Aligning Video Surveillance Management With Modern Camera Capabilities

Surveillance cameras have more resolution, higher quality, and higher frame rates than ever before. This quality advancement has done great things for the surveillance industry. At the same time, it has put tremendous strains on the backbone of any video management system (VMS): the recording, playback, and retention of this explosion of video data.

Beyond the day-to-day use of surveillance video, many organizations must adhere to strict retention requirements, for legal or business purposes. The value of any given video is low until it is needed, but when it is needed, its value skyrockets. Retention periods can easily reach two years for litigation purposes. In manufacturing plants with product liability exposure, retention periods extending to 99 years have been used. Today, the use of surveillance video for business intelligence is pushing retention periods further upward.

THE CHALLENGES
There are several shortcomings in current video surveillance storage systems that must be overcome for the practical long-term retention and usefulness of surveillance video. The primary challenge is the sheer size of the data files – a 1080p megapixel camera recording at 30 FPS can exceed 20GB of video storage per day. Multiply that by dozens to hundreds of cameras at dozens to thousands of sites and the storage requirements explode.

Most current systems cannot handle the challenges of simultaneously recording, storing, managing, searching, and/or retrieving these large amounts of data effectively, much less affordably. Systems have been historically architected to meet a different set of requirements — that put live-viewing of cameras at higher importance than managing recorded video. The inadequacies of present recording systems in retention times and video management have become more and more apparent, driving the need for better solutions.

An overarching responsibility of any video surveillance system is the admissibility of recorded video in a court of law. Chain-of-custody procedures for proper handling and submission of video and audio as evidence via a “trusted system” is of paramount concern for all surveillance systems. Video surveillance systems that break chain-of-custody procedures significantly reduce the value and practicality of using that video in litigation. With current systems, moving original surveillance video files from storage device to storage device may create legal chain-of-custody issues especially when it is not a consistent, automated procedure. Being able to migrate surveillance data files with appropriate security and authentication capabilities is a requirement for the legal admissibility of the surveillance video as evidence.

A number of approaches have been proposed in the past for capturing and storing video from surveillance cameras. Most current approaches, however, utilize only a single-tier and/or a single storage type within a computer network. This method quickly becomes unwieldy and expensive when dealing with high counts of video cameras and the video data they generate. Other approaches include archiving surveillance video to an external storage device that may fall outside the management of the initial capture system. This forces organizations to manage and support various software systems not related to the surveillance system. These types of approaches also greatly increase the effort and time it takes to find events of interest in the stored video. An integrated system across various storage types is required to keep up with evolving camera capabilities.

Another problem with today’s systems is the lack of relevant, non-visual identifiable information about the video to use for search and playback. Most systems in use today only allow surveillance video search based on the recording date or by camera identifier. This quickly becomes insufficient when a large amount of video has been collected from many cameras. An inordinate amount of time is spent sifting through original video to find an area of interest. Another challenge is the time spent waiting for the video to load and play, due to network bandwidth and congestion. In many cases, users do not know exactly where the area of interest within the recorded surveillance is and must endure this time-intensive process before they can search and retrieve what they need. A robust use of metadata and advanced search capabilities are required in a modern VMS.

Ultimately, one of the larger challenges is the use of surveillance systems by non-professionals. Many surveillance systems are installed in organizations where dedicated security personnel are not available. The system is often used and maintained by personnel that do not have the experience or background that a security or IT professional has. This requires that surveillance systems be easy to use in ways similar to software solutions these users are familiar with.

AN UPDATED APPROACH
To address the growth of video surveillance systems - the increasing number of organizations utilizing surveillance video; the growing number of sites and cameras; the higher quality and frame rates of today’s cameras; the capacities required to store it all; the capabilities to find, use, and share video quickly and easily; and the novel use of surveillance video as a business asset, an updated approach is needed. Today’s solutions should allow for continuous recording, so nothing is ever missed. They must support evolving retention, compliance, and legal requirements to retain video for longer periods of time, if not forever. Solutions should provide not only ease of use, but also analysis and business insight. And solutions must be available, reliable, secure, and affordable.

Any VMS solution should address the many facets of modern-day video use and management, including:

  • Support for thousands of cameras, camera standards, and continuous recording
  • Scalable, flexible viewing and video wall implementations for operator ease and insight
  • Ability to retain video for long periods of time, securely, with the ability to meet retention, compliance, and legal requirements
  • Simple, intuitive search using metadata and other markers to get what is needed quickly
  • Systems that are reliable, available, and easy to manage
  • Systems that help provide analysis and identify new opportunities through metadata, content tagging, and applied analytics
  • Control or reduction of costs while adding functionality

For more information, including an expanded whitepaper version of this document, click here: ARQvault Video Surveillance Solution & Video Management System.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West 2024: Post-Show Recap

    ISC West 2024 is complete. And from start to finish, the entire conference was a huge success with almost 30,000 people in attendance. Read Now

    • Industry Events
    • ISC West
  • ISC West 2024 is a Rousing Success

    The 2024 ISC West security tradeshow marked a pivotal moment in the industry, showcasing cutting-edge technology and innovative solutions to address evolving security challenges. Exhibitors left the event with a profound sense of satisfaction, as they witnessed a high level of engagement from attendees and forged valuable connections with potential clients and partners. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3