives and
access information from music on iTunes, to customer informa-
tion on Salesforce.com to books from Amazon to entertainment
via on demand video at home. Those failing to meet this call
will go the way of B lockbuster and Borders. Having the latest
version of software each time you log in and having subject mat-
ter experts upgrade and maintain that softwar e is a good thing.
The move to virtualization is in full force.
Mobilization, especially the 2-4 billion smar t phone devices
where people want to get their information, video and the latest
issue of Security magazine is changing wher e we work and how
we live. This information has to be collected in and distributed
from a cloud platform with the latest software in place.
Combined, this tsunami of change is impacting ev ery busi-
ness, including security.
There are some very powerful technologies available today.
And those that are not using them ar e running out of excuses,
notes Bud Broomhead, CEO of Intransa.
WHY it is Changing
Enterprise goals have moved from event response to risk man-
agement. The goal is to achieve situational awareness and event
prevention as well as provide an effective response to unforeseen
events. Organizations like y ours are demanding access to all
business information when, wher e and how you want it, and
that includes security-related information.
At the same time, organizations ar e more focused on putting
resources into strategic initiatives and outsourcing non-strategic
activities. For example, an inv estment company will outsour ce
payroll to ADP but not the dev elopment of algorithms that
create a competitive advantage on their trading floor . SaaS for
security fits perfectly into that goal.
SCC delivers powerful information to achieve a broader array
of business goals. Customer metrics, including people counting
at stores or cr owd control in public v enues, are enabling both
business and security decisions during fluid situations that ben-
efit all your stakeholders.
Even more, SCC is being adopted due to internal corporate
responsibilities, legislation, insurance and risk management.
For example, drug treatment facilities are required to host video
content offsite. The value in the physical security application
must transcend security and cr eate broader business value to be
justified. For your consideration, these ar e the WHYs of SCC.
Look to the Clouds
and Ask, Why?
Trends
By Mark McCourt
010-Trends - Col.indd 10 1/19/12 2:54 PM
Copyright of Security: Solutions for Enterprise Security Leaders is the property of BNP Media and its content
may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express
written permission. However, users may print, download, or email articles for individual use.

You might also like