How to Store Video Surveillance More Effectively

Online Exclusive: How to Store Video Surveillance More Effectively

To scale out video-surveillance capabilities, law enforcement agencies have a number of choices, such as software-defined solutions and cloud technologies. Agencies need to choose whether to use a public or private cloud and then look at the capabilities they require.

As the amount of video data grows and video resolution improves, the requirement for storage space increases and it becomes more difficult and expensive for law enforcement agencies to store videos, even for a short time.

However, securely storing large amounts of video data and being able to find the data easily is now a requirement for law enforcement agencies. Legal procedures and legislation like the Freedom of Information Act require the secure transfer of full or partial government-controlled data if requested.

Even if you do have the storage space, dumping a massive amount of files into a data silo and not attempting to index or organize them in any way can render important video footage unsearchable and, therefore, useless.

The Video Storage Problem

The key elements to consider in determining storage requirements for video surveillance are the “three R’s”: retention, reliability, and resolution.

• Retention times vary by state and range from 30 days for non-evidence to seven years to indefinitely for certain crimes. The longer the retention time, the more storage a law enforcement agency needs.

• Reliability is something most in the storage industry don’t think about. Storage and storage media will eventually fail. You need to protect the data in some way, and that comes with additional storage overhead ranging from 20 percent to 300 percent, depending on the level of availability needed.

• Resolution is what most people consider when they think of video size, and that is driven by frames per second. While cameras in police cars record 1.5 gigabytes per hour at standard definition, body-worn cameras shooting at 720 HD consume about 2.5 gigabytes per hour. Increase this resolution to 1080 HD, and the storage consumption increases to 5 gigabytes per hour. Now, multiply body-worn camera storage needs by the over 900,000 sworn law enforcement officers in the U.S. alone, and you’re looking at a staggering amount of data.

Legacy storage systems are incredibly expensive, especially considering the retention time a piece of evidence may require. One police department spends $111,000 annually to store evidence associated with just 50 cameras. Other departments are purchasing even more storage after realizing that they’re already one-third of the way through the storage they pre-purchased.

And while cloud storage may work for smaller departments, the compounding costs over time and the bandwidth necessary to move data to the cloud need to be considered. As a result, some departments are looking for public and private cloud storage that is economical; the answer is object storage.

The Benefits of Switching to Object Storage Systems

Object storage systems address specific concerns in law enforcement associated with data privacy, secure access, reliability, and economical scale. Some of the biggest worries in storing data are the possibilities that data could be lost, corrupted, stolen, or easily accessed (making privacy a concern), that existing storage could be depleted, and that content could be difficult and time-consuming to locate.

These systems store video keys with value pairs so there is a unique identifier for each video rather than a server name, series of directories, and file name, making it easier to locate specific files. All you need is the unique ID. Object storage systems are also economical because they run on standard servers, and in the event of a change or update in technology, data can be easily migrated to newer, more efficient hardware.

Characteristic of all object storage solutions is that they scale in a single location or multiple locations, they are highly automated, and they include “self-healing” technology. And best-of-breed solutions include compliance features like write once read many, legal hold, and integrity seals that can be used in courts of law to demonstrate a video hasn’t been tampered with.

Storing your video data with object storage makes it more useful because it:

1. Consolidates data in an easy-to-search, resilient storage solution. Storing data in disparate silos means that when you need to find a file, it’ll be like finding a needle in a haystack, which can lead to heavy penalties and fines. Files need to be consolidated and have metadata stored directly with the file so that they will be easily searchable.

2. Ensures your storage is admissible in a court of law. Agencies need to make sure their storage meets compliance standards with features like WORM, legal hold, and integrity seals to prove in a court of law that digital evidence hasn’t been tampered with.

These features can prevent data from being modified or deleted, and they can also protect the original data set. Replicas of the data are made in the event of losses or malfunctions, and when transferring data, integrity seals can prevent tampering or transmission errors. Even in the event of catastrophic failures, data can be recovered from a remote location with ease. All these features mean that there will be no question that the videos presented in court are accurate.

3. Makes sure your storage solution can scale out as your video needs grow. This accommodates growth in the number of cameras used, resolution of capture, retention rates, and overhead for proper resilience and protection. As your data grows, your storage will need to grow with it.

To scale out video-surveillance capabilities, law enforcement agencies have a number of choices, such as software-defined solutions and cloud technologies. Agencies need to choose whether to use a public or private cloud and then look at the capabilities they require. Prepare for the future today, and make sure your solution can scale to meet your needs for the next 5 to 10 years.

Law enforcement officials, and the lawyers and judges who work with them, need to find smarter ways to consolidate, protect, and search data being stored. To achieve this, data must remain online, accessible, and searchable with proper metadata attached. Object storage is one of the most cost-effective and secure ways to meet those requirements.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities