The reality of the cloud

CCTV Handbook 2021 Editor's Choice

One unmistakable take-away from this year’s CCTV Handbook is that the cloud is the new frontier for surveillance operations. It’s not new or revolutionary, but we are seeing more solutions that don’t have cloud services as a backup or storage option, but focus almost entirely on services in the cloud.

There are many benefits to the cloud, but there are also challenges. In South Africa, many say that cloud surveillance solutions are good for small installations, five to 10 cameras, maybe 15, but not for large systems due to bandwidth considerations (despite the availability of fibre in major cities). The question for the companies looking at a ‘cloud-first’ solution is whether these limitations are real and if so, how do they overcome them?

Brendon Hall, director of IoT Revolution Technologies (IoTRT), says that in today’s digital age, connected cloud-based services have become part of the everyday fabric of society. “Such is their integration that we often don’t realise we’re using an AI-enabled device or service that sends and receives information from data centres thousands of miles away in the blink of an eye.”

He adds that cloud migration has further been expedited by the 2020 pandemic, with millions of people worldwide working from home. “The adoption is not just a reality, but a tipping point for the security industry as those security companies that don’t embrace this evolving technology will end up like well-known names such as ‘Blockbuster’, killed by cloud services like Netflix.”

How one adopts or integrates the cloud into your services or surveillance solution depends on the technology you deploy. In Hall’s opinion, a hybrid cloud solution is the future since hybrid cloud is flexible for both small and large installations.

“Hybrid cloud allows your customer to evolve out of the hardware business and its associated costs.”

He provides the example of a large retailer that has 650 stores throughout South Africa. Each store will have an NVR and storage in diverse geographical areas. The challenge is real and deployment of support and spares across this vast area, costing time and travel, only escalates. Hall asks, “What if there was no NVR and all the storage resides on the cameras’ on-board SSD that can store video from 15 days to 365 days? No servers, NVRs or VMS on site to go wrong and no equipment room? All that is required is a network, a UPS and ‘very light’ connectivity.”

If the client has connectivity, a full copy of the footage is stored in the VsaaS (Video Surveillance-as-a Service) cloud. The head office has direct access to all the footage either directly off the camera or in the cloud. To add cameras requires no additional hardware or concerns if the NVR accommodated growth.

This example directly affects the retailer in a number of ways, equating to more floor retail space, less components to fail, always having the latest software features and the latest analytics, lower operating expenses and a number of other features and benefits.

“I recently completed a TCO for a large installation and my findings were eye watering,” Hall continues. “For a large deployment, it is even more compelling when looking at a total cost of ownership (TCO) covering a mid- to long-term period investment.

Real numbers

“A real case study would be a shopping centre project with 620 cameras which were supplied in 2013. This project required eight servers, associated NAS boxes and ICT equipment to process this number of devices (cameras). As with all ageing ICT equipment, they had to replace their entire storage component in 2018.

“IoTRT is aware that the same centre will be replacing the VMS, storage and subsequent ICT equipment again in the middle of this year, once again spending and remaining in the data centre space. Did the customer and their financiers ever have a true TCO discussion?”

Table 1 offers a glimpse of some of the TCO for this retail project.

Considering Table 1, the customer is getting into the data centre and hardware space to run its video system. Halls says that if they disclosed these 10-year TCO costs, either somebody would be fired or the system never deployed.

“In a cloud- based deployment, the centre could simply install the 620 cameras connected to a network with backup UPSs, supplied with a 10-year warranty on the cameras. No servers, no storage, no VMS or other associated expenses. The camera is simply licenced to the VsaaS with an annual subscription that can be procured as a 1-year, 3-year, 5-year or even 10-year subscription. No other licences and all the cameras are constantly updated with the latest available analytics, firmware and security patches from the secure cloud.

“Disconnection from the cloud due to an Internet issue is no problem as the system will work on a standard LAN environment and once the connection is restored, all latest software, firmware and related services pushed to each camera.”

The cybersecurity question

Cybersecurity is always an issue, highlighted by the recent events with a number of cloud service providers. In the cloud surveillance arena, for example, Verkada’s data breach springs to mind (IoTRT represents Verkada).

Some could say that in a properly configured cloud service, the user has control through encryption and multi-factor authentication. Of course, these safeguards need to be enabled and used and employees need to understand why passwords, keys etc. need to be kept confidential.

Hall puts the Verkada breach into perspective. He states that no camera was hacked. When looking at Bitcoin, also in the news these days, he explains that the fact is that if you lose your master password, you lose your Bitcoin investment.

He says Verkada tried to avoid this type of situation and developed what they call a ‘super’ password programme so that in the event the customer forgets all their login details, they can request Verkada to restore their system. To keep this secure, the installer should have activated the ‘two-stage authentication’ when requesting assistance from Verkada.

Verkada then sends an encrypted email requesting permission to access the site. “These ‘super’ passwords were made available to certain technical resources or staff who, for some unknown (possibly malicious) reason, published them. This further highlights the risks around personal social engineering and the development of a published cybersecurity policy with the correct checks and balances in place.

It further begs the question why the checks and balances weren’t put in place by the companies (end users) and their system integrators?

“For the record,” Hall states, “those clients without the checks and balances of two-stage authentication had their cameras exposed. Verkada acknowledged the breach and took accountability.”

The point he makes is that cybersecurity is not simply the responsibility of one party. It is up to the industry as a whole (including end-users) to activate all the security features available to avoid this type of situation (Read more about the Verkada incident at https://www.verkada.com/uk/security-update/).


‘Hostage-as-a-service’

One of the biggest challenges some cloud providers face today is what is becoming known as ‘hostage-as-a-service’. In other words, all your eggs are in one basket and the service provider has locked you in to their systems and solutions.

Questions of how companies can retain full ownership and do whatever they want with their video data if it is all in the hands of a service provider abound and this includes the possible need to take your data and move it in-house or to another provider. Moreover, while some cloud surveillance operators can accommodate various cameras in their solution, some provide the whole solution, including restricting users to using the provider’s cameras.

Hall says this is a contentious issue that is only found in security companies. He asks the question: “Do you send confidential email with Microsoft 365? 365 is cloud-based, the same as cloud surveillance. Can a customer migrate easily to another vendor without procuring more software? No.

“The current principles around security surveillance and the ‘old guard’, to be frank, are archaic. Would you migrate away from Microsoft? To embrace technology, you have to pick your vendor. When engaging with ICT infrastructure companies nationally and internationally, they embrace vendor loyalty and lock-in like all the other as-a-service products.”

The differentiator

Expanding on the cloud services IoTRT offers, Hall starts mentioning a few facts that should be considered by those considering cloud or other services.

• Cameras generate more than 2500 petabytes of data daily.

• Africa will get 700 new data centres in the next 10 years. This will bring scales of economy to a critical mass we cannot yet comprehend.

• One billion surveillance cameras will be watching around the world in 2021.

• 2,5 quintillion bytes (about 2,5 million terabytes) of data are created every single day, by 2025 the amount of data generated each day is expected to reach 463 exabytes globally (roughly 463 million terabytes).

“Our business model is to ‘get the end user out of the hardware business’ and the security industry into the annuity business,” states Hall. To accomplish this, the company offers the following services:

• Control Room-as-a-Service (CRaaS).

• Platform-as-a-Service (PaaS).

• Infrastructure-as-a-Service (IaaS).

• Analytics-as-a-Service (AaaS).

• No fixed licensing costs.

• No fixed analytics to a device.

• No heavy maintenance costs.

• No upgrade costs to keep up with technology.

• Large cloud-based AI computing power in our locally hosted data centre (at Teraco) with full disaster recovery.

• Affordable cloud-based storage solution.

• Opex models that suit the end user and system integrator (SI).

• No expensive HVAC costs.

• Annuity model for the entire ‘food chain’.

(To delve deeper into the below, Hi-Tech Security Solutions spoke to Hall and wrote more about IoTRT’s offerings, which you can find on page http://www.securitysa.com/13472r).


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Holding all the cards
neaMetrics Suprema SMART Security Solutions Technews Publishing Access Control & Identity Management
After so many years of offering alternatives to card technology for access control, one could be forgiven for assuming we are all using biometrics or mobile credentials for all our physical and digital access requirements.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.