Page 36 - Security Today, September 2018
P. 36

CLOUD SECURITY
to use a hybrid model. One example seen quite frequently is using a third-party cloud provider for storage of information but man- aging application-level information on-site. We also see the inverse of this scenario where some sectors may be required by law to store information on-site.
Using the cloud also removes a number of issues with the DIY method of storing data. Free software may be provided by a manu- facturer, but it is hardly free. It requires users to purchase and operate their own comput- ers, keep them working as close to 100 per- cent of the time as possible, and makes the user liable for any potential breach.
However, at a reputable cloud facility, all data is being stored in total compliance with local laws and requirements, boasts uptimes judged by the hundredths of a percentage, and is maintained by expert staff.
In short: the cloud is likely to be much more reliable than any system most end users could operate on their own.
Blending IT Security with Traditional Security
Fast forward to the “traditional” security industry—the access control, video surveil- lance, alarm trades—and suddenly the cloud is an opportunity to offer robust networked solutions to every business. With cloud com- puting, everyone can now access the power of a built-out storage facility offering a type of “armor-plated” security for their data.
For manufacturers and integrators this development is huge.
Our background might not be in cyber- security or IT security but by taking advan- tage of highly secure cloud storage, we gain the ability to offer automatic backup, threat detection, intrusion monitoring, and a staff of dedicated network professionals. We can also achieve regional compliance specific to the location where data is stored by partner- ing with cloud services in multiple countries.
When to Use the
Cloud in Security
While it is true that every vertical and every segment can benefit from cloud technology, there are a few sweet spots in terms of security.
For example, multi-family or mixed-use residential properties are door dense and infrastructure poor environments. Regard- less of whether it is a historical building, new construction, retrofit or some area in between—they are almost always facilities full of doors and without a dedicated IT professional.
If you look at lock management solutions for this market, you’ll see how cloud-based software can vastly improve administration. Not only does it eliminate the cost and main-
tenance of on-site servers but it also allows for remote access from any authorized com- puter, tablet, phone or other device. And of course, at the risk of sounding redundant, it comes with the knowledgeable staff at the cloud service provider offering a high level of security.
Small and medium-sized businesses are also well suited for cloud-based solutions. They are often door dense environments and are unlikely to have a dedicated IT staff member. Using a cloud-based solution al- lows all door openings to be monitored se- curely from any location. This is also true for other systems such as video monitoring or fire detection.
Looking a bit deeper into this we find unique situations such as assisted living. These are no longer just tenants—they are also patients. Privacy laws in this space could be violated if someone were to gain access to a name attached to a credential or had access to data related to security. Under HIPAA laws, for example, a fine can often be assessed based on a security breach and the loss of multiple pieces of data from a self- maintained server could result in putting a provider out of business.
In all of these scenarios, the standard best practice is to rely on a cloud provider to store data. There are a number of manu- facturers that provide cloud-based software that fully encrypts data from your keyboard to the server.
Work With the Experts
As mentioned before, there has histori- cally been a “free” software option for sev- eral types of building management software, where users take on the responsibility of installing, updating and maintaining the server environment. However, most modern solutions allow companies to outsource the management of their servers, much the way they outsource payroll or any other function which isn’t core to the business.
Best practice is to go to the experts on data storage when it comes to blending data security with traditional security.
Find manufacturers who are offering cloud-based software and are actively pro- viding a solution for the data storage compo- nent built into the product. Whether an end- user or integrator, going this route creates a partnership with the manufacturer that en- sures you are always up-to-date in terms of software and code compliance. Further, you are provided a level of customer support at both the application and server level.
In short: the cloud lowers costs, minimiz- es risk, and provides secure access to systems from nearly any device.
Best of all: it is available
to everyone today.
Peter Boriskin is the vice president of commercial product management at ASSA ABLOY Americas.
galastudio/Shutterstock.com
34
0918 | SECURITY TODAY


































































































   34   35   36   37   38