Security and cloud computing

July 2016 Access Control & Identity Management

As we hear more about how cloud solutions and services are becoming more popular in the business world today, Neil Cameron at Johnson Controls discusses the pros and cons of security in the cloud.

Neil Cameron, GM: Johnson Controls Building Efficiency, Africa.
Neil Cameron, GM: Johnson Controls Building Efficiency, Africa.

Putting a security platform in the cloud is today highly feasible and beneficial for companies with a national or multi-national footprint. The connectivity and bandwidth is there, it’s cost effective and it’s reliable. It facilitates integration of multiple business, building and security systems, offers sophisticated control and management features, and drives best practices across the organisation. But, more importantly, with the right solution or platform in place, it’s safe.

Adoption of cloud-based security solutions is growing significantly, but it’s important to understand the features and limitations of the platform that you select.

Today, ‘cloud’ connectivity and services are a commodity. Security is taken very seriously by companies offering cloud solutions as well as enterprises, so a lot of investment has gone into making cloud platforms robust and redundant. When it comes to a cloud-based security solution, it’s a no-brainer for companies with a physical presence in multiple locations and geographies.

It not only extends their investment in their security solution by making it accessible via a central cloud location to multiple sites, it adds flexibility and control, as well as assurance that regulatory requirements are being met.

Big benefits to cloud-based security

Cloud security solutions may encompass data, communication, business transactions and physical onsite security such as access control and perimeter security. The benefits include:

• Flexibility, ease of access to data and ease of expansion. A cloud solution makes company data available and accessible from anywhere. This makes it easy for travelling and remote workers to access data and work from anywhere, securely. It also makes it easy for the company to open up a new branch or establish itself in a new location quickly and easily, because all it takes is putting in the hardware – reader and door controller.

• Analytics. With a single scalable platform in place to manage data, video, access control, authentication and security events, analytics becomes easier to do. When security and other systems are on servers in separate buildings, it becomes difficult to interrogate data and discover insights.

• Business crises. In cases of emergency (e.g., fire, terrorist attack, etc.) having an off-premise solution in place is highly beneficial. Data is safe, business critical functions will continue to run, and standard procedures and protocols will be initiated to safeguard people, assets and business systems.

• Standardisation. One of the greatest benefits of having a single centralised security platform is that security standards and policies across locations will be standardised. This means in any situation, standard regulatory procedures will be initiated to ensure regulatory and safety requirements are met and risk is suitably managed.

• Remote control. A cloud platform makes it easy to monitor facilities from anywhere in the world, and escalate any incidents locally. This provides a huge operational saving. It means not having to invest in a local 24x7 control room but gives the company all the benefits of a 24x7 investment.

And if the network does go down?

That’s when it becomes really important to have the right system in place to keep facilities open, control access to sensitive areas and ensure important events, such as HR-driven interventions (e.g., maximum overtime, body searches or scans, etc.) will raise alerts. Sophisticated intelligent onsite access control controllers are today available for high-end solutions such as Johnson Controls’ P2000 platform.

The controllers have sufficient intelligence and storage capacity to ensure the data, security configurations and policies remain accessible in offline mode. This provides, among others, access control at over 99% efficiency.

Each onsite P2000 access control controller has a built-in server with robust processing capability, sufficient RAM to store a database of critical access information, an IP-based OS, and wireless peer-to-peer communications capabilities to ensure uninterrupted and uncompromised access control.

There are huge benefits to be had from taking security into the cloud but companies need to be aware of the potential pitfalls and find a solution that will meet their needs in on- and offline scenarios.

For more information contact Johnson Controls, +27 (0)11 921 7141, neil.cameron@jci.com, www.johnsoncontrols.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Luxury residential access
Access Control & Identity Management Residential Estate (Industry)
Clifftown Shore is an exclusive collection of 51 luxury 1, 2 and 3-bedroom seafront apartments and penthouses set within a protected conservation park area, served by CAME’s XiP system and door entry system.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.