Cloud RMR Opportunities and Virtualization

Similar documents
The Path to ESS Credential & the Top Ten Transformative Technologies for Video Surveillance

Cloud Computing: Transformative Technology

What are cloud services?

SS03: Cloud RMR Opportunities for Integrators

Security at Your Fingertips.

Cloud Security Introduction and Overview

Security Issues in Cloud Computing

Cloud Services Overview

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Cloud Computing. What is Cloud Computing?

Alert Technology Group 46 Empey St, Brantford ON Office Toll Free

Why Cloud Backup Now? Ashar Baig Senior Director of Product Marketing

Clinical Trials in the Cloud: A New Paradigm?

Looking Ahead The Path to Moving Security into the Cloud

Remote Managed Services

How To Use A Network Video Recorder For Video Surveillance

CLOUD COMPUTING. A Primer

What is Cloud-Based Security? Cloud-based Security = Security Management + Cloud Computing.

Things You Need to Know About Cloud Backup

Security s Transformative Technology. October 24-25, 2013 Scottsdale, AZ. Earn up to 14 CPEs. Cloud Computing:

Scalable Network Monitoring with SDN-Based Ethernet Fabrics

Aimetis Symphony. Providing open security solutions that simplifies IP video.

Adding Cloud Solutions to Customer Contracts Robert J. Scott

Where in the Cloud are You? Session Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle)

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered

OSGi Technology and IP-Based Video Surveillance in Home Security, Access Control and Personal Care

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered

Terms and Conditions

YOUR CLOUD, YOUR WAY EXTEND YOUR I.T. TO LET INSIGHT HAPPEN ANYWHERE STEVE GARONE MAY 21, 2013

Delivering Managed Services Using Next Generation Branch Architectures

Retail Solutions. Why Tyco Security Products for Retail?

View. Select View Managed Video Services ADT

Internet of Things: What is going to change in our lives

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

What Cloud computing means in real life

Why can you trust Google?

Business Case for Virtual Managed Services

What s Best. for You? Protecting What s Important to You

Ironside Group Rational Solutions

A COST ANALYSIS OF OF OUTSOURCING SECURITY OPERATIONS CENTERS. Analysis of a global company with 500 employees in fifteen locations

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

12 Key File Sync and Share Advantages of Transporter Over Box for Enterprise

Video Security Goes to the Cloud

Cloud Computing; What is it, How long has it been here, and Where is it going?

THIS WEBCAST WILL BEGIN SHORTLY

Motive Home Solutions

What You Need to Know About Cloud Backup: Your Guide to Cost, Security, and Flexibility

Commercial Security Made Simple with Cloud Video Surveillance

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients

Hosted Video in Cloud Computing

Game Changing Trends and Technologies for Video Surveillance

Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations

Cloud Computing, Virtualization & Green IT

How To Improve Your Business

BANKING AND FINANCE. Advanced technology solutions to maximize the security of financial institutions and branch banks.

The transformation of client device and the rise of cloud computing

Integrated Physical Security and Incident Management

Partnering for Success in Market Transition

2011 Morrison & Foerster LLP All Rights Reserved mofo.com. Risk, Governance and Negotiation in the Cloud: Capture Benefits and Reduce Risks

Exploring Converged Access of IT Security and Building Access Today, Tomorrow and the Future

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Case Study. Highly Available, Fault Tolerant Cloud Solution & AWS Managed Support. Case Study. A Telehealthcare Company

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

The Cloud at 30,000 feet. Art Ridgway Scripps Media Inc. Managing Director Newspaper IT Operations

A Vendor s Journey to SaaS & the Cloud

YOUR INTERACTIVE SECURITY

(877) (4-ELITE-2)

Enabling Manufacturing Transformation in a Connected World. John Shewchuk Technical Fellow DX

Think Remote Monitoring Think Concept Pro Think VXM4B

3 rd Party Vendor Risk Management

Deploying VSaaS and Hosted Solutions Using CompleteView

Door Access Solution

Cloud Computing and Mobility

Insert Partner logo here. Financial Mobility Balancing Security and Success

White paper 200 Camera Surveillance Video Vault Solution Powered by Fujitsu

John Essner, CISO Office of Information Technology State of New Jersey

STANLEY SECURITY. Jim Cannon. President, STANLEY Security 2015 INVESTOR DAY

Secure Cloud Computing Concepts Supporting Big Data in Healthcare. Ryan D. Pehrson Director, Solutions & Architecture Integrated Data Storage, LLC

The Keys to the Cloud: The Essentials of Cloud Contracting

Introduction to Cloud Computing

Allison Stanton, Director of E-Discovery U.S. Department of Justice, Civil Division. U.S. Department of Agriculture

Transition from VAR to MSP. A Publication of the CA Service Provider Center of Excellence

Anatomy of a Cloud Computing Data Breach

Device-centric Code is deployed to individual devices, mostly preprovisioned

Agenda 3/7/ ERM Symposium March 14 16, Continuous Controls Monitoring. I. Changes In Corporate Environment

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

Data Storage for Video Surveillance

12 Security Camera System Best Practices - Cyber Safe

The ABCs of DaaS. Enabling Data as a Service for Application Delivery, Business Intelligence, and Compliance Reporting.

Business Intelligence Competency Partners

Luis Melo Head of CRM/CX. Capventis. Policy Automation. Knowledge Management. Field Service Management. Web Customer Service

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform

The Physical Security Business 2015 to 2020

B2B Cloud Services. Transforming the B2B Integration Landscape IBM Corporation

Virtual Law Practice and the Online Delivery of Legal Services

Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World

Cloud Computing are you ready?

White paper. Axis Video Analytics. Enhancing video surveillance efficiency

ITSM in the Cloud. An Overview of Why IT Service Management is Critical to The Cloud. Presented By: Rick Leopoldi RL Information Consulting LLC

Transcription:

Cloud RMR Opportunities and Virtualization Steve Surfaro Axis Communications Eric J. Pritchard, Esquire KLEINBARD BELL & BRECKER LLP

Agenda Evolution, not Revolution! The Consumers/Brokers/Providers Technology Cloud Security safe enough?

Partner Mobile Synergy VSaaS Evolution Elastic Virtualization Always Hosted Managed Scalable Secure Assets Platform AVHS Personal Leverage Ubiquitous Network Service Synopsis Data Global Architecture Server Cloud Binding Storage SLA Content Multimedia Connect CoLo Adopt NAP Security Remote TCO Adopt Access Renew Provider Solution Efficient Video Intelligence Analysis Content Logical License Adoption Stability Bandwidth Connectivity Profile Analytics Analysis Certificate Credential RSA Manage Computing RMR Outsource Competency Internet VOIP SAS70 RMR Verification Provider SLA Support Variable Recurring API Online Discovery

The Road to Hosted Solutions The Solution User Service Resellers Service Providers Central Station Automation Solution Provider Cloud Application Storage and Computing Infrastructure Devices Design and deployment of video monitoring services Hosting services System setup Storage Maintenance ISP Security

Key Trends Federal Gov. Cloud First Policy Cloud Computing Act of 2011 Network Storage (incl. Cloud) will account for 30% of global video surveillance storage revenues by 2013 Large installed base of DVR appliances require upgrade or removal many end users are now refusing to replace aging DVRs with newer versions 80% of apps delivered as a service by 2014 Mobile Devices are best served by the Cloud

Top Docs in Virtualization Cloud First Policy by Federal CIO Cloud Computing Act of 2011 CSAA Dispatch Issue spring 2011: ROI Study Part I Cloud Computing Use Cases WP Brookings Report: Steps to Improve Cloud Computing in the Public Sector NIST Definitions/Cloud Taxonomy

Understanding the Roles Cloud Provider Hired by Central Station Owner/Operator Cloud Broker Reseller of Alarm Systems and PhySec Systems Cloud Consumer Anyone using the Cloud Provider s Services

Managed Services and the Central Station

Traditional

Managed Services

Outsourced

ROI Considerations for SP vs Broker

Physical Security Cloud Applications Physical Access Control Visitor Management Managed Video as a Service Identity Management Intercommunication/Mass Notification/Emergency Comm Storage/Backup/Lifecycle Management/Upgrade Activity Tracking/Security Force Management Video Content Analysis Business Intelligence Network Device Provisioning and Monitoring

Education and Healthcare Enhanced emergency response - instantly accessible pre-event video Telehealth Remote lock-down Parental live look-in Educator and care giver improvement programs

Public Infrastructure Unmanned entrances and parking facilities Intersections and highways Airports, bus station, and train stations Record management and access Controlled substance access and distribution

Supply Chain / Distribution Small Data Centers Operations Mgt ~ Shrink reduction Safety Remote Entry and Physical Access Deliveries

Residential Residential Latch-key child access Remote parental control Remote real estate Intruder verification

Quick Serve, C-Store & Retail Customer experience improvements Understanding transaction speed, frequency, and customer behavior/response Loss Prevention Panic button look-in

Quick Serve, C-Store & Retail (Cont d) Snapshot of business in store/drive-thru How are the promotions going? Did the daily delivery show up? Is the local cash protected? (cash drawers and storage) Open/Close times; video verification of your operation No DVR to steal or confiscate in the event of a crime

Corporate/Property Management Visitor management Critical infrastructure monitoring Opportunity to easily deploy tenant video systems Reduce liability since tenants self monitor

Guard Force Automation Remote monitoring leads to better manpower distribution End user can watch and spot check security forces in action, from anywhere Quick deployment of video solution for event monitoring Force multiplier

Technology Example Hosted Video

View 24 hrs in 2 minutes: Video Synopsis in the Cloud

Hosted Video Solution Deployment Security Device Installation Camera w/ motion detection Camera w/ input monitoring Camera w/ motion detection Local Storage

Hosted Video Solution Deployment (Cont d.) Internet Connection Local Storage

Hosted Video Solution Deployment (Cont d.) Server Search Activation

Hosted Video Solution Deployment (Cont d.) Connection to Provisioning / Dispatching Service Dispatch Service Local Storage

Hosted Video Solution Deployment (Cont d.) Camera Registration Dispatch Service Local Storage

Hosted Video Solution Deployment (Cont d.) Camera Registration Dispatch Service Local Storage

Hosted Video Solution Deployment (Cont d.) Dispatch Service HD Recording to Network Attached Storage (NAS) Recording resolution may be different than Cloud Local Storage

No Infrastructure? No problem:

Next Steps The fast start to profit from RMR opportunties

Opportunity Quick deploy through SP partnership Private label website the white label Pre-provisioned small systems Sell the zero install; reduce capital intensive deployments Partner with ISP Deploy in verticals where there is already a sales force

Cloud Computing Security as a Service Presented by Eric J. Pritchard, Esquire One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, PA 19103 215.568.2000 epritchard@kleinbard.com Kleinbard Bell & Brecker, LLP

DISCLAIMER THIS IS NOT INTENDED AS LEGAL ADVICE! CONSULT AN ATTORNEY! Any advice in this presentation is not intended or written to be used and cannot be used by the recipient for the purpose of avoiding penalties that may be imposed. Views expressed herein are solely those of presented and should not be attributed to Kleinbard, any client of Kleinbard or CSAA.

Privacy and Security Challenges Public Interface Information Sensitivity Many with Access to Information Legal Compliance Can be Difficult

Impacts on Security Compliance Encryption Identity Management Vulnerability Testing Data Retention and Destruction Security Controls

Survey of PUBLIC Laws Cloud Computing Act 2011 Federal Privacy Laws State Privacy Laws Foreign Laws

Survey of PRIVATE Laws Scope of Cloud Services Being Provided Scope of Information Protected Definition of Security Restrictions of Use and Disclosure Audit Rights Security Breach Access to Information

ALLOCATION OF RISK Indemnification Insurance Limitation of Liability Legal Compliance