CraftWall
FeaturesUse casesComparisonPricingTCO calculatorFAQRequirements
Request a demo →
← Home · Articles

Technical · 12 min read

Hybrid cloud video walls: the metadata-in-cloud, pixels-on-prem pattern

Last updated: 2026-05-15

Around 2022-2023 several video wall vendors bet on a cloud-managed future — the wall configuration, the source routing, sometimes the video itself, all running through a SaaS control plane. By 2026 that bet has a clear verdict: cloud-only failed the compliance review in every regulated industry it tried to enter. What survived, and what is now the default architecture, is the hybrid pattern. This article lays out what goes in the cloud, what stays on-prem, and why the split is not a compromise but the correct design.

Why cloud-only video wall management failed

The cloud-only pitch was attractive on paper: manage every wall across every site from one browser, push updates centrally, no on-prem server to maintain. The problem is that a video wall in a control room, NOC, or SOC carries content that regulators do not allow to leave the building.

A NOC wall shows live network topology and customer-impacting fault data. A SOC wall shows live security-camera feeds and SIEM alerts. A utility control room shows SCADA telemetry from critical infrastructure. Routing any of that through a third-party cloud — even just as a control signal that implies the underlying data — triggers a compliance review that cloud-only architectures cannot pass.

The four compliance walls

  • GDPR (EU). Live camera feeds containing identifiable individuals are personal data under Article 4(1). Processing that data via a control plane hosted outside the EU — or by a US-headquartered cloud provider subject to the US CLOUD Act — requires Schrems-II-grade safeguards most facilities cannot establish.
  • FZ-152 and FZ-187 (Russia). Personal-data localisation requires Russian citizens' data to be processed on servers in Russia. FZ-187 adds critical-information-infrastructure rules — energy, transport, finance, government operations must keep the operational layer in-country and often air-gapped.
  • FedRAMP and DoD impact levels (US federal). A video wall in a federal facility handling controlled or classified information cannot route through a commercial SaaS control plane without an authorisation that the procurement team almost never obtains.
  • BSI C5 (Germany). The German federal cloud-security criteria catalogue sets a bar that most general-purpose SaaS control planes do not meet, pushing German public-sector deployments toward on-prem or sovereign-cloud designs.

Any one of these is enough to disqualify a cloud-only video wall from a regulated deployment. In practice most large control-room buyers face at least one.

The hybrid pattern — what goes where

The hybrid architecture splits the system along a clean line: the control plane can live in the cloud; the data plane stays on-prem. Mersive articulated this split early and it is now the category default.

What can live in the cloud

  • The management UI itself — the browser application an administrator uses to configure walls, hosted as a SaaS app
  • Configuration metadata — layout definitions, named scenes, user accounts and permissions, source catalogues (the address of a source, not its content)
  • Fleet telemetry — which walls are online, software versions, health status across sites
  • Audit logs — the record of who changed what, when (the metadata of changes, not the content shown)

What must stay on-prem

  • The video itself — every pixel of every source feed. Camera streams, dashboard renders, KVM sessions never leave the local network
  • The compositor — the engine that lays sources onto the wall runs on the on-prem server, next to the displays it drives
  • Source ingestion — NDI, RTSP, IPMX, KVM endpoints connect to the on-prem server, not to a cloud endpoint
  • The fallback path — if the cloud control plane is unreachable, the on-prem server must keep the wall running with its last known configuration. The wall cannot depend on cloud connectivity to display.

The control plane in the cloud

The value the cloud control plane genuinely delivers, once the data plane is correctly kept local:

  • Multi-site management — one interface for a NOC operator managing walls across a dozen facilities
  • Centralised configuration rollout — push a new named scene to every site at once
  • Fleet visibility — health and version status across the estate without touching each server

The constraint that makes this safe: the control plane handles addresses and definitions, never content. A cloud control plane that says "put the source at 10.20.30.40 into tile 3" is compliant. A cloud control plane that relays the video from 10.20.30.40 is not. The architecture has to enforce that line, not just document it.

The video plane on-prem

The on-prem server does the work that cannot leave the building: ingests every source, runs the compositor, drives the displays, and holds a complete local copy of the configuration so it survives a cloud outage. For a regulated deployment, the on-prem server is also the air-gap boundary — it can run with no outbound internet at all, with the cloud control plane simply unavailable and the wall managed locally.

This is the test for any vendor claiming "hybrid": unplug the internet, and the wall must keep running and stay locally manageable. If the wall degrades or the management UI becomes unreachable, the architecture is cloud-dependent, not hybrid.

KVM in the hybrid model

IP-KVM is the case where the on-prem boundary matters most. A KVM session is an operator taking live control of a source computer — the most sensitive traffic on the wall. In a hybrid architecture, the KVM session is strictly on-prem: the cloud control plane may know that a KVM route exists and who is authorised to use it, but the keyboard, video, and mouse traffic flows entirely on the local network. Any vendor whose KVM path touches the cloud has not built a compliant hybrid system.

Where Craft Wall fits

Craft Wall is on-prem-first by design. The compositor, source ingestion, and the complete configuration run on a commodity Linux server inside the facility. The browser-based control UI is served from that same on-prem server by default — which means the baseline deployment is the air-gapped case, with no cloud dependency at all.

A cloud control plane is the optional layer on top, for buyers who run multiple sites and want centralised management — and it follows the strict split above: metadata and management only, never video, with the on-prem server fully functional if the cloud layer is removed. For a regulated deployment the cloud layer is simply not enabled. See the NOC reference architecture for the on-prem design and the eight-platform comparison for how vendors differ on the cloud-dependency question — it is one of the sharper dividing lines in the category.

Closing

The cloud-only video wall was a reasonable bet that the compliance environment killed. Hybrid is not a half-measure — it is the correct architecture: the cloud does what the cloud is good at (multi-site management, centralised rollout) and the on-prem layer does what regulation requires (every pixel stays in the building). The buyer's test is simple and physical: unplug the internet, and the wall keeps working. If it does, the architecture is hybrid. If it does not, it is cloud-dependent wearing a hybrid label.

Read next: the NOC reference architecture for the on-prem design, AI-augmented video walls for why on-prem inference follows the same compliance logic, and the Craft Wall vs Userful comparison for the cloud-dependency contrast in a real evaluation.

Related reading

  • Video wall for NOC: a reference architecture for 24/7 telco operations
  • AI-augmented video walls: anomaly detection and auto-layout for NOC and SOC operations
  • IP-KVM · glossary
  • AV over IP · glossary
  • Craft Wall vs Userful Infinity Platform · comparison
  • Best video wall software in 2026: eight platforms compared honestly
CraftWall

Craft Wall — the software platform for video wall management in situation centres, NOC, control rooms and mission-critical sites.

Contact
  • +7 (499) 112-05-88
  • sales@craftwall.prosales
  • support@craftwall.prosupport
  • Request a demo →
Office
Russian Federation,
420500, Innopolis,
Universitetskaya St. 5

“N. I. Lobachevsky Technopark”
© 2026 iViTech LLC · Craft Wall
About·Comparisons·Glossary·Privacy·Terms·Imprint
craftwall.pro