Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Video Surveillance Storage – New Ways to Solve Old Problems

April 1, 2010

There are really just two main functions of a video surveillance system: to see what the camera sees (in real-time or live) and to see what the camera saw (stored). The most widely utilized of the two functions – to see what the camera saw – is storage or being able to store what the camera sees and to playback the video when desired. 

In the past, this was accomplished via video cassette tapes – lots and lots of video cassette tapes. The next technological advancement was to use computer hard disk drives. This reduced costs by eliminating the video tapes, the daily or weekly labor associated with tape rotation as well as the costs of off-site storage. In addition, this greatly decreased the time it took to retrieve a specific incident for playback. The video surveillance markets rapid move towards the wide spread adoption of IP-enabled devices and IT technologies has provided improvements in the quality of the stored video, the length of time or retention of the stored video while reducing the cost of storage and improving the overall reliability of the video surveillance system.

The improvements in the video quality come from improvements in the digital encoding of the video. The most significant of these improvements in the video quality comes from the use of the H.264 encoding standard. H.264 provides an increase in both the quality of the video image and in the compression of the images. Being able to have a higher quality image that requires less storage space can increase the recognition and identification of an event, while increasing the total number of hours, days, weeks or even months stored without increasing storage capacity.

However; improvements in the quality and compression of video are not the only areas that can provide increased storage capacity, retention time and reliability. The use of new techniques in video storage management, IT-based storage solutions and redundancy technologies can provide an even greater increase capacity, retention and reliability.

One of the earliest techniques was the use of time-of-day and day-of-week recording. This was the ability of the video surveillance system to automatically turn on or off the recording function based on not needing to record images or as many images per second at certain times. This type of selective recording did extend the total number of hours, days, weeks and even months that could be retained. But it also had the potential to not be recording anything during an event. There are now video surveillance systems that can take this concept a step farther. By adding some software intelligence and processing capabilities into the video system, it is now possible to automatically reduce the stored video in between the motion triggered events. There are several ways to accomplish this, but one of the most common is to automatically reduce or delete some of the recorded frames.

The actual storage location and type is another area where the adoption of IP and IT technologies has provided improvements in capacity, reliability and cost. Direct Attached Storage (DAS) is currently one of the most common types of video surveillance storage. It is basically one or more computer hard disk drives installed into the DVR or NVR. In some cases, it is the best solution due to a small number of cameras or the remote location of a facility. But DAS solutions in a facility where a large number of cameras are required and access to an enterprise’s network is available can be inefficient. There is the potential to waste or not use potential storage space. Not all video ports on all DVRs and NVRs are always used. But many DVRs and NVRs have few options in available disk drive sizes. Thus, many DVRs and NVRs have disk drives installed that are far larger than the total number of in use camera ports require. This wastes potential storage space, increases costs and increases the amount of power consumed, the heat generated and maintenance costs.

The use of IP-enabled DVRs, NVRs and IP cameras has opened up the use of IT based network storage technologies, like Network Attached Storage (NAS) or Storage Area Networks (SAN). The use of either a NAS or a SAN is more a question of who does the Enterprise IT group support. There are technological differences between the two, but what is more important are the similarities. Both solutions support Ethernet connectivity, usually 100/1000 Base-T(x). Both support the use of standard computer hard disk drive that can also be configured to support several different types of Redundant Array of Independent Disks redundancy. The use of a NAS or SAN can allow multiple DVRs, NVRs and IP cameras to combine their video storage. This eliminates the wasted storage of DAS solutions and increases the reliability of the video storage system by the use of RAID technology.

The move towards IP-based video surveillance has provided some new and in many cases unique solutions to the old problems of storage, retention and reliability. New ways and approaches to solve these problems are still emerging. As one manufacturer develops a new and different way to solve one of these problems, another will see yet a different way to solve the same problem. It is a never ending, but exciting, story of finding new ways to solve old problems.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • New Orleans to install more video surveillance amid crime rise

    New Orleans to install more video surveillance to deter and solve crimes

    See More
  • LarryWhiteside

    CISOs Look Past Compliance for New Solutions to Old Problems

    See More
  • Goodwill store

    Virtual or Traditional? How Either Guarding Solution Can Solve Business Problems

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing