Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

How to Maximize Your DVR and NVR Storage

By Mark S. Wilson
March 21, 2010

Surveillance storage solutions can have many challenges, thanks to myriads of DVR and NVR features and benefits that can range from common specifications to helpful elements such as intelligent PTZ control with preset positions and e-mail or SMS message notification upon motion detection or an alert from an event. Today, even organizations using analog cameras tend to have digital and network video recorders for storage and retrieval of surveillance video. Megapixel cameras are bringing new concerns, especially when one remembers that megapixel cameras – by their very nature – generate more data than lower resolution cameras.

 Therefore, the question security professionals need to ask is, “How can I maximize my DVR and NVR storage, especially as I add more and more higher resolution cameras into my surveillance system?” There are several ways.


Lower recording rates at times and in areas of low activity

By controlling recording speeds, users can obtain recording savings of up to 80 percent. Typically, there is less activity in a building at night. Even during the day, many conference rooms have limited use. There is no need to be recording them at higher rates, such as 15 fps which simply take up more storage space. These slower times and areas can be recorded at only 2-3 fps.

But, what if something was to happen? A nice add-on to the system is basic motion analytics. If something happens, the frame rate goes up to normal recording speeds. When motion stops, the recording rate goes back to 2-3 fps.

Don’t record what you don’t need

Motion exclusion zones can save up to 50 percent of the recording of some of your cameras. Do you need a record of the cars speeding down the freeway? What about those bushes which sway in the wind? They’re showing up, forcing the system to keep recording, as your cameras watch over your perimeter. To rectify, a nice add-on to the system is a basic motion analytics package. It eliminates unnecessary recording of cars and bushes.

How much of your old video do you need?

Is your old video as important to you as your newer video? If not, reduce the number of frames in your old video. The evidence will still be there if needed, but you’ll reduce your storage space dramatically.

Choose the right CODEC in the first place

Migrating from MJPEG to H.264 can reduce storage use by 50 percent or more. That’s why security users migrated from MJPEG to MPEG-4 and now are moving to H.264, which compresses video into a smaller size yet maintains the same video quality when compared with MPEG-4. 
 
Here’s why. With H.264, a representative frame (R-frame) is selected from a group of frames in a video sequence. Only the selected R-frame is stored. By using R-frames, H.264 can compress a video stream, thereby more efficiently generating significantly less bandwidth.

This is true for most camera situations, such as a fixed camera with a low amount of motion. If there is a lot of motion, as in an airport lobby, or if the camera is moving, such as a PTZ, the number of the R-frames generated will increase. In some situations, the compression provided by H.264 may be only marginally better than M-JPEG. Nonetheless, because of the lower bandwidth generated by H.264, less storage is required to archive the video.

Overall, in most surveillance situations, H.264 is a more efficient codec to use for both bandwidth reduction and storage. Just be aware, that in busy locations with lots of motion, bandwidth may spike.


Here’s a problem – many megapixel cameras don’t use H.264

MJPEG does not yield the bandwidth and storage savings of H.264 because its compression algorithm is less complex. Therefore, MJPEG does not require as powerful PCs or processors as H.264. For this reason, manufacturers still use MJPEG in high resolution megapixel cameras (3MP, 5MP).

Therefore, although H.264 offers meaningful bandwidth and storage advantages, this has to be offset against the increased cost for more powerful PCs for video management. When using megapixel cameras, especially when viewing multiple cameras simultaneously, integrators will need to over-configure the servers in the control room to cope with the more intensive processing requirements.


Two Solutions to the MJPEG versus H.264 conundrum

First, there are NVRs and DVRs that record in H.264 and that function as both a Digital Video Recorder (DVR) and a Digital Video Server.

Secondly, most cameras support dual streaming. One can garner the advantages of MJPEG’s clearer live monitoring with the lower storage consumption of H.264 simply by deploying dual streaming.


What’s on the horizon?

As they did with VCRs, at some point, security professionals will leave DVRs and NVRs behind for clustered storage. Larger systems especially will start using them to communicate with servers over their IP network. Modular, they allow storage to be added over time, as needs arise. One can start with a storage cluster as small as a few TBs (terra-bytes) to many, many TBs. However, since the smallest cluster one can really have is 4 TB, they are not yet economical for smaller installations.

Nonetheless, 4 TB is about the amount of storage it takes to handle six megapixel cameras. As storage cluster prices start to emulate those of DVRs and NVRs, they will become a reasonable alternative to review for almost any system.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mark S. Wilson is vice president of marketing for Infinova

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Exclusives Feature Image

    Think Hybrid and Save Money: How to Maximize Your Existing Video Surveillance Assets

    See More
  • Woman working on phone and laptop

    Starting a job in tech? Read this advice to maximize your experience

    See More
  • cyberwall

    How to maximize traffic visibility with virtual firewalls

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing