As more and more businesses migrate to cloud-based security systems due to its many advantages over on-site network video recorders (NVRs) and even computer hard drive recording and storage devices, challenges remain that relate to the navigation of cloud technologies and its vulnerabilities.
Evolution
With the amount of security video utilized worldwide every day, the need for cloud-based storage is becoming an increasing necessity. Modernizing security efforts on a local and global scale have become more important for numerous reasons, including scalability, affordability, secure and flexible access 24/7/365, as well as secure off-site large scale data storage, to name just a few.
As such, video surveillance as a service (VSaaS) provides the necessary and reliable platform built on cloud-based architecture, making multi-site surveillance both simple and even more cost effective.
On-site hardware, once the front line of video surveillance capture and retrieval solutions, is increasingly being relegated to backup systems or retired altogether by way of remote access security solutions such as VSaaS. This is because modern security surveillance systems only require four key components: IP cameras; power; internet connection; and a subscription to a VSaaS plan.
A case study
The Washing Well Laundromat, based in Jefferson, Iowa is an example of a business that required dependable surveillance around-the-clock for a multitude of reasons. The organization also needed robust surveillance at various points that would work no matter whether during sunny days or at 2am in a powerful Midwest American blizzard.
Being able to access important video footage from anywhere, anytime had become a necessity for the business owners who wanted to check on their location remotely to help them determine if the property needed any attention such as cleaning, snow removal, storm damage or general maintenance, while also providing security for both the owners’ and customers’ property. Having only on-site accessibility and storage was of no help during hazardous or untimely situations.
As a result, they worked with a local integrator, TechZone, whichchose VIVOTEK and its VORTEX VSaaS with a total of five of its indoor and outdoor security solutions for a comprehensive end-to-end AI surveillance solution that integrates deep-learning-based network cameras with cloud-based video management software to solve The Washing Well’s security surveillance solution issues.
As Murphy’s law states, “anything that can go wrong will go wrong.” However, if you take the appropriate precautions and select the best and most appropriate system for your needs, these will mitigate or negate potential problems altogether.
The remote cloud-based system is internet-based, safeguarding security systems from being exposed to hackers and has two forms of internet connectivity if the first should fail, ensuring that The Wishing Well’s surveillance is secure.
The cost consideration
The best VSaaS systems provide a lower cost option due to the lack of need for on-site hardware and space availability. Unknown surveillance recording issues that can tap into a budget unexpectedly, such as recording hardware and software breaking down and the need to replace older and obsolete models, does not arise with VSaaS. For the most part, that line item in an annual budget will remain the same.
Overall, there is also a lower annual operating cost than in-house hardware/software solutions. The good news is that often, VSaaS is less expensive and in many instances, is dramatically more affordable, than on-site hardware video storage systems.
While being more convenient and less expensive to upkeep versus traditional on-site hard drive storage methods, VSaaS also offers a more secure storage platform. Recognizing the tremendous potential of hosted services, global IP surveillance providers are continuing to design and implement cloud-based storage VSaaS solutions as new trends and needs arise.
Even surveillance systems are not immune from threats, so you want to choose a system that prioritizes its operations with best-in-class security features in hardware security, network and cloud-based security, as well as storage security, to ensure 24/7 seamless protection and operation.
What to look out for in a top-tier cloud-based security system
Signed firmware requires a digital signature in the firmware and verification of the signature by the host, thereby ensuring that users can trust it has not been tampered with. A device with signed firmware can be validated before allowing installation. By applying the signed certificates and keys to the firmware, it is guaranteed that all data are secure and encrypted without any exposure and risk from hackers.
Secure boot is a mechanism that protects the firmware of the installed product. During the boot up process, secure boot blocks unauthenticated or tampered code. Additionally, signed firmware ensures that cameras can restore safely to factory default, while secure boot ensures that unauthenticated code is rejected, protecting the camera system from attacks or infections from malicious external code.
On the basis of secure boot, updating the remote access security mechanism and disabling the console of the camera from the SSH and SFTP protocol will defend the vulnerability of the system. Permission from the host with key-based authentication is the only route to access, providing a safer connection for the surveillance system.
Data security should be the integrator and manufacturer/host’s top priority. Utilizing TLS 1.2, AES-128 bit encryption protocols provide end-to-end security for data transmitted over the internet. This ensures all data is encrypted during transit and prevents attacks.
Traditional NVRs use port forwarding, which is vulnerable to attacks. Using a remote system will eliminate port forwarding, excluding anyone outside your network from accessing your devices.
You will want a system with footage and data stored in the cloud that are protected with AES-256 bit encryption, protecting data at rest and in transit, meaning that your data is fully encrypted in any situation.
With regular testing and security audits, your system can keep a vigilant eye on all possible data vulnerabilities by providing automatic software and firmware updates to provide customers with optimum performance 24/7.
Power and internet outages are always an issue, even for on-site hardware-based systems that are out of a business’ control for the most part. Generators could and would provide backup power and a good option for businesses using fiber optic internet could be a cable or satellite-based internet connection as primary choices to step up when the primary connection fails for any reason.
Staying up-to-date
Technology in most industries is seemingly getting better, faster and more reliable every day. In the security industry, when lives and livelihoods are at stake, not only keeping up with the current trends, but looking forwards to keep ahead of potential dangers such as hackers, is vital.
Hardware and software will continue to evolve, as will the front and back-end security features found in today’s leading manufacturer’s products and services – particularly cloud-based systems.
Besides top-end products, working with a properly trained and knowledgeable integrator is key to keeping your system secure and operating properly. Not only will they set up and train you on your new system, but they will maintain it and keep up with the current trends to make sure they take care of your needs when it is time for you to alter and/or upgrade your system to the most up-to-date hardware and software platforms.
VSaaS is here to stay and is quickly becoming the choice for security professionals.
This article was originally published in the May edition of Security Journal Americas. To read your FREE digital edition, click here.