SECOM Investment in Eagle Eye Networks and Brivo Underscores the Future of Cloud Physical Security
Cloud-based physical security is gaining importance as a significant trend in the evolving landscape of cybersecurity. The recent primary equity investment of $192 million by SECOM, one of the largest security integration companies in the world, in two independent companies, the global cloud video surveillance leader Eagle Eye Networks and the cloud-based access control leader Brivo, reaffirms the future of cloud physical security. This is a historic investment that demonstrates the confidence of SECOM in the cloud and artificial intelligence (AI) as the future of physical security.
Implications
The investment underscores that cloud and AI are the future of physical security and will enable the companies to leverage AI and cloud capabilities that can significantly improve the security of enterprises and businesses worldwide. Jointly, Eagle Eye and Brivo can deliver real-time AI-enabled video and access control events analysis, optimizing safety and security for enterprises and commercial buildings.
As independent and open platform companies, Eagle Eye Networks and Brivo integrate with many third-party technology providers, such as property management and Proptech platforms, delivering choice, efficiencies, and innovation. This investment will accelerate the growth of the companies and provide more choice and innovative solutions to customers globally.
Editorial
The cloud and AI are transforming the physical security industry that has traditionally relied on physical security personnel to monitor the premises and respond to security threats. The investment by SECOM, a pioneer in Japan’s security services industry, shows that the physical security sector is evolving and adapting to the changing landscape of cybersecurity. The partnership with Eagle Eye Networks and Brivo is the beginning of a new era for the security sector that will offer new solutions that can significantly improve the security posture of enterprises and commercial buildings.
Moreover, the cloud and AI offer several advantages that the traditional physical security system cannot offer. Cloud computing provides an unlimited capacity to store and process data and delivers scalable solutions that can adapt to businesses’ changing security requirements. In addition, AI provides more accurate and efficient analysis of security data, enabling quick responses to security incidents, improving risk management, and reducing the workload of physical security personnel.
However, cloud security concerns are a significant factor that enterprises and businesses need to consider when moving to the cloud. Data breaches, cyber-attacks, and insider threats are serious concerns that can result in significant financial and reputational loss to organizations. Thus, it is essential to follow best practices in cloud security, such as implementing strong access controls, encrypting data, deploying intrusion detection and prevention systems, and conducting regular security audits.
Advice
Enterprises and commercial buildings need to consider the advantages of cloud physical security and evaluate their security needs before moving to the cloud. They should select cloud service providers that meet their security requirements, and ensure that their data is encrypted, access controls are strong, and the vendor has proper cyber security measures in place.
Moreover, businesses must implement a comprehensive security framework that covers all aspects of cybersecurity, including cloud security. They should conduct regular security audits and ensure that their employees are trained on security best practices. Finally, businesses should work with security experts who can help them formulate and implement a security strategy that provides end-to-end protection against cyber threats.
<< photo by Jez Timms >>
You might want to read !
- “Is Your Smart Home Really Safe? Belkin Wemo Smart Plugs Suffer Major Security Flaw”
- Lacroix Shuts Down Manufacturing Facilities After Cyberattack Rattles Operations
- Lancefly APT: Examining the Long-Running Cyber Espionage Campaign Against Asian Government Organizations
- KeePass Users at Risk: PoC Tool Exploits Unpatched Vulnerability to Retrieve Master Passwords
- The Dangerous Rise of Cryptojacking Gangs: Oracle WebLogic Flaw Exploited to Hijack Servers for Cryptocurrency Mining
- Microsoft Teams’ Security Features Under Scrutiny As Cyberattacks Increase