Cloud Based Security Feature
sponsored by

Why VSaaS and ACaaS should be an essential part of any digital strategy.

Morphean CEO, Rodrigue Zbinden, looks at the uptake of cloud services during the recent pandemic and explains why now is the time to explore physical security in the cloud.

The COVID-19 pandemic has resulted in an unprecedented demand for cloud-enabled technologies across Europe. Such services have enabled people to stay connected and many businesses to continue to operate successfully. With enterprise-focused video conferencing mobile app downloads showing a weekly 90% increase in comparison to pre-COVID-19 figures, it’s clear that cloud services have proven invaluable in these challenging times.

Now, as the benefits of cloud technology become apparent, business decision makers will be considering the learnings from the past few months and looking to apply them to boost productivity, streamline costs and become more agile in the long term. Digital transformation presents some enticing advantages for those companies that have been slow to adapt. The physical security industry will have witnessed how cloud infrastructure is not only cost effective and safe, but is also a force multiplier for connecting platforms, services and people with potent business benefits.

The future of cloud-based security
In today’s modern, connected world, dated security technologies, such as standalone CCTV systems and manually operated access control points, are giving way to their cloud-enabled successors. Video surveillance as-a-service (VSaaS) and access control as-a-service (ACaaS) enable cameras and readers to be added to a network as IoT devices, bringing security systems up to date and representing a vital component in any modern, cyber-secure digital strategy. But better security is just one benefit of a much greater system that can bring real value...

Cloud-based Access Control vs. On-premise: Why Are We Still Debating?

The term ‘cloud-based’ has become outdated in most industries except for security. That is because it is assumed the technology is cloud-based, who would build technology that isn’t at this point?

You would never say, “I’m going to watch cloud-based Netflix tonight” or “keep your customer’s information up to date in the cloud-based CRM.” Yet, as security professionals we are still using two different types of access control to secure our facilities: on-premise and cloud-based. It seems we are stuck with the cloud-based label until we no longer need the distinction. That is to say, we will need to identify cloud-based access control until the security industry moves away completely from on-premise solutions.

The questions this observation raises are:
1. Why are we still relying on outdated on-premise technologies to protect our people and facilities?
2. What are we missing by continuing to ignore new access control technologies?

Why are we still relying on outdated on-premise technologies to protect our people and facilities?
One of the reasons security professionals drag their feet on moving from on-premise access control to cloud-based access control is the perception that on-premise solutions are more secure and less prone to hacking. The irony is that the opposite is true.

Like all other solutions built in the cloud, software updates can be pushed automatically. Think about your iphone, for example, you are always on the latest version of the software because apple pushes the updates for you. For cloud-based access control systems, those updates include bug fixes as well as fixes to any vulnerabilities found during recent and redundant penetration tests. Cloud-based access control systems are always running on the most up-to-date software, maintained by the software experts that developed it, and who are also constantly monitoring and testing that software against cyber attacks.

On-premise systems, on the other hand, often require IT departments to get involved to make cumbersome updates to clunky outdated systems. The longer these updates go ignored the more susceptible to hackers the system becomes.

What are we missing by continuing to ignore new access control technologies?

Eagle Eye Networks Raises $40 million to Transform Video Surveillance by Combining Cloud & AI

Venture capital firm responsible for tech successes such as Facebook, Dropbox, Crowdstrike, Docusign, Slack, and Spotify partners with Eagle Eye Networks to reinvent video surveillance

YEagle Eye Networks, the global leader in cloud video surveillance, has raised $40 million of Series E funding from venture capital firm Accel to continue its growth and expand its technology leadership. Eagle Eye is leveraging artificial intelligence (AI) on its true cloud platform to dramatically reshape video surveillance and improve safety, security, operations, and customer service for businesses around the world.

Today’s video surveillance systems have multiple security features, such as motion detection and standard analytics. However, these systems require either monotonous monitoring or a meticulous manual review after each triggered event to extract useful information. Similarly, business operations analytics are still in early development.

“There is a tremendous opportunity to leverage AI and alter the very nature of video surveillance,” said Dean Drako, Founder and CEO of Eagle Eye Networks. “Eagle Eye Networks now has the means and the technology to enable cloud video surveillance to transform how companies manage security and business operations, in the same way self-driving/electric cars are transforming transportation...

KINGS Secure Technologies Announces G-CLOUD Framework Award

Kings Secure Technologies is pleased to announce it has been awarded a place on the G-Cloud Framework. G-Cloud 12 is part of the UK Government’s Digital Marketplace where public-sector organisations can access suppliers and procure products and services without the need for a lengthy tender process. The criteria for being accepted onto the G-Cloud Framework ensures that only those companies who provide the highest levels of security and support to public sector organisations are selected due to the sensitive information they hold. Buying services through the G-Cloud Framework is faster and cheaper than entering individual procurement contracts.

One of the technologies Kings is offering to supply through the G-Cloud 12 Framework, is a strategic partnership agreement with premier mobile and cloud-based access control provider, Openpath. Openpath’s mobile-first, cloud-based hands-free access control solution is ideal for companies as they face new workplace demands considering COVID19 and in preparation for “return to work”.

Through the G-Cloud 12 Framework, Kings is also offering DYMENSiON and Lone Worker services. DYMENSiON, a secure browser-based intelligent solution, provides access to a multitude of data of your account through providing an accurate, real-time picture at site level—enabling risk profiling, resource planning and empowering clients with a vast insight into areas of the estate performance.

Our award-winning Lone Worker Protection Service through Safe Hub, uses cutting-edge voice and data communication to protect employees, managers and shareholders from the risks associated with lone and remote working, helping companies today keep its people safe. Through a secure web-based portal, Lone Worker provides an accurate cross-device snapshot of system activity with real-time reporting...

Henry Lott
Publisher Partner
[email protected]
Tel: 01548 521862 / 07828 035059
Karen Lott
Editorial Partner
[email protected]
Tel: 01548 521862 / 07828 035059

PROSecurenewsonline.co.uk published by
GMS Business Communications
Sandalwood Cottage, Fallapit Barns, East Allington, Totnes, TQ9 7QS

Tel +44 (0)1548 521862

Disclaimer & Copyright All rights Reserved
No part may be reproduced without the prior written permission of the Publisher.
Whilst every care is taken, prices and details are subject to change and the publisher can take no responsibility for omissions or errors.
No responsibility is taken for unsolicited submissions or the return of submitted items.
The Publisher gives no guarantee of actual publication date.