look at the clouds

2
February 2012  SECURITY   SecurityMagazine.com 10 A s Clo ud Comp utin g b ecomes the ne w plat form for many a spects of our liv es, from Google Mail to iT unes to b anki ng and mor e, the disc ussion specific to security tends to focus on the What. It may be helpful to look at the Why. Security Cloud Comput ing (SCC) is chang ing t he v ery fabric of how security is sold, deliv ered, used and as a result, valued. While SCC is nothing n e w to the secu- rity monitoring business model, SCC may benefi t y our sec uri ty program. You will hear concerns that the cloud is not secur e. But that is not our cloud. Securing the cloud is important, and very smart people are working to ensure that happens. Our opportunity is to use the cloud to secure our organi- zations, not to secure the cloud.  As a defini ti on, any secu ri ty related application (video, iden- tity, access, fire, intrusion, life safety) that is traditionally pur- chased, installed and managed can become a cloud-based service  with recurring payments as th e model versus capital expenses.  What is driving S ecurity Cloud Co mputing, and is it time for an upgrade to your plan? WHAT is Changing?  Three technology tr ends are combining to enable successful cloud computing models and the la y ering of app licat ions on the cloud. I n our case, security is the application on the clou d platform. 1. The digitalization of all things, including security technologies 2. The delivery of software as a ser vice replacing software pur- chase and upgrades 3. Mobilization forcing the distribution of information to mor e than 2 billion and growing smart phone devices.  Digitalization h as occ urred, as the move from analog to IP is in full force with more than 65 percent of all DVRs sold includ- ing Ether net conn ectio ns. IMS R esear ch ident ifies that mor e than 50 percent of all 32 o r mor e camera installations ar e now IP (with analog dominating the under 16 camera installations). Software as a Service (SaaS) is logical, efficient and now tech- nically practical. The days of buying and installing software that ages quickly and r equires upgrades/replacement by users are in the rear view mirror. SaaS changes the way we live our lives and access information from music on iTunes , to customer informa- tion on Salesforce.com to books from Amazon to e ntertainment via on demand vid eo at home. Those failing to meet this cal l  will go the way of B lockbuster and Bor ders. Having the latest version of software each time you log in and having subject mat- ter experts upgrade and maintain that softwar e is a good thing. The move to virtualization is in full force. Mobilization, especially the 2-4 billion s mar t phone devices  where people want to get their information , video and the latest issue of Security  magazine is chan ging wher e we work and how  we live. This information has to be collected in and d istributed from a cloud platform with the latest software in place. Combined, this tsu nami of c hange is impacting ev ery busi- ness, including security . “There are some very powerful technologies available today.  And those that are not using them ar e running out of ex cuses,” notes Bud Broomhead, CEO of Intransa. WHY it is Changing  Enterprise goa ls have moved from event response t o risk man - agement. The goal is to achieve situational awareness and event prevention as well as provide an effective response to unforeseen events. Organizations like y ours are demanding access to all business information when , wh er e and ho w you want it, an d that includes security-related information.  At the same time, organizations ar e more focused on putting resources into strategic initiatives and outsourcing non-strategic activities. For example, an inv estment company will outsour ce payrol l to ADP but not the dev elopme nt of algor ithms that create a competitive advantage on their trading floor . SaaS for security fits perfectly into that goal. SCC delivers powerful information to achieve a broader array of business goals. Customer metrics, including people counting at stores or crowd control in public v enues, are enabling both business and security decisions during fluid situations that ben- efit all your stakeholders. Even more, SCC is being adopted due to internal corporate responsibilities , legislation , insurance and ris k management. For example, drug treatment facilities are required to host video content offsite. The value in the physical security application must transcend s ecurity and cr eate broader business value to be  justified. For your consideration, thes e ar e the WHYs of SCC. Look to the Clouds and Ask, “Why?” Trends By Mark McCourt 010 Trends Col.indd 10 010-Trends - Co l.indd 10 1/19/12 2:54 PM 1/19/12 2:54 PM

Upload: ajaxor

Post on 02-Jun-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

8/10/2019 Look at the Clouds

http://slidepdf.com/reader/full/look-at-the-clouds 1/2

8/10/2019 Look at the Clouds

http://slidepdf.com/reader/full/look-at-the-clouds 2/2