Cloud-based access control solutions are growing very fast for one to eight doors

Installers and integrators still have questions about cloud-based services, so we asked Service Manager Michael Troiani of Idesco Corp. in New York City for his input.

SourceSecurity.com: What is your opinion of the security of cloud-based services?

Troiani: Cloud-based computing is here and is heavily marketed as a revolution in the security industry. Like any other service, cyber-security can always be improved in the cloud. The continued trend to SaaS (Software as a Service) means there must be more complex encryption for cloud-based applications. Over the next few years you will see more and more investments being made in the security area of cloud-based services, as they clearly offer the best opportunity for growth.

SourceSecurity.com: How is the physical security industry adapting to newer cloud-based technologies/products?

Troiani: The security market in general is slower to adapt to any newer technology. There are consultants and customers who have stayed with solutions that have proven solid if not spectacular in terms of results and reliability. However, hosted access control and video eliminate the costs of local servers, software and maintenance. Customers also get additional built-in features with automatic software updates, along with the ability to use application programming interfaces (APIs) as opposed to purchasing expensive system add-ons. Cloud-based access control solutions are growing very fast for one to eight doors, as they are affordable and can be deployed faster than traditional access control.

SourceSecurity.com: Has Idesco adopted any cloud services recently?

Troiani: Idesco invested in a cloud-based service module in December 2007. It’s amazing that it has been seven years already. My previous job with a publishing company provided me with a solid base of technical knowledge and experience, and when the opportunity presented itself for me to run the service department at Idesco, I thought: “If we had success at my previous location with these technologies, why can’t it work here?” We started slowly, only offering this new service to our contract customers. However as we grew with the product, it has become one of our main talking points in promoting what we do.

Idesco’s success as a company depends upon not only keeping our customers’ facilities safe and secure
Service Manager Michael Troiani of Idesco Corp.

I firmly believe it brings tremendous value to our customer base. Customers hated leaving voicemails when they had a service issue or needed assistance. With our cloud-based service module, service calls can be scheduled and acknowledged, and a technician dispatched within seconds. We have a convenient product, are maximising our time in the field, and our technicians have the ability to get customers to sign off on work on their tablets and smartphones which leads to faster billing. Recently our Project Management team has started working with Smartsheet to better track our projects and procedures.

SourceSecurity.com: Is the customer information safe with these cloud-based systems?

Troiani: Idesco’s success as a company depends upon not only keeping our customers’ facilities safe and secure, but also protecting their data at all times. We value our customers’ business and are committed to protecting their security and privacy.

The servers are hosted in Rackspace, a leading managed-hosting provider that is trusted by some of the biggest companies. Rackspace offers a 100 percent Network Uptime Guarantee and is respected as one of the leaders in managed hosting, with data backed up multiple times daily. In addition to built-in secure login capabilities, our service module also includes the ability to secure information with the same SSL encryption technologies used by online banking and ecommerce sites.

SourceSecurity.com: What can we expect in the future as far as technologies to boost cloud security even more?

Troiani: At Idesco, we want to constantly offer customers best-in-breed products. Generally with cloud-based technology (outside and inside the security space), it seems to have endless possibilities in terms of growth potential. In 2015, the cloud-based security market is estimated to be worth about $3 billion. The top most sought-after cloud security services moving forward will be email security, web security services and identity and access management. With more organisations gaining more experience with SaaS, interest in cloud-based security will only continue to trend upward.

Download PDF version Download PDF version

Author profile

Deborah O'Mara Owner, DLO Communications

Deborah L. O’Mara, SourceSecurity.com's dealer/integrator correspondent, is a veteran of the security marketplace, having extensive experience in security, fire alarm technology and integrated systems.

In case you missed it

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

ASSA ABLOY's mobile unlocking innovation wins award
ASSA ABLOY's mobile unlocking innovation wins award

ASSA ABLOY’s innovative new mobile access solution has won yet another prestigious industry award. At October’s Detektor International Awards, ABLOY CUMULUS received t...

Milestone enhances Care Plus with XProtect remote manager
Milestone enhances Care Plus with XProtect remote manager

Milestone Systems, a global provider of open-platform video management software (VMS), announced the release of the R2 2024 update to its XProtect platform.  This release int...

Quick poll
What's the primary benefit of integrating access control with video surveillance?