Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Video Analytics and Storage – At the Edge or at the Server?

By Pandith Jantakahalli
June 22, 2010

There is much skepticism about the working of video analytics. However, a number of enterprises understand the limitations of analytics and have benefited from carefully deploying them to meet their security objectives. These benefits include timely responses to security breaches, efficient use of security personnel and prevention of security incidents. The alternative to analytics is a scenario including security directors monitoring live video streams from multiple cameras- which is proven to be ineffective and inefficient. There is an ongoing debate concerning the best architecture to deploy analytics - at the edge (camera), at the server or distributed across the edge and server. The simplest answer would be to choose an architecture that best meets an enterprises priority needs and objectives. It is interesting to note that a similar debate on where storage must be located-- at the edge, server or distributed across the edge and server is beginning to generate interest.

Key Factors that Impact Architecture

Security objectives, practical aspects, reliability and costs impact the architecture that businesses select. These aspects influence the computing, storage and bandwidth-requirement which, in turn, impacts the overall architecture.  The security objectives also determine the type of video analytics to be installed.

 

 Typical security objectives include:

  • Quick response to events as they happen and identification of objects of interest.  For example, sending a security officer when someone trespasses and recognition of the number plate of a car that has been parked in a no parking area.
  • Providing evidence only for what happened.  For example, proving that a person stole a particular asset. A sterile zone can be marked around the asset of interest and recording can be triggered once anybody enters the sterile zone.
  • Proving that something did not happen.  For example, proving that somebody did not slip and fall in the establishment’s premises.  This means that you have to record video on a continuous basis.  In such a scenario, analytics will be used to provide necessary alerts and generate metadata to quickly isolate the video of interest.
  • Providing evidence that is acceptable in a court of law.  This is determined by the resolution and frame rate of the recorded video. 
  • Need to view a single video feed or multiple video feeds simultaneously on different monitors.  Security directors will require access to recorded video from a control and command center.

 Practical aspects include:

  • The need to protect investments in deployed solutions.  For example, if an establishment already has invested in analog cameras and DVR, it is more appropriate to run the analytics on the server.  Alternate approaches of replacing the analog camera and DVRs with smart IP cameras is more expensive.
  • Time taken to detect a security breach.  In cases where a security breach can be easily identified, the need to store recorded video for more than 30 days before overwriting it is low. 
  • The nature of the asset that needs to be monitored or protected.  For example, a bank may place multiple cameras in each of its branches/ATMs across different locations in a city.
  • Difficulty in running and maintaining a cable/wireline network.  For example, when surveillance needs to be provided to a large campus with many outdoor cameras, it is easier to have the cameras on a wireless network.  The wireless network bandwidth available is much lower than the bandwidth available on the LAN and hence impacts the architecture.

While all security systems must operate at very high levels of reliability, the amount of downtime that can be tolerated will impact the architecture decision as well:

  • How much of downtime in the server or network be tolerated?
  • Can the business live with loss of stored videos due to hard disk failures?
  • Can the business tolerate video loss while video is being recorded?

Budgetary constraints toward meeting the security objectives of a business are a crucial element in determining the architecture:

  • Costs for one time installation and commissioning
  • Costs for maintaining the systems on an ongoing basis


Typical Architectures for Deployment

Once the security objectives, reliability aspects and budget limitations are well understood an informed decision on the architecture can be made.

 

The major architectures for deployment of analytics and storage are:

  • Running analytics completely on the server and storing of videos on the server
  • Running analytics completely on the edge and storing of videos on the server
  • Running analytics completely on the edge and storing of videos on the edge
  • Distribute running of analytics and storage of videos across the edge and the server

 The pros and cons of each architecture :


Architecture

Pros

Cons

Analytics & Storage on the Server

·      Sophisticated analytics can be installed

·      Flexibility offered in terms of reassigning video analytics to a different camera

·      Situation awareness is improved

·      Easy to upgrade analytics or increase storage capacity at any time

·      A number of companies provide analytics on the server side.  Hence, end customers have greater choice on the analytics that can be used

·      Most video management software vendors provide easy access to the stored/recorded video on the server

·         Bandwidth requirements are high

·         Videos from multiple cameras is lost in case of server/network outage

·         Additional processing power is required to decode the video streams at the server before analytics is performed

·         Bandwidth, storage and processing costs are high

·         Recurring cost of power and cooling for server/storage is significant

Analytics on the Edge & Storage on the Server

·      Cost of analytics is bundled into the price of the edge device

·      Bandwidth requirements will be lower, especially if continuous recording is not required

·      Analytics can be run on the raw data, resulting in higher accuracy

 

 

·         Analytics limited by the processing power available on the edge device

·         Videos from multiple cameras is lost in case of server/network outage

·         Recurring cost of power and cooling for server and storage

Analytics & Storage at the Edge

·      Cost of analytics and storage is bundled into the price of the edge device

·      Recurring costs are much lower as there are no power and cooling requirements

·      Analytics can be run on the raw data, resulting in higher accuracy

·      Bandwidth requirements is low Minimal impact in case of network/storage outage

 

·         Analytics limited by the processing power available on the edge device

·         Recorded videos limited by the capacity of storage on the edge device

·         Very few vendors provide solutions with analytics and storage on the edge devices

·         Support for access to stored/recorded video on the edge device through the video management software is poor

Analytics & Storage Distributed Across Edge & Server

·         Analytics can be run on the raw data, resulting in higher accuracy

·         Optimum usage of resources

·         Moderate bandwidth requirements

 

·         Installation is complex

·         Exposed to risks related to – network and server outages

·         Limited choice of vendors who are offering such solutions


For cases where continuous recording is necessary and the video needs to be retained for a long period of time (more than 3 months), storage at the server is the most appropriate option.  For small camera count installations where recorded video needs to be retained for less than 30 days, analytics and storage on the edge device may be a preferred architecture.

 



The Future

Few key trends that will impact the architectures in future are:

  • Processing power on the edge devices continues to grow at a rapid rate.  A favorable $/MIPS ratio for the processors on the edge device when compared to processors on the server, will cause for a push of analytics towards the edge.
  • Camera resolutions are constantly increasing with the advent of high definition (HD) cameras.  If existing encoding technologies are retained (H.264/MJPEG) then the bandwidth requirements to transmit video streams to the server will increase manifold.  Storage on the camera/edge devices is one way to reduce the bandwidth requirements.
  • Capacity of flash memory on edge devices is steadily increasing.  The $/byte ratio for standalone storage devices is significantly cheaper when compared to storage at the server.  These reasons will cause a push for storage to the edge devices.
  • While current support for access to recorded video on the edge device through the video management software is poor, a few video management vendors are beginning to support such a feature.

While the key trends may point to a gradual movement to edge-based analytics and storage, security objectives will drive end users to an appropriate architecture.  Security directors will have to analyze the trade-offs involved and choose an architecture that best meet their requirements.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Pandith Jantakahalli is product manager of the digital surveillance group, R&D services, for
MindTree Limited. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • analytics

    Analytics on the Edge vs. on the Server – What’s Right for Your Business?

    See More
  • Cybersecurity Intrusion Detection

    Battle at the edge: How the convergence of 5G and IoT are opening a new front for threat actors

    See More
  • SEC0421-Edu-FEAT_MAIN_1170x878px

    Gaining a video surveillance ‘edge’ in the cloud

    See More

Related Products

See More Products
  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products

Events

View AllSubmit An Event
  • July 9, 2012

    Edge Storage

    Edge storage is a concept in Axis network cameras and video encoders that allow them to record video directly to a storage device such as an SD-card. It is sometimes referred to as local storage or onboard recording. In this webinar we will discuss the benefits of how this can help you in many applications.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing