Ardon Anderson, VP of EMEA at Verkada, discusses why embracing cloud‑based computing is not just viable – but essential for resilience, efficiency and next‑generation threat response.
Table of Contents
ToggleCloud computing is now an indispensable part of modern businesses but when it comes to physical security, misconceptions persist.
Security professionals still harbour fears about the feasibility and safety of moving physical security to the cloud.
This Technology Report, developed in cooperation with Verkada, aims to dispel some common myths about cloud-based security and provide a clear view of how cloud transition benefits security operations.
By correcting some common misunderstandings, decision-makers can make better choices about how to protect their assets and operations in an increasingly digital world.
A common myth is that the implementation of cloud-based physical security is complicated and disruptive.
This usually stems from the confusion around complexities in legacy systems.
Anderson commented: “Most customers already have multiple types of hardware and software, often from various vendors.
“By consolidating these into one streamlined cloud system, we actually reduce the complexity rather than adding to it.”
Enterprises can experience the simplicity of a unified cloud platform by trying it out on a limited basis.
The shift to cloud-based systems can be a phased process, allowing customers to migrate over time without a major overhaul that could disrupt operations.
Transforming a single location to a cloud system demonstrates how easy the implementation can be.
A single, unified cloud system ties together end-devices designed to work seamlessly together.
A cloud platform’s tight ecosystem of components can easily take the place of an existing collection of disparate and clumsily integrated hardware.
The fear of data exposure in the cloud is another persistent yet unwarranted concern among security professionals.
Sometimes people assume that data stored on-premise is safer, but it may be stored in a less secure environment, like an unlocked closet, making it vulnerable to theft or damage.
In contrast, data centres that host cloud systems meet rigid physical security protection as well as the highest levels of cybersecurity.
Systems like Amazon Web Services (AWS) offer AES 256 encryption, the same standard used by the National Security Agency (NSA), making data far more secure.
With robust encryption and stringent access controls, Verkada cloud systems, hosted in AWS, surpass the security of their on-premise counterparts. Data security and privacy are a priority for Verkada.
Because they own and manage their tech stack end-to-end, they can offer customers a seamless experience and importantly, a more secure environment thanks to automatic software and firmware upgrades.
Resiliency is another issue where cloud systems are advantageous. If an on-premise building burns down, for example, the data is lost.
Cloud providers, however, are able to recover data quickly and maintain its accessibility, integrity and availability even if an entire data centre were to be destroyed.
There’s a perception that cloud-based security solutions come with a steep price tag when compared to traditional systems.
However, customers often focus on the upfront cost of hardware without considering the long-term expenses of maintaining multiple systems.
By consolidating into a single cloud system, costs associated with maintenance, hardware failures and system upgrades are reduced.
Moreover, cloud solutions are scalable, allowing businesses to expand without the need for significant infrastructure investments.
The price of a traditional security camera may seem low until one considers all the elements required to make the camera function, such as a network video recorder (NVR), storage discs, maintenance costs and/or an analytics software package.
A cloud-based camera system – such as Verkada – might seem more expensive at first glance, but the total cost of ownership (TCO) is ultimately lower, especially considering the automatic product updates, lack of maintenance costs and 10-year warranty.
Another misconception is that migrating existing systems to the cloud will be too difficult or incompatible with current hardware.
That’s not true and many cloud providers offer options to allow for the integration of legacy systems with modern cloud architectures.
Anderson highlighted: “We typically recommend starting with a location where there’s older or failing equipment, then phasing in new deployments to prove the system’s efficiency.
“From there, the migration process becomes much smoother.” With APIs and adaptable platforms, cloud solutions can work alongside existing systems, reducing the need for a complete overhaul.
The idea that cloud-based systems are not compatible or cannot integrate with existing tools is also outdated.
“Cloud systems today are built to be interoperable” articulated Anderson.
In fact, modern cloud systems often come with built-in support for third-party systems, such as cameras and access control devices.
This flexibility enables organisations to integrate their current hardware with cloud solutions, allowing for smoother transitions.
The Verkada Integrated Partner programs ensure that Verkada’s systems work well with third party systems such as those from HiveWatch, Singlewire Software and SureView.
Some security professionals mistakenly believe that cloud systems cannot handle the demands of large-scale enterprises.
Fortunately, modern cloud platforms are built for scalability and enterprise-grade cloud security solutions are designed with bandwidth efficiency in mind, so they can handle thousands of cameras or access points with minimal data consumption.
A cloud-native hybrid system combines both on-device video storage and AWS cloud processing.
Up to a year’s worth of standard quality video storage is provided at the edge in the camera.
When motion is detected, “adaptive quality recording” saves high-quality footage to onboard solid-state media.
At other times, video is recorded at standard quality for the specified retention time, with onboard storage also reserved for analytics data and other system files.
Data is shared as needed with the cloud system, but bandwidth requirements are minimal, ensuring scalability for enterprise customers.
Bandwidth issues continue to concern some new customers to cloud systems, but carefully managing edge-based storage solves the problem, ratcheting back the amount of data that goes to the cloud.
Another prevalent misunderstanding is that cloud-based systems lock customers into long-term, inflexible contracts, making it difficult to change providers down the line.
However, APIs and partnerships with integrators mitigate the risk of lock-in. Customers retain control over their data and systems.
They can integrate with third-party platforms or even export their data, ensuring they are not held hostage by a single vendor.
Furthermore, many cloud providers offer open standards that prevent lock-in, giving customers the freedom to evolve their systems as needed.
Cloud-based security solutions are not just the future – they are the present.
As more businesses embrace digital transformation, the need for scalable, secure and cost-effective solutions grows.
While misconceptions about cloud systems persist, the reality is that they offer superior security, better integration capabilities and lower long-term costs compared to traditional systems.
Anderson finalised: “It’s about educating customers on the benefits of the cloud.
“Once they see the potential, they realise that moving to the cloud isn’t just an option – it’s the best choice.”