The cloud and security

April 2017 Surveillance, Perimeter Security, Alarms & Intruder Detection, Information Security

Using the cloud for data storage, application or platform hosting is a growing business, but we have seen some reluctance in the security industry to make use of the cloud for hosting and running security functions. In South Africa, this can often be ascribed to the lack of and expense of bandwidth, although this has changed somewhat over recent years.

Nevertheless, with the exception of some cyber security service providers, security run from the cloud has been more the exception than the rule. Hi-Tech Security Solutions asked some players from both sides of the physical/cybersecurity industry what their thoughts are on the uptake of cloud services for security functions.

Mike Voortman.
Mike Voortman.

Mike Voortman, MD of Verifier, a monitoring company that started in the Western Cape and is now expanding north, which offers services monitoring various cloud-based intruder detection analytics as well as ANPR (automatic number plate recognition) solutions across all market segments from residential to community and commercial, says, “We are excited to be monitoring more cloud-hosted solutions where exceptions are processed in the cloud, with verifications and escalations performed remotely by us. Due to this exception-based model, bandwidth isn’t a major concern and data is, in any event, becoming cheaper. We’re already monitoring video, alarms, RFID and LPR (or ANPR) cloud-based solutions and have not experienced any objections regarding bandwidth.”

John McLoughlin, MD of J2 Software, a company that recently launched its own Security Operations Centre (SOC), says organisations should be seeking to leverage the cloud (or the scale of the Internet) to gain greater information security capabilities. “Most, if not all, businesses in South Africa have a problem around the required information security skills which are at their disposal. They are also examining whether or not they have the ability to add a new hire and find any with the requisite skills to provide security across the board – server/infrastructure security, host and network intrusion protection, usage metrics and protect against internal and external threats.

John McLoughlin.
John McLoughlin.

“The truth is that the Internet/cloud can be utilised to provide access to a team of security specialists that can guide and remediate issues at a lower cost than employing the elusive miracle hire as a direct cost to the business. South African companies are not ahead of the game here – with very few having taken any steps towards using outsourced specialist services and the power of the web to enhance security and gain visibility in order to fight back and stop cyber threats.

“We have launched the J2 Cyber Security Centre to provide our customers with the peace of mind of having a highly-qualified set of security professionals looking after their information security, which gives total visibility and thus delivering a virtually immediate response to threats.

“Using the cloud, however, does not mean that every customer gets the same service or even the same solution. It is necessary to allow for differences in setup and requirements. Client A may need assistance only on insider threats, while customer B may look for a full outsourced managed security service provider. Our approach is to allow for different models, this includes monitoring with all data staying on-site and using the cloud for management, through to the other end of the spectrum where everything is hosted, or anything in-between.”

Richard Aikman is product manager: enterprise mobility at Vox, another company traditionally associated with the ICT industry, but which also entered the physical security industry with its monitoring services. Vox clients could be any business that has fixed operating hours, thus allowing event or alarm monitoring during closed time.

Aikman says that even though data costs are dropping, it still remains expensive to stream video footage in real time, and cloud storage and retrieval suffer the same constraints.

Onsite or offsite

The issue local companies have with bandwidth and the related costs has led some businesses to opt for a hybrid approach to cloud services. As noted above, some functionality can be hosted onsite, while the service provider hosts others offsite.

In the case of Vox, Aikman explains that remote monitoring does not require all the video to be streamed offsite. Video feeds are recorded and stored locally onsite, however any alarm activation or trigger will be pushed offsite for review and action. Vox uses this type of setup for its services, but also allows for streaming when a ‘virtual guard’ patrols its clients’ sites, walking the perimeter remotely irrespective of the weather conditions or local staffing.

Verifier has a similar operation where triggers are escalated to the control room and are verified by humans, who then initiate the relevant responses. Voortman says that in the security realm, we will see more of the “crunch work happening in the cloud. Automation of processes is on the increase, and we foresee that this will advance alongside developments in analytics.”

Automation is also key for McLoughlin operating in the cyber security world. “The power of the connected world means that we can do so much more through task automation. As with all good security, one firstly needs to be clear on what is being protected, this gives us the baseline and it is then through responding to anomalies that dangers can be excluded/cut out.

“The cloud is always connected and ready to act. We can ensure that when our sensor picks up the activity, we trigger a response via an automated task and remove the workstation or server from the network – disconnect and protect the network before anything else is affected. We can then have the first responders react and remediate, with the advantage that the danger has already been effectively removed.”

When considering the solutions available for security, whether cyber or physical, it is clear that the cloud and the security industry can do business together. However, it is very important to ensure that the client knows what they want and the service provider is able to supply these services. There is no vanilla approach as there may be to simply storing data in the cloud.

And while there are those who would say streaming video is possible now that South Africa has a growing fibre network, the reality is that even in onsite control rooms we are finding companies relying on technology to automate the monitoring and only alert human operators when something out of the ordinary happens. Not only is this more secure as technology never loses concentration or falls asleep, but it also allows companies to use more expensive human resources for more important tasks that computers can’t handle, yet. The same processes are being applied to the cloud, where computers do the boring work while humans are called into action when something actually happens.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

Read more...
Factories, grids, and finance: Critical infrastructure cyber lessons of 2025
Asset Management Information Security Industrial (Industry)
Africa has seen an accelerated, large-scale digitisation of our overall industrial base, and this rapid convergence of IT and OT is happening on a foundation that, in essence, was not designed to be cybersecure.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Securing a South African healthcare network
Surveillance Healthcare (Industry) AI & Data Analytics
VIVOTEK partnered with local integrator Chase Networks and distributor Rectron to deliver a fully integrated security ecosystem, providing PathCare with a centralised view of all facilities, simplifying monitoring of sensitive laboratory areas, and ensuring SOP compliance.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.