Security and cloud computing

July 2016 Access Control & Identity Management

As we hear more about how cloud solutions and services are becoming more popular in the business world today, Neil Cameron at Johnson Controls discusses the pros and cons of security in the cloud.

Neil Cameron, GM: Johnson Controls Building Efficiency, Africa.
Neil Cameron, GM: Johnson Controls Building Efficiency, Africa.

Putting a security platform in the cloud is today highly feasible and beneficial for companies with a national or multi-national footprint. The connectivity and bandwidth is there, it’s cost effective and it’s reliable. It facilitates integration of multiple business, building and security systems, offers sophisticated control and management features, and drives best practices across the organisation. But, more importantly, with the right solution or platform in place, it’s safe.

Adoption of cloud-based security solutions is growing significantly, but it’s important to understand the features and limitations of the platform that you select.

Today, ‘cloud’ connectivity and services are a commodity. Security is taken very seriously by companies offering cloud solutions as well as enterprises, so a lot of investment has gone into making cloud platforms robust and redundant. When it comes to a cloud-based security solution, it’s a no-brainer for companies with a physical presence in multiple locations and geographies.

It not only extends their investment in their security solution by making it accessible via a central cloud location to multiple sites, it adds flexibility and control, as well as assurance that regulatory requirements are being met.

Big benefits to cloud-based security

Cloud security solutions may encompass data, communication, business transactions and physical onsite security such as access control and perimeter security. The benefits include:

• Flexibility, ease of access to data and ease of expansion. A cloud solution makes company data available and accessible from anywhere. This makes it easy for travelling and remote workers to access data and work from anywhere, securely. It also makes it easy for the company to open up a new branch or establish itself in a new location quickly and easily, because all it takes is putting in the hardware – reader and door controller.

• Analytics. With a single scalable platform in place to manage data, video, access control, authentication and security events, analytics becomes easier to do. When security and other systems are on servers in separate buildings, it becomes difficult to interrogate data and discover insights.

• Business crises. In cases of emergency (e.g., fire, terrorist attack, etc.) having an off-premise solution in place is highly beneficial. Data is safe, business critical functions will continue to run, and standard procedures and protocols will be initiated to safeguard people, assets and business systems.

• Standardisation. One of the greatest benefits of having a single centralised security platform is that security standards and policies across locations will be standardised. This means in any situation, standard regulatory procedures will be initiated to ensure regulatory and safety requirements are met and risk is suitably managed.

• Remote control. A cloud platform makes it easy to monitor facilities from anywhere in the world, and escalate any incidents locally. This provides a huge operational saving. It means not having to invest in a local 24x7 control room but gives the company all the benefits of a 24x7 investment.

And if the network does go down?

That’s when it becomes really important to have the right system in place to keep facilities open, control access to sensitive areas and ensure important events, such as HR-driven interventions (e.g., maximum overtime, body searches or scans, etc.) will raise alerts. Sophisticated intelligent onsite access control controllers are today available for high-end solutions such as Johnson Controls’ P2000 platform.

The controllers have sufficient intelligence and storage capacity to ensure the data, security configurations and policies remain accessible in offline mode. This provides, among others, access control at over 99% efficiency.

Each onsite P2000 access control controller has a built-in server with robust processing capability, sufficient RAM to store a database of critical access information, an IP-based OS, and wireless peer-to-peer communications capabilities to ensure uninterrupted and uncompromised access control.

There are huge benefits to be had from taking security into the cloud but companies need to be aware of the potential pitfalls and find a solution that will meet their needs in on- and offline scenarios.

For more information contact Johnson Controls, +27 (0)11 921 7141, [email protected], www.johnsoncontrols.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...