Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video Surveillance

Managing Choice and Chance in Surveillance Storage

By Bill Zalud
One security video trend: Combining local hard disk drive units
One security video trend: Combining local hard disk drive units with a level of integrated video management system tools.
Metal theft was among threats faced by Gardner Energy
Metal theft was among threats faced by Gardner Energy, which chose a number of storage solutions to lessen losses and reduce liability.
Multi-stage archiving
Multi-stage archiving can combine with a grooming feature that measurably reduces the storage costs for systems that require recordings to be stored for an extended period of time. The data can be reduced by assigning it to different storage locations at specific times and simultaneously reducing the amounts to lower frame rates over time.
At the City Hall pictured here, Dae Ho Choi, the mayor of Anyang, the Republic of Korea, chose a video storage solution
One security video trend: Combining local hard disk drive units
Metal theft was among threats faced by Gardner Energy
Multi-stage archiving
At the City Hall pictured here, Dae Ho Choi, the mayor of Anyang, the Republic of Korea, chose a video storage solution
November 1, 2012

These days, when it comes to storage of video, it’s choice – not chance – that determines security’s success at meeting its mission with use of technology. This is true for enterprise security leaders at the biggest organizations, where large numbers of cameras create ingest, frame rate, image quality and physical storage cost challenges. But it is equally true with small to medium-sized enterprises, which share much of the same security video needs and uses but not necessarily the same budgets or infrastructure.

Welcome to the new world of storage where the many choices – flash, solid state, at-the-edge, digital video recorders, security-dedicated network video recorders, networking to off-shelf servers or virtual storage, in-the-cloud – can scale up or scale down, mix and match to specific security and business goals.

Darrin McNew knows about choices. The engineer joined Gardner Energy of Gardner, Kansas, a handful of years ago. Back then, the utility was a division of the city’s public works department. The choice at the time: Keep or sell the utility to a private owner.

Instead, the city created an independent electric utility board responsible for the planning, development, production, purchase, transmission and distribution of all electricity for the city of Gardner.

Record and Alert

McNew, the electric operations supervisor, faced choices for security video and storage at the utility’s three substations and power plant, which operates as a peaking facility. He sees advantages of storage at the edge after facing some problems with the previous network. “Our system is not just to record but also to alert when something is happening,” he says. “And all cameras have their own DVR. Our mission is to use storage to fight losses and manage liability.”

Very far from Gardner, Dae Ho Choi, the mayor of Anyang, the Republic of Korea, helped make choices in security video storage for his city hall and the city police. Anyang is committed to security and life safety. One example: its Singing Road, made from grooves cut into the ground and when driven over, causes a tactile vibration and audible rumbling transmitted through the wheels into the car body. Drivers can hear the tune “Mary Had a Little Lamb” to help motorists stay alert and awake.

More specific to video, the 23-square-mile metropolitan area is covered with hundreds of high-definition digital video cameras linked to scores of servers running network video recording software and sophisticated pattern recognition analytics. The system links cameras to the video management infrastructure in the integrated operations briefing room at Anyang Police Department headquarters, complementing and enhancing the city’s police presence and rapid response capabilities, says the mayor. Anyang City Hall uses the same surveillance infrastructure for traffic management and forest fire prevention.

One key is a storage solution with high throughput and performance as well as the ability to scale rapidly at the lowest cost to ingest and store a constant stream of high-resolution video. Any video streaming delays, dropped frames or data corruption would hinder police responses and investigations. The storage solution also had to be capable of streaming selected videos for use in crime or disaster investigation and response without any similar glitches.

 

Importance of Scalability

To hold down data center real estate, power and cooling costs, scalability had to be provided in the smallest possible data center footprint, with an energy conserving architecture and the lowest possible total cost of ownership. High-performance SATA drives are configured among 460 one terabyte hard disks.

When it comes to security video storage no matter the size of the enterprise, and especially in an IP environment, experts warn that it is too easy to make the mistake of considering video data as any other IT or business data, where the only difference is the volume of data. However, there are two aspects that differentiate video surveillance data from other business data:

•  Video data is streamed in real-time

•  Multiple streams are handled and stored in parallel

So, in a standard IT system, the disks are used to store files of data that are read from or written to by other servers, IT systems or users. When files are written to these disks, it is done using what is called “best effort writing,” and it does not really matter if the disks are fast enough because the data is also stored or buffered by the sender; the “write” just takes a little longer, but data is never lost. These data files to a large extent are written sequentially one by one when more systems or users access the disk system at the same time.

In a surveillance system, video is received as continuous real-time data streams, from many parallel sources or cameras, and there is nowhere that data can be temporarily stored or buffered if the disk system is too slow or busy. Security video can be lost if the disk system cannot keep up all the time.

 

Pressure of Parallel Input

The disk load will also be massive because the disk needs to write the incoming data in parallel, to many different database files at the same time. Compared to sequential writing where only one file is written at a time, such a parallel operation with real-time video data is called non-sequential writing and causes most standard disks to perform slower.

Not surprisingly, there were a number of security video innovations at the September ASIS International event in Philadelphia.

One trend: all-in-one video surveillance network storage and management solutions designed specifically for small to medium-sized businesses and distributed enterprises. Among examples is so-called serverless computing and storage. It’s a matter of system on a chip or SOC coming together with scale-out design, which is especially important for video recording data streams that are characterized by longblock random writes. The scale-out design distributes incoming video recording streams across all resources to dissipate pixel storms, eliminate all single points of failure including any individual appliance and maximize frame rate capture for the best recording results. 

Such a scale-out design also simplifies management and speeds responsiveness to changing field requirements.

 

What About Flash?

Then there is flash – flash acceleration with security video allows the cost and performance to scale with the number of high-resolution cameras since the application of flash scales with storage appliances. Data saves locally and can work with intelligence at the core or centralized. The danger is that in totally relying on storage at the edge, enterprise security can be compromised if there are camera problems.

In-the-cloud was also an ASIS-identified trend. For instance, in one solution that can scale down or up, using video surveillance-as-a-service (VSaaS) technology, Salient Systems integrated Axis Communications’ one-click camera connection to stream video from IP cameras and encoders over the Internet to the Dell Cloud that provides a multi-tenant environment for running virtual systems. The business bottom line: Accessibility and flexibility of cloud-based services offers security video recording availability anywhere, anytime on desktop, notebook and mobile smartphone devices.

 

This article was previously published in the print magazine as "Storage: Pick Choice Not Chance."

 

HHDs Evolve

Hard disk drives continually evolve with new technological breakthroughs and customer demand.

•  Increasing capacity – from 3.75 megabytes to more than 1 terabyte

•  Decreasing size –  from 87.9 to 0.002 cubic feet (like shrinking a refrigerator to a PDA)

•  Decreasing prices – from about $15,000 per megabyte to less than $0.0001 per megabyte (equivalent to $100 per terabyte)

•  Decreasing average access time – from more than 0.1 second to a few thousandths of a second

•  Ability to utilize low cost storage technologies

 

A number of storage technologies with different performance abilities exist today, including:

•           SATA (Serial Advanced Technology Attachment)

•           SCSI (Small Computer System Interface)

•           SAS (Serial Attached SCSI)

 

Information courtesy of Milestone Systems

 

KEYWORDS: security surveillance surveillance solutions video management video storage

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • video surveillance

    IP vs. analog surveillance systems: Is there a right choice?

    See More
  • StorMagic_Image.jpg

    Top ten checklist: Identifying your next video surveillance storage system

    See More
  • Exclusives Feature Image

    3 Key Surveillance Storage Acronyms to Learn

    See More

Related Products

See More Products
  • Hospitality-Security.gif

    Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • s in europe.jpg

    Surveillance in Europe

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×
One security video trend: Combining local hard disk drive units with a level of integrated video management system tools.
Metal theft was among threats faced by Gardner Energy, which chose a number of storage solutions to lessen losses and reduce liability.
Multi-stage archiving can combine with a grooming feature that measurably reduces the storage costs for systems that require recordings to be stored for an extended period of time. The data can be reduced by assigning it to different storage locations at specific times and simultaneously reducing the amounts to lower frame rates over time.

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!