Cloud RMR Opportunities and Virtualization Steve Surfaro Axis Communications Eric J. Pritchard, Esquire KLEINBARD BELL & BRECKER LLP
Agenda Evolution, not Revolution! The Consumers/Brokers/Providers Technology Cloud Security safe enough?
Partner Mobile Synergy VSaaS Evolution Elastic Virtualization Always Hosted Managed Scalable Secure Assets Platform AVHS Personal Leverage Ubiquitous Network Service Synopsis Data Global Architecture Server Cloud Binding Storage SLA Content Multimedia Connect CoLo Adopt NAP Security Remote TCO Adopt Access Renew Provider Solution Efficient Video Intelligence Analysis Content Logical License Adoption Stability Bandwidth Connectivity Profile Analytics Analysis Certificate Credential RSA Manage Computing RMR Outsource Competency Internet VOIP SAS70 RMR Verification Provider SLA Support Variable Recurring API Online Discovery
The Road to Hosted Solutions The Solution User Service Resellers Service Providers Central Station Automation Solution Provider Cloud Application Storage and Computing Infrastructure Devices Design and deployment of video monitoring services Hosting services System setup Storage Maintenance ISP Security
Key Trends Federal Gov. Cloud First Policy Cloud Computing Act of 2011 Network Storage (incl. Cloud) will account for 30% of global video surveillance storage revenues by 2013 Large installed base of DVR appliances require upgrade or removal many end users are now refusing to replace aging DVRs with newer versions 80% of apps delivered as a service by 2014 Mobile Devices are best served by the Cloud
Top Docs in Virtualization Cloud First Policy by Federal CIO Cloud Computing Act of 2011 CSAA Dispatch Issue spring 2011: ROI Study Part I Cloud Computing Use Cases WP Brookings Report: Steps to Improve Cloud Computing in the Public Sector NIST Definitions/Cloud Taxonomy
Understanding the Roles Cloud Provider Hired by Central Station Owner/Operator Cloud Broker Reseller of Alarm Systems and PhySec Systems Cloud Consumer Anyone using the Cloud Provider s Services
Managed Services and the Central Station
Traditional
Managed Services
Outsourced
ROI Considerations for SP vs Broker
Physical Security Cloud Applications Physical Access Control Visitor Management Managed Video as a Service Identity Management Intercommunication/Mass Notification/Emergency Comm Storage/Backup/Lifecycle Management/Upgrade Activity Tracking/Security Force Management Video Content Analysis Business Intelligence Network Device Provisioning and Monitoring
Education and Healthcare Enhanced emergency response - instantly accessible pre-event video Telehealth Remote lock-down Parental live look-in Educator and care giver improvement programs
Public Infrastructure Unmanned entrances and parking facilities Intersections and highways Airports, bus station, and train stations Record management and access Controlled substance access and distribution
Supply Chain / Distribution Small Data Centers Operations Mgt ~ Shrink reduction Safety Remote Entry and Physical Access Deliveries
Residential Residential Latch-key child access Remote parental control Remote real estate Intruder verification
Quick Serve, C-Store & Retail Customer experience improvements Understanding transaction speed, frequency, and customer behavior/response Loss Prevention Panic button look-in
Quick Serve, C-Store & Retail (Cont d) Snapshot of business in store/drive-thru How are the promotions going? Did the daily delivery show up? Is the local cash protected? (cash drawers and storage) Open/Close times; video verification of your operation No DVR to steal or confiscate in the event of a crime
Corporate/Property Management Visitor management Critical infrastructure monitoring Opportunity to easily deploy tenant video systems Reduce liability since tenants self monitor
Guard Force Automation Remote monitoring leads to better manpower distribution End user can watch and spot check security forces in action, from anywhere Quick deployment of video solution for event monitoring Force multiplier
Technology Example Hosted Video
View 24 hrs in 2 minutes: Video Synopsis in the Cloud
Hosted Video Solution Deployment Security Device Installation Camera w/ motion detection Camera w/ input monitoring Camera w/ motion detection Local Storage
Hosted Video Solution Deployment (Cont d.) Internet Connection Local Storage
Hosted Video Solution Deployment (Cont d.) Server Search Activation
Hosted Video Solution Deployment (Cont d.) Connection to Provisioning / Dispatching Service Dispatch Service Local Storage
Hosted Video Solution Deployment (Cont d.) Camera Registration Dispatch Service Local Storage
Hosted Video Solution Deployment (Cont d.) Camera Registration Dispatch Service Local Storage
Hosted Video Solution Deployment (Cont d.) Dispatch Service HD Recording to Network Attached Storage (NAS) Recording resolution may be different than Cloud Local Storage
No Infrastructure? No problem:
Next Steps The fast start to profit from RMR opportunties
Opportunity Quick deploy through SP partnership Private label website the white label Pre-provisioned small systems Sell the zero install; reduce capital intensive deployments Partner with ISP Deploy in verticals where there is already a sales force
Cloud Computing Security as a Service Presented by Eric J. Pritchard, Esquire One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, PA 19103 215.568.2000 epritchard@kleinbard.com Kleinbard Bell & Brecker, LLP
DISCLAIMER THIS IS NOT INTENDED AS LEGAL ADVICE! CONSULT AN ATTORNEY! Any advice in this presentation is not intended or written to be used and cannot be used by the recipient for the purpose of avoiding penalties that may be imposed. Views expressed herein are solely those of presented and should not be attributed to Kleinbard, any client of Kleinbard or CSAA.
Privacy and Security Challenges Public Interface Information Sensitivity Many with Access to Information Legal Compliance Can be Difficult
Impacts on Security Compliance Encryption Identity Management Vulnerability Testing Data Retention and Destruction Security Controls
Survey of PUBLIC Laws Cloud Computing Act 2011 Federal Privacy Laws State Privacy Laws Foreign Laws
Survey of PRIVATE Laws Scope of Cloud Services Being Provided Scope of Information Protected Definition of Security Restrictions of Use and Disclosure Audit Rights Security Breach Access to Information
ALLOCATION OF RISK Indemnification Insurance Limitation of Liability Legal Compliance