Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Newswire

Bob Beliles Exclusive Blog from ASIS – Day Two: Hosted Services More than Just Outsourcing

October 13, 2010

In my continuing three-day ASIS exhibit floor mission to find products that are and will be impactful, I have come across several vendors that are leveraging proven technology from the IT world to address various security challenges.  Yesterday, I focused on virtualization. Today, it is all about hosted services. Based on discussions with vendors and integrators alike, my guess is that you are going to see more vendors and integrators jumping on board this bandwagon and end users will welcome the move.

Hosted services are a bit of a twist on a couple of older business / technology models. A key component of hosted services is the software application itself, which you may hear referred to as “software as a service.”  For physical security, that could be video surveillance, access control, video content analysis (video analytics) or mass notification.  This software is typically deployed in some remote location under the control of the hosted services provider and is not situated on the customer / user’s premises.  Since these physical security applications typically interact with hardware, physical security hosted services may also have a hardware component which is deployed at the customer’s location to ensure security functions can continue to operate in the event of a wide area network connection failure.  

In addition to maintaining the software, you will frequently find that hosted service providers also support off-premises application memory, data storage, and a web-server.  The hosted services provider also has network security mechanisms to protect the physical security software, memory, storage as well as the security information itself.  As you might infer, this frees the customer from maintenance tasks (operating system and application updates, security / virus protection and remediation), thereby reducing operation and configuration complexity.  Customers effectively out-source maintenance costs for a very predictable and consistent recurring fee.  Additionally, hosted services providers can allocate maintenance resources and costs for the software and hardware used by multiple customers much more effectively than the customer can support a single, non-hosted version of the software application. 

In some cases, the hosted service provider will configure the application, but in others the customer may configure and operate the hosted application. As described above, the hosted services application is available to the customer through a web interface.  Information / data generated at the customer premises is sent to the hosted software application.  Essentially, someone else (the services provider) is maintaining servers, patches, cooling and power, etc.  Customers simply run the application, and perform common tasks. 

In contrast, managed services are offered by a service provider will always handle maintenance, configuration and, to a large degree, operation.  Managed services are more akin to having someone behind the curtains, pulling all the strings.  The customer has very little control over the application.

So what vendors are offering hosted services? As I mentioned the list is growing, but you will find hosted services offered by Axis Communications (cameras), Brivo (access control), IPVision Software (video surveillance), Jemez Technology (intelligent video image reconnaissance, e.g. video analytics), and AquilaVision (mass notification).   Next Level Security Systems (video surveillance and access control) will offer their forthcoming product as a hosted service.  It should be understood that vendors may also offer traditional versions of their products as well.  Hosted services and traditional products are not mutually exclusive.  And to be fair, Axis has quietly offered software as a service to go along with their cameras for several years.  Although, they became more visible with this offering, earlier this year.  

While not necessarily the case for any of the above named vendors, systems integrators / dealers and end user system owners / operators should check to see if the hosted application provides full or limited functionality as compared to the traditional product offering.

To summarize the benefits, end security system owners / users will be able to focus more on security and less on system maintenance which is now outsourced to the manufacturer.  They will get this outsourcing benefit while also getting a consistent and predictable operations cost (e.g. a monthly bill).

It’s no wonder that IT business applications, such as Salesforce have seen phenomenal growth as a result of offering their software as a hosted application. They have a very compelling value proposition that dealers and customers really appreciate.  The same should be true for physical security applications.  All aboard!

Bob Beliles is president at B2 Convergence Consulting. Previously he was vice president of enterprise business development for Hirsch Electronics. Check out Bob's first blog from ASIS. Use link below.

 



Links

  • First Beliles Blog

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Bob Beliles Exclusive Blog from ASIS – Day Three: Integration and Plug 'N Play

    See More
  • Bob Beliles Exclusive Blog from ASIS: Virtualization Means Less Gear, Less Complexity

    See More
  • ASIS Day Two: It’s a Solutions World Ranging from U of Illinois and Arkansas School District to Courthouses

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • Optimizing Social Media from a B2B Perspective

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing