The cloud and security

April 2017 Surveillance, Perimeter Security, Alarms & Intruder Detection, Information Security

Using the cloud for data storage, application or platform hosting is a growing business, but we have seen some reluctance in the security industry to make use of the cloud for hosting and running security functions. In South Africa, this can often be ascribed to the lack of and expense of bandwidth, although this has changed somewhat over recent years.

Nevertheless, with the exception of some cyber security service providers, security run from the cloud has been more the exception than the rule. Hi-Tech Security Solutions asked some players from both sides of the physical/cybersecurity industry what their thoughts are on the uptake of cloud services for security functions.

Mike Voortman.
Mike Voortman.

Mike Voortman, MD of Verifier, a monitoring company that started in the Western Cape and is now expanding north, which offers services monitoring various cloud-based intruder detection analytics as well as ANPR (automatic number plate recognition) solutions across all market segments from residential to community and commercial, says, “We are excited to be monitoring more cloud-hosted solutions where exceptions are processed in the cloud, with verifications and escalations performed remotely by us. Due to this exception-based model, bandwidth isn’t a major concern and data is, in any event, becoming cheaper. We’re already monitoring video, alarms, RFID and LPR (or ANPR) cloud-based solutions and have not experienced any objections regarding bandwidth.”

John McLoughlin, MD of J2 Software, a company that recently launched its own Security Operations Centre (SOC), says organisations should be seeking to leverage the cloud (or the scale of the Internet) to gain greater information security capabilities. “Most, if not all, businesses in South Africa have a problem around the required information security skills which are at their disposal. They are also examining whether or not they have the ability to add a new hire and find any with the requisite skills to provide security across the board – server/infrastructure security, host and network intrusion protection, usage metrics and protect against internal and external threats.

John McLoughlin.
John McLoughlin.

“The truth is that the Internet/cloud can be utilised to provide access to a team of security specialists that can guide and remediate issues at a lower cost than employing the elusive miracle hire as a direct cost to the business. South African companies are not ahead of the game here – with very few having taken any steps towards using outsourced specialist services and the power of the web to enhance security and gain visibility in order to fight back and stop cyber threats.

“We have launched the J2 Cyber Security Centre to provide our customers with the peace of mind of having a highly-qualified set of security professionals looking after their information security, which gives total visibility and thus delivering a virtually immediate response to threats.

“Using the cloud, however, does not mean that every customer gets the same service or even the same solution. It is necessary to allow for differences in setup and requirements. Client A may need assistance only on insider threats, while customer B may look for a full outsourced managed security service provider. Our approach is to allow for different models, this includes monitoring with all data staying on-site and using the cloud for management, through to the other end of the spectrum where everything is hosted, or anything in-between.”

Richard Aikman is product manager: enterprise mobility at Vox, another company traditionally associated with the ICT industry, but which also entered the physical security industry with its monitoring services. Vox clients could be any business that has fixed operating hours, thus allowing event or alarm monitoring during closed time.

Aikman says that even though data costs are dropping, it still remains expensive to stream video footage in real time, and cloud storage and retrieval suffer the same constraints.

Onsite or offsite

The issue local companies have with bandwidth and the related costs has led some businesses to opt for a hybrid approach to cloud services. As noted above, some functionality can be hosted onsite, while the service provider hosts others offsite.

In the case of Vox, Aikman explains that remote monitoring does not require all the video to be streamed offsite. Video feeds are recorded and stored locally onsite, however any alarm activation or trigger will be pushed offsite for review and action. Vox uses this type of setup for its services, but also allows for streaming when a ‘virtual guard’ patrols its clients’ sites, walking the perimeter remotely irrespective of the weather conditions or local staffing.

Verifier has a similar operation where triggers are escalated to the control room and are verified by humans, who then initiate the relevant responses. Voortman says that in the security realm, we will see more of the “crunch work happening in the cloud. Automation of processes is on the increase, and we foresee that this will advance alongside developments in analytics.”

Automation is also key for McLoughlin operating in the cyber security world. “The power of the connected world means that we can do so much more through task automation. As with all good security, one firstly needs to be clear on what is being protected, this gives us the baseline and it is then through responding to anomalies that dangers can be excluded/cut out.

“The cloud is always connected and ready to act. We can ensure that when our sensor picks up the activity, we trigger a response via an automated task and remove the workstation or server from the network – disconnect and protect the network before anything else is affected. We can then have the first responders react and remediate, with the advantage that the danger has already been effectively removed.”

When considering the solutions available for security, whether cyber or physical, it is clear that the cloud and the security industry can do business together. However, it is very important to ensure that the client knows what they want and the service provider is able to supply these services. There is no vanilla approach as there may be to simply storing data in the cloud.

And while there are those who would say streaming video is possible now that South Africa has a growing fibre network, the reality is that even in onsite control rooms we are finding companies relying on technology to automate the monitoring and only alert human operators when something out of the ordinary happens. Not only is this more secure as technology never loses concentration or falls asleep, but it also allows companies to use more expensive human resources for more important tasks that computers can’t handle, yet. The same processes are being applied to the cloud, where computers do the boring work while humans are called into action when something actually happens.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Technews Publishing SMART Security Solutions Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
LiDAR protects railways from new and existing dangers
Surveillance
3D LiDAR (Light Detection and Ranging) sensors are being installed to monitor rail traffic and ensure safety of passengers as well as individuals walking near the tracks, or trying to perform dangerous stunts for social media.

Read more...
Securing South Africa’s logistics sector
Secutel Technologies Products & Solutions Surveillance Logistics (Industry)
Unlike traditional guarding services, Visual Verifier operates on an ‘Always On’ principle, ensuring continuous 24/7 coverage of warehouses, depots, transit hubs, and delivery points.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Unlock the future of security operations in Bloemfontein
DeepAlert News & Events Surveillance
Security professionals and business leaders are invited to revolutionise their offsite monitoring operations at the DeepAlert Product Road Show, taking place on 16 – 17 September 2025, at the Schoemanspark Golf Club, Bloemfontein.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.