/tech-trends-everything-as-a-service/""

撸管社

 

Tech Trends: Everything as a Service

Tech Trends: Everything as a Service

It is the hottest thing going 鈥 just about every manufacturer, software platform, and service provider are figuring out how to convert their single item sales into 鈥渁s a Service鈥 recurring revenue models.

If you are considering this as a provider or an end-user, you will need to look beyond the sales pitch to see the true value 鈥 and the drawbacks 鈥 of this technology trend.

At first pass, the 鈥渁aS鈥 model can be very annoying to me as a consumer. I used to go into a store or browse online at the software available and buy it outright. If I elected to upgrade to a newer version in the future I could, but my hand was seldom forced, and the power was all mine.

Now, you are hard-pressed to find a software platform that is not offered in some type of subscription or SaaS model, and this trend is moving from the software world to hardware, systems and services. It is like you cannot 鈥渂uy鈥 anymore, only rent, but is this all bad?

The Pros and Cons
Understanding some of the pros and cons of this trend can help you understand its value, both to yourself individually and to an overall organization. While there are many aspects of the 鈥渁aS鈥 sales model, here are five considerations you should evaluate prior to making the commitment 鈥 keeping in mind that one person鈥檚 pro may be another person鈥檚 con. Thus, consider these points under your own application and circumstances.

  1. Limits expensive server hardware: When using platforms like Ava Security, Brivo, OpenEye, IronYun, etc. certain configurations of these services can be cloud-based. This can reduce or eliminate the need for on-premises servers, which are costly and have a limited lifespan.

If your customer is considering a traditional deployment of security technology, they need to consider that the servers installed on premises will come at a high cost and will need to be replaced in 5-8 years. They will also need to consider that they will likely need a Software Service Agreement (SSA) and a preventive maintenance contract to keep the system updated with patches, fixes and version releases. With an 鈥渁aS鈥 model, all of this is included.

  1. CapEx vs OpEx: While evaluating 鈥渁aS鈥 options, take into consideration how the customer will buy the technology. Many construction projects have deeper CapEx budgets to allow for the initial procurement and installation of expensive security technology; however, buying 鈥渁aS鈥 typically gets expensed through OpEx budgets and is a recurring monthly or annual expense 鈥 which can be more highly scrutinized. Having a thorough understanding of how 鈥渁aS鈥 is funded and working out the details with the end-user鈥檚 finance department is critical to resolving push-back regardless of what solution is up for consideration.
  2. Critical facilities, SOCs and uptime requirements: For facilities that operate in a critical capacity and have an on-site SOC, GSOC, or other real-time point of aggregating security information, close attention to 鈥渁aS鈥 features are mandatory. Most 鈥渁aS鈥 offerings have some or all features that are entirely dependent on outbound network connectivity; therefore, if the network fails, the security operation loses the ability to access and use the 鈥渁aS鈥 product.

When evaluating 鈥渁aS,鈥 ask your customer very pointed and hard questions about what services operate and if there are critical services that will not work in the event that outbound network connectivity is severed.

  1. Bandwidth and network: The 鈥渁aS鈥 sales pitch is typically a good one when it is well-perfected and delivered, but there are some downsides to consider, and integrators will need the end-user鈥檚 IT department or a non-biased third party like a consultant to help navigate the sales pitch and dig into the tech requirements of the network.

Having 10, 50, 100, or 1000 cameras at a facility that are going to a cloud-based 鈥渁aS鈥 will have big implications on network architecture and bandwidth. Be sure this is fully understood before making a commitment to the 鈥渁aS鈥 technology.

  1. Proprietary equipment: Some 鈥渁aS鈥 platforms openly accept cameras and edge technology from multiple manufacturers; others have cameras that can be used on other systems should you elect to stop using those systems in the future. That said, be warned that this is not the case for all 鈥渁aS鈥 providers; in fact, some providers鈥 cameras are as good as a brick should your customer stop using the 鈥渁aS鈥 platform. This could be a costly and embarrassing mistake.

Best Practices
Here are key takeaways for considering any type of 鈥渁aS鈥 model for software, systems, or services:

Thoroughly understand what your customer鈥檚 needs are before calling 鈥渁aS鈥 companies in to do a sales pitch. Not having this will distract you with sales presentation sparkles, bells, and whistles that may be great features, but can deviate from the core performance objectives required to serve the business.

Understand the points of failure in 鈥渁aS鈥 models and be willing to accept the risks they present. Knowing exactly where the points of failure are enables the integrator and end-user to build operational processes to stopgap the vulnerability should a failure occur.

Know the total cost of ownership (TCO) of both the 鈥渁aS鈥 and traditional deployment of the software, systems, and services you are evaluating.

Don鈥檛 go it alone. Bring in IT, Finance, and other key stakeholders of the business to help evaluate the solution from their areas of expertise.

Paul F. Benne is a 35-year veteran in the protective services industry. He is President of 撸管社 LLC, a security consulting and design firm in based in New York City. Connect with him at www.linkedin.com/in/paulbenne or visit www.sentinelconsulting.us.

Article Link 鈥 https://www.securityinfowatch.com/integrators/article/21278024/tech-trends-security-tech-for-nonsecurity-stakeholders

This article originally appeared in the November 2022 issue of Security Business magazine. Paul F Benne is the President of 撸管社 and has over 35 years in the protective service industry.

More from this category

Let's Talk

Contact us now for a FREE, NO OBLIGATION security consultation with an experienced protection professional. Just provide your information using the form below, or call us at 888-793-9380 and a member of our team will contact you within 24 hours.