Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalPhysical Security

Selecting computing architecture for AI-powered video analytics

By Ash Young
surveillance camera on white wall

Image via Unsplash

October 13, 2023

Artificial intelligence (AI)-powered video analytics is all the rage. Gone are the days when human operators were responsible for overseeing the movements of visitors to shopping malls, parking garages and the like.

The main power and allure of AI-powered video analytics lies in its predictive qualities. The systems can be trained to understand how people behave normally in any setting and what possible hazardous behavior could look like. So, they can be taught how to catch someone in a school or mall who pulls out a gun. That threat then still needs to be validated by a human agent (more about that later), but the first AI-powered 'sweep' can be made to be very effective.

Companies and organizations looking to make use of the new video analytics technology find themselves having to make important choices pertaining to their setup. This is because legacy cameras that are older than 10 years will have very limited use. This outdated technology simply does not have the 4K capabilities that are needed for the efficient use of the analytics software. These cameras will need to be upgraded if they are not already 4K. That part is pretty straightforward.

Decisions become more complex when the computing architecture needed to process and store the data from the camera network comes into view. 

Centralized, on-premise servers 

Centralized on-premise servers, also called digital video recorders (DVRs), today still provide the computing power of the majority of video surveillance systems in this country. These servers come with the advantage of being able to manage and store video for up to hundreds of cameras, however, for companies looking to employ AI-powered video analytics, they fall short in their inability to provide any kind of meaningful statistical analysis, search, or AI capabilities.

This is because these systems feature many drives for storing the video, but typically, a single processor manages both the drives and the video streams. The single processor cannot process all of the video streams and still be able to apply object classification in real time to the same streams.

Public cloud 

Working through a cloud service comes with the advantage that you may have access to thousands of GPUs for faster training on collected data. However, when that cloud is public, problems can arise. By definition, the public cloud suffers from considerable latency because every piece of information has to be relayed through a secondary device, delaying the transit time of data significantly. 

This latency means that organizations will not have a significant issue storing recorded footage, but sharing real-time streams from a camera to different other points of their network will become highly problematic. That mall visitor who pulled out a gun? They are no longer walking where the streamed image indicates they are. Latency makes it impossible to manage the situation and contain the threat. The human operator who will have to make a GO/NO GO decision on escalation will be at a loss. And it will serve no purpose in streaming that image to different concerned store owners in the malls.

Public clouds also come with issues pertaining to privacy and data protection. Who will access owned data once it has left for the public cloud? Will it be shared with other parties by the cloud service provider? Will the cloud service provider secure it sufficiently against leaks? There is often very little transparency on what data and privacy protection policies are in place, and it is of course completely impossible to gauge to which degree these policies are followed.

Private cloud 

A private cloud service offers the benefits of trainability, but in a set-up where the company or individual remains in full control of its own data. Any AI-powered video analytics solution can still be trained on whatever data the video surveillance system has provided, but the company keeps a complete view of how that data is then used and stored. 

Edge computing

Through edge computing technology, companies can place processing power very close (at the “edge” of the network) to their cameras. The advantage is drastically shortened latency which makes it possible to actually manage a hazardous situation in real-time effectively. To go back to the previous example: The visitor is still carrying a gun. The mall owner can now, thanks to the edge processors, make images with very limited latency available to the human operators who need to validate the threat, and this stream of current images can be made available to whoever else has a need to know.

Edge processors are good at processing data, but are not built to store data, which means that companies that want to archive their data streams for longer periods of time, will still need storage elsewhere. That is why almost all edge computing solutions work in tandem with either a public or private “edge-to-cloud” solution.

Parenthesis: Fog computing

With fog computing, every camera is directly linked to the cloud. Allowing for the cloud to process and store data at the edge, seems good on paper, but is as yet a mere academic reality. Also, fog computing’s additional layer comes with the disadvantages of extra power consumption and tedious data management between nodes. 

Organizations will need to decide what they want to accomplish with their surveillance and what budget they have available before making a decision in favor of any (combination) of the options discussed.

KEYWORDS: cloud computing cloud security video analytics video surveillance video surveillance storage

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

A 30-year veteran of the data storage industry with leadership positions at multiple Silicon Valley tech companies, Ash Young is CEO of Cachengo.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • AI video surveillance

    Find relevant video faster with AI-powered analytics

    See More
  • SEC0421-Edu-FEAT_MAIN_1170x878px

    7 top tips for buying the best video analytics software for your business

    See More
  • man standing by video analytics wall

    Wave 2 video analytics and their security applications

    See More

Related Products

See More Products
  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

See More Products

Events

View AllSubmit An Event
  • May 22, 2012

    Cloud Security Alliance CCSK Training

    This class is geared towards security professionals, but is also useful for anyone looking to expand their knowledge of cloud security.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing