Page 47 - Security Today, February 2017
P. 47

created for gas stations and smaller businesses including res- taurants, liquor stores and convenience stores across the city to promote neighborhood safety and support local businesses by deterring, identifying and solving crimes. Since its introduction in early 2016, the program has helped reduce crime by up to 50 percent at the original eight locations with the ‘green light’ on top of their signs. Many more businesses are now enrolled across the city with great enthusiasm by both the city and business owners.
Cloud Storage and Computing:
All the Way or Hybrid On-Premises/Cloud Mix By providing flexible cloud-only or hybrid-cloud storage options for our unified flagship security platform, Security Center, our end-users quickly understood the cost and resource benefits the cloud could offer. It began making more sense, and not only cost benefits, but end users will start to benefit from some incredible new applications and functionalities.
In 2017, the security industry will continue to embrace the cloud and what it offers, finding effective ways to connect more applications and devices to the network, while providing secure access to share vital information. The cloud is the facilitator of how we process, store and manage all physical security data. Now that some of the misconceptions about the cloud are cleared up, we will see more organizations than ever before investing in soft- ware-as-a-service (SaaS) and hybrid-cloud deployment models for video surveillance, access control and additional value-added applications that will enhance these systems.
We know about the benefits and features of the cloud, but in 2017, what we find exciting is that in the security industry will start to realize even more interesting ways to benefit from what a cloud-supported infrastructure can offer. The first vector will be the way the cloud will enable collaboration within an enterprise, and across multiple boundaries to manage multiple locations and offer a truly federated way to serve, protect, manage and share security operations via the cloud.
The second vector will focus on how companies can leverage the cloud to work with big data analytics, to distill business intel- ligence through machine learning. Security professionals will be able to correlate both security data and non-security related data (like social media activity based on location and topics), find pat- terns and gain insights. The cloud will additionally allow us to look at other types of security data that is not being leveraged for analytics, such as access control logs.
Confidence of Moving to the Cloud in 2017
Now that companies trust the cloud, and have moved a signifi- cant number of workloads to the cloud, the next logical step will be to establish and work with their security systems in the cloud. Companies are recognizing that there are significant benefits to getting their IT through the cloud. Just in the way end-users switched from proprietary analog systems to open-architecture IP systems, once the technology was successfully implemented and early adopters validated its benefits, the cloud has continued to permeate the security industry, and will increase over the com- ing the years.
Another way to look at the advent of cloud technology is simi- lar to the electrical utilities in the early 1900s. Back at the turn of the 20th century, every company had its own electricity manufac- turing plant that powered their industrial facilities. Obviously, the model of ‘make-your-own-electricity’ no longer exists. It’s far too expensive. Electrical companies have been outsourced as public and private utilities, and some are supported by organizations
that invest in technologies to generate and supply reliable power. The same way electricity distribution grids have been a huge success, outsourcing of non-core competency is happening in computing and storage. As hesitation subsides, organizations will plug into a network and find storage and computing capacity im- mediately available, which should be predictable, well managed,
secure, accessible and reliable.
WWW.SECURITYTODAY.COM 31
Is the Cloud Safer than an On-Premises Server?
In a word, Yes. Naturally, the cloud must be hosted by a repu- table service entity. Working in the cloud is all about trust. Cloud service providers need to establish a proven and trusted reputa- tion and performance record with their customers. To do this, they must implement cybersecurity best practices, and provide 100 percent transparency. Just think of the risks of a data breach and the threat of exposing all your customers and clients to data- theft, loss or even distributed denial of service (DDOS). It’s defi- nitely a way to kill your business. Cloud providers take security very serious, because they know their customers trust them to keep information safe and away from cyber criminals.
Service providers have great capabilities to aggregate their cloud services to many customers and provide better service and solutions by having exclusive personnel trained to take care of being sure data in the cloud is secure. This is all in place of hav- ing an over-worked in-house IT staff, limited resources, or most likely never enough budget to implement the latest cybersecurity, keep hardware updated and cooled, and backups in case of cata- strophic actions or ransomware attacks.
From a scale perspective, most businesses, enterprise custom- ers, cities & communities don’t have the budgets or flexibility to justify the cost of what a cloud hosted system or storage can of- fer. Simply having your servers or computing boxes on the physi- cal properly will not assure they are more secure that in the cloud. A strong cybersecurity posture can be much better managed by cloud service providers’ vs doing it yourself. Whom you trust your cloud services also matters greatly. With larger, reputable compa- nies like Amazon or Microsoft, we can feel more secure with, as opposed to Bob’s cloud garage, running a data center from his basement. Making the due diligence steps to assure that safety and cybersecurity by the cloud provider however is still much eas- ier and cost effective than managing, protecting and maintaining an on-premises server for the majority of end-users.
Tashatuvango/Shutterstock.com


















































































   45   46   47   48   49