Page 20 - Security Today, March/April 2024
P. 20

                                 With only metadata sent to the cloud, bandwidth and storage requirements can be reduced significantly, and SD cards and other local, on-site storage solutions can be used to further reduce costs and com- plement cloud capabilities.
The strength of today’s edge offerings has allowed organizations to adopt a “best of both worlds” approach, prioritizing suites of products that meet a variety of needs. By partnering with manufacturers and developers rather than committing to exclusivity, organizations can streamline their products and services without over- committing to a single provider.
Best of all, a strong edge with AI-based capabilities is a major enabler for the cloud. Simply put, the more organizations can do at the network edge, the more scal- able their cloud solution will be.
Embracing a Platform- based Approach
The key to this “best of both worlds” ap- proach is a service management platform capable of effectively managing physical devices while providing the essential cloud services that allow users to make the most of their data. When selecting a device management platform, prioritizing open- ness is a key factor that allows customers to avoid becoming over-reliant on a single vendor.
“Some organizations also believe that because the cloud is “separate” from their on-premises systems, attacks on cloud devices cannot impact the rest of their network. This is incorrect. Compromised cloud devices can
be a gateway to the broader network—and cybercriminals know it.”
  Fredrik Nilsson and Martin Gren at Axis Communications.
That said, it does make sense to choose one managed by the same manufacturer of the edge devices in use. For example, an organization that uses hundreds (or thousands) of surveillance cameras from one manufacturer will want to prioritize a platform capable of managing those de- vices smoothly and effectively.
Organizations should look to align their platform and their devices as closely as possible without sacrificing flexibility. Ideally, that means working with a manu- facturer that provides an open cloud man- agement platform—one capable of inte- grating with several solutions, rather than locking customers into only its own cloud video management solutions.
Ease of use is not the only thing to con- sider when selecting a device management platform. Another factor is the growing need for effective cybersecurity. Many or- ganizations continue to struggle with cy- bersecurity—particularly when it comes to
managing devices in the cloud.
Cloud also tends to make organizations
feel as though they can be more “hands off.” They believe that the cloud provider will take care of security concerns, which is not always the case. This can result in gaps and vulnerabilities where neither par- ty is taking responsibility, leaving open- ings for cybercriminals.
Some organizations also believe that because the cloud is “separate” from their on-premises systems, attacks on cloud devices cannot impact the rest of their network. This is incorrect. Compromised cloud devices can be a gateway to the broader network—and cybercriminals know it. This problem can be mitigated when working with the right manufac- turers. Device manufacturers understand how to secure their own devices better than anyone, and constructive collabora- tion between platform and devices also provides the necessary infrastructure for
20
MARCH/APRIL 2024 | SECURITY TODAY
COVER STORY
 
















































































   18   19   20   21   22