Installed by experts
Installed by experts

Cloud Based Security
Protecting your applications and data

Verkada

Eagle Eye

Ava


Cloud Solution Partners

On the market at the moment are a number of key players offering different benefits. Kevin King, our Senior Security Consultant, takes a moment to review the different providers in this article below featuring a number of Video Surveillance as a Service (VSaaS) providers Check Your Security ltd. are currently dealing to give a greater insight into the products currently available.

This is by no means an exhaustive list and many of the major vendors offer a wide variety of alternatives to their existing products. Check Your Security ltd. can also offer low-cost cloud storage compatible with a range of existing systems that allow you to continue using your existing systems whilst gaining low cost, reliable and secure CCTV storage in the cloud.

Eagle Eye Networks

Read more

Collapse

Eagle Eye Networks is the global leader in cloud video surveillance, delivering cyber-secure, cloud-based video with artificial intelligence (AI) and analytics to make businesses more efficient and the world a safer place. Eagle Eye provides security and real-time business intelligence, helping organizations of all sizes and types optimize operations.

https://www.een.com

Eagle Eye networks cloud VMS seamlessly integrates with existing systems from hundreds of security partners and over 10,000 compatible cameras meaning your existing hardware investment is protected.

Eagle Eye Networks offer what they describe true cloud architecture. Applications that are cloud-native were designed to work in the cloud rather than use the cloud as an additional resource. On premise equipment are cyber security focused and include features such as:

  • Inbound internet connections NOT accepted
  • Cameras are isolated from the Internet
  • Appliances have no open network ports
  • Appliances protected against pre-installed camera malware
  • TLS connections to the Cloud VMS
  • Encryption applied to buffered and locally recorded video
  • Authentication via digital certificates


Eagle eye networks offer an array of analytic tools using unlimited cloud based processing on large amounts of data with their cloud VMS providing insight into employee behaviours, customer interactions, training and safety along with security focussed analytics detecting loitering, intrusion, line crossing and camera tampering for example.

Eagle Eye’s application programming interface (API) platform permits the building of custom video surveillance solutions and integration. There is also an open, public domain, secure, plug and play communications framework that enables video manufacturers to connect cameras, DVRs and encoders to the cloud via Eagle Eye networks.
Verkada

Read more

Collapse

Protect people, assets and privacy at scale. Trusted by over 14,000 organisations, Verkada builds physical security solutions that integrate seamlessly behind a single, cloud-based software platform.

https://www.verkada.com/uk/

CCTV

Verkada cameras are fitted with high capacity solid state drives offering a hybrid cloud solution that gives onsite storage together with enhanced cloud storage in AWS’s data centres encrypted to AES-256. Firmware updates to cameras are managed automatically out of hours to patch vulnerabilities before they become a problem.

Verkada cameras are designed to make minimal impact on the network performance of the organisations they protect.

Verkada cameras can store up to 365 days video locally and replicate this to cloud storage during off-hours to further minimize network utilisation.

Access Control

Verkada also offer Cloud based Access Control that Seamlessly Integrates with their video security products. Verkada Access Control combines enterprise grade access control with a powerful, cloud based management platform for a solution that’s always simple, secure and ready for scale.

Access Controllers work with your building’s existing door hardware and readers. Once doors are connected, they’re ready to be managed from any device using the Verkada Command platform, allowing you to easily manage building access, schedules and users.

Real time analytics and edge based processing integrated into Verkada systems means users are able to not only see what is happening at their points of entry, but also proactively take action meaningful actions for events as they happen.

Ava

Read more

Collapse

“Rethink security and bring Ava’s cloud-native video surveillance solution with full analytics and operational insights to your existing cameras and systems.”

https://www.avasecurity.com

  • Open - Integrates with existing hardware
  • Proactive security – video analytics capture events as they happen and generate real time alerts
  • Enhanced real time forensic search
  • Effective remote management – monitor access control and physical security events from any web browser or device
  • Massively scalable
  • Onsite storage options via a cloud connector appliance
  • Configurable cloud storage that allows you to categorise and prioritise video storage for example as ‘Interesting’ or ‘Uninteresting’ allowing your system to help you identify important material.
  • Smart bandwidth management to avoid overwhelming your internet connection.
  • Encrypted data storage with a key held by the client only
  • Ava Cloud Storage is hosted in partner data centres that are certified to SOC 2, ISO 27001, and Payment Card Industry Data Security Standard (PCI-DSS).
  • Ava use data centres in Amsterdam for customers within Europe
Keri Systems

Read more

Collapse

Keri Systems bring together everything that’s required to secure business assets. Manage and monitor access to your building from anywhere in the world at any time. Keri Systems’ products power access control ecosystems for commercial enterprises, residential housing, and government agencies. Protecting your employees, residents, and business assets doesn’t have to come at great expense.

Keri Systems offer a range of traditional and cloud based access control solutions that offer a range of integrations with existing on site security products.

Do you need support to develop your security strategy?

Book consultation
Article
Seven things you should know... Upgrading your Security Systems?

Seven things you should know before you start upgrading your CCTV or Access Control/Security systems


  1. Clearly understand where you are today! What you have where your problems are or have been – otherwise you won’t know if you have moved forward or even been going backwards.
  2. Choose a Partner that has a bit of vision and has a track record with some great reference sites already in place. 
  3. Speak to your peer’s get some feedback and input listen to their experiences.
  4. Modern digital systems are scalable can integrate to other systems- BMS, Intruder, Fire – integration!
  5. Compare like for like as far as systems being proposed -clearly understanding the different value propositions i.e. digital versus analogue in the case of CCTV
  6. Don’t concentrate on just one component such as cameras look for open systems that offer you maximum choice and flexibility now and in the future.
  7. All decisions should be strategic rather than just tactical - look at the medium to long term.
Read More
News
Why join the Check Your Security team? Why join our team? Check Your Security is currently in the process of relocating to a new office in the Midlands. We are also expanding our team and have several positions open for hiring, with more ...
Read More
News
AI for camera critical checks article
Read More
News
Chip shortages affect the supply of physical security products
Read More
News
CCTV bandwidth and storage requirements
Read More
News
Video Analytics and AI Today
Read More
News
Why it's good to have your head in the clouds The time is now to look at Cloud-based systems for business security applications.
Read More
Security is not about what you know it is about being prepared for what you don’t know
Clinton Button - Check Your Security Managing Director
Interested in finding out more?


If you are happy for your details to be used by Check Your Security for marketing purposes, please tick this box.
Your details won't be passed on the 3rd parties.