At ASIS, PlaSec rebrands as RedCloud

Talks benefits of private cloud and appliance technology model for facility access control


At the ASIS International tradeshow being held this week in Orlando, Fla., access control firm PlaSec has rebranded itself as RedCloud. According to Kevin Wine, vice president of marketing, the firm hired a company specialized in corporate rebranding to help them make the transition. The company's access technology, designed to link access, identity management and even video surveillance, is delivered as an appliance (product names have also been rebranded as part of the change). Also at the show, the company announced the newest version of its RedCloud Security Management Software (v3.0); this is the software that runs the company's appliances, from the basic level appliance to the enterprise model.

SecurityInfoWatch.com caught up with Wine briefly before the show to talk about the rebranding work, what exactly is the company's "secret sauce" in access control and what's next. Here's what he said:

SIW: What's behind the name RedCloud?

RC: Literally, RedCloud is a coined word derived from the word "Red" (which is closely associated with security and "Cloud" (representing the promises associated with IT convergence and cloud (specifically private cloud) computing technology). So, as the newest word in security systems, "RedCloud" is a revolutionary access control solution, engineered from the ground up by IT and security veterans to deliver a new standard in performance, integration and efficiency that can only be achieved through convergence. RedCloud's web-based, physical and virtual appliance platform leverages an open architecture, integrates identity management and video surveillance and achieves the highest level of scalability with the lowest cost of ownership, making RedCloud the logical choice in access control.

SIW: Can you explain this "private cloud" concept?

RC: Many traditional security professionals struggle with supporting mission critical systems running in a public cloud because risks associated with system availability and information protection assurance are too high. Even VMware, the global leader in virtualization states this: "Many surveys on cloud computing cite security as the most significant concern hindering the adoption of cloud computing."

Regardless, of security concerns, we all understand that pressures from management to reduce costs remain. Private cloud infrastructures are perfectly balanced to deliver reduced costs and increased agility, all while ensuring security and enabling on site control over the cloud computing environment.

Instead of a third party implementing a virtual infrastructure and collocating various companies' applications and data on the same computing grid, like what is typically done in a SaaS model, with a private cloud, the virtualization infrastructure is proprietary to the customer. An example would be a major university setting up their data center as a private cloud (a grid of servers that load balance, backup, restore, and operate applications). The internal customers simply enjoy web-based access to their mission critical applications, and they do not have to deal with the servers and backups and storage and scalability, just as they would in a public cloud scenario, yet they enjoy improved security as their data and controls remains proprietary to the university itself.

SIW: How does facility access control use a private cloud?

RC: In our case, RedCloud Virtual is the industry's first VMware Ready private cloud solution for integrated access control. RedCloud Virtual is a pre-bundled network appliance software-only system that is designed to install and run on VMware's VSphere virtual infrastructure operating system. Once installed, IT runs the entire core computing system operation while the facility access control system users configure and monitor the system through a web browser of their liking. As private cloud and virtualization is a top strategic driver for many CIOs, by moving to this model, security managers can foster a tighter relationship with IT.

This content continues onto the next page...