Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Getting the Low-down on High-end Digital Video

By John Mesenbrink
May 8, 2002
What constitutes high-end digital video? Campus settings, multiple networked sites, Fortune 1000 companies or government facilities could all fall under the “high-end” digital application. The Colorado-based, Loronix, associates low-end video with low frame rates and poor compression methods, whereas high-end video can activate an alarm on behavioral recognition, for example. Features such as frame rate, compression, storage and scalability are important.

“High-end applications will tend to require very large storage capacities, advanced networking capabilities and options available to support unique integration, such as audio and data capture,” says Carl Bracken, central region sales manager, Sanyo Security Products.

Peter Wilenius, vice president and general manager of video solutions, March Networks, Ontario, Canada, points out that the return on investment (ROI) is also notable. “The ROI can be measured in reduction of travel for both service technicians and investigators, reduction in retrieval time and cost and reduction in overall cost of system for long-term storage.”

“Specific ROI calculations can get complicated and vary from installation to installation. Advantages of high-end digital recorders make return on investment for systems much higher than at first glance. Over time, the benefits from increased personnel productivity, asset and personnel protection, lawsuits not filed and the emerging advantages of video content analysis to the bottom line all combine to create a favorable return on investment,” says Jonathan Moav, director of product marketing for NICE Systems, Rutherford, N.J.

Most low-end systems are multiplexers that record either a limited number of channels (one or two) at a high frame rate, or more channels at a significantly lower frame rate (16 channels at 1-2 fps). High-end systems can accommodate a large number of channels at a high frame per second (fps) recording rate—tens of channels at 30 fps real-time, suggests Moav.

“While low-end DVR units are capable of attaining high frame rates, it is usually at the expense of the other inputs on the unit. High-end DVR, enterprise-level systems are able to attain high frame rates on all inputs simultaneously and can distribute the frame rate variably across the inputs,” says Peter Wilenius, vice president and general manager of video solutions, March Networks, Ontario, Canada.

Storage Necessities

Lower-end DVR systems tend to have a fixed limitation in the amount of storage that can be contained within the unit itself. At the higher-end, the systems tend to have a higher capacity internal the unit and also have the ability to connect to large external storage devices, says Wilenius.

Transferring video locally to CD-RW or similar media sparks visions of the VHS dark ages. According to Wilenius, the best solution today is to keep the video stored at the remote site on high availability RAID disk arrays.

Current HDD (hard disk drive) technology is rapidly advancing total available storage capacities, as well as disk performance and reliability. Current HD’s form the backbone of the primary storage found in virtually all-industrial DVR’s currently on the market. Optical media, such as CD-R/RW, DVR-R, DVD-RAM, currently lack the capacity to match the storage found on the typical DVR internal disk array. Tape-based archival solutions such as DAT, can match up to some of the smaller DVR capacities, however, tape-based back-up options can present a challenge due to the time required to archive a large storage volume. In addition, tape-based archival typically requires a full-restore process in order to review the stored image data. Network-based storage solutions can be a viable solution for an application demanding large amounts of archive capacity. Considerations to available network bandwidth, and specific DVR support of network-based storage will factor in to the application of network-based archival, says Bracken.

System Scalability

“Low-end DVRs are usually stand-alone, off-the-shelf systems. The high-end systems are typically constructed to meet exact specifications and can be integrated with other security applications such as access control, fire and various other alarms and databases,” says Moav.

“With a networked digital video system, integration with existing databases, such as financial institutions or even an access control system, becomes a reality. The ability to associate video with existing data, and search based on that data, provides additional benefits to customers,” says Wilenius. And these units are configurable and maintainable from a central location.

Compression Schemes

“When talking about weeks of storage, you want a system that is capable of archiving gigabytes of video with the best compression technologies available,” says Jon Williamson, product marketing manager, Andover Controls, Andover, Mass. The best compression method to select is one that will allow the user to tune the system to best meet their needs. Cost of storage is significantly higher if the video is compressed using a less sophisticated algorithm. With compression algorithms used in high-end systems, the video data is compressed more efficiently taking up less storage for the same time period.

The user must first decide the main function of the DVR; remote monitoring with video transmission or local recording. If used primarily for remote monitoring, the compression algorithms must be tuned to best utilize the network bandwidth available so the remote operator can get the best image at a manageable frame rate. If local recording is the primary function of the DVR, then the compression algorithms would be tuned to utilize the available storage in the most efficient way. If sufficient storage is available, then the compression parameters could be set such that high quality video would be stored. With H.263 compression, the parameters can be tuned to meet the needs of both remote monitoring and local recording. Higher-end processors can support compression schemes that both compress the video to a smaller amount of data and allow the video to decompress more efficiently.

Industrial DVR’s currently are typically designed around either JPEG/MJPEG- or Wavelet-based compression methods. These compression methods differ significantly in how images are processed, impacting both the throughput capability as well as image quality. Wavelet-based image compression can easily produce a 400:1 ratio while MJPEG based methods currently top out around 200:1. The net result for comparable image quality is a smaller file size for each frame of video; this directly impacts the storage requirements and performance as well as remote communications requiring image transmission, offers Bracken.

Most users want to utilize their existing network and avoid spending money on upgrading or expanding the network. This has become a hot topic, as the network system has to be able to cope with large quantities of information, multiple users working in a multi-site environment and increasing amounts of video that needs to be moved on the network at frequent intervals. This all must be accomplished with minimal bandwidth pressure, says Moav.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John Mesenbrink is managing editor for SECURITY Magazine. He can be reached at 630-694-4026

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Digital Video Storage and Retrieval

    See More
  • Fighting the War on Bioterrorism

    See More
  • More Fiber for Video Diet

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!