Skip to content
English
  • There are no suggestions because the search field is empty.

How do I configure the Impossible Surveillance Cloud?

This guide provides a step-by-step process on how to integrate Impossible Surveillance Cloud 

Introduction

Impossible Surveillance Cloud (ISC) is a bundled offering that integrates Surveillance Bridge by Tiger Surveillance with an Impossible Cloud hot storage subscription for seamless surveillance video management and storage. Tiger Surveillance is the leading data management and protection software provider for video surveillance connecting any VMS on a local recording server with an Impossible Cloud Storage bucket. With Impossible Surveillance Cloud, you can scale your solution without the need for a disruptive overhaul, ensuring your surveillance operations remain efficient and robust.

Key Features:

  • Seamlessly transition to cloud storage for video surveillance
  • Budget-friendly scalability
  • Simple installation without disruption
  • Industry-leading performance

Step 1: Create a bucket in Impossible Cloud Console

You'll need to create a bucket in your Impossible Cloud Storage console.

Optionally, you can enable the Versioning feature for enhanced data protection.

Here is a link to the Impossible Cloud Storage documentation, which includes detailed instructions for creating a bucket with Versioning.

Step 2: Create a subuser and assign policy

 Create a subuser, create a group and a policy, add the user to the group and assign the policy allowing access to the bucket created in Step 1. Here are links to the Impossible Cloud Storage documentation with detailed instructions:

Note that the 'users' tab is only visible for root users.

Note that the 'groups' tab is only visible for root users.

Note that the 'policies' tab is only visible for root users.

Step 3: Identify VMS

Although the core engine of Surveillance Bridge remains the same, the specific configuration required may vary depending on the Video Management System (VMS) being used. Surveillance Bridge uses specific profile for every VMS it supports. It is important to select the right profile as it ensures optimal operations for each VMS. 

VMS:

  • XProtect by Milestone
  • MOBOTIX HUB by Mobotix
  • Siveillance by Siemens 
  • Velocity Vision by Identiv
  • Other

Step 4: Install and configure Surveillance Bridge

Please follow the instructions from Tiger Technology here for the installation and configuration of Surveillance Bridge. It walks you through all steps of the installation and the connection to Impossible Cloud Storage.