"Cloud computing” is a catch-all term that refers to many different technologies and business models. But they are not all created equally. Some are turnkey; others roll-your-own. Some are secure; others easily exploited. Some are publicly accessible, others highly restricted. For cloud-based physical security applications, all of these characteristics are important to consider.