Disaster Recovery

Disaster Recovery

Surveillance plays critical role in natural and man-made disasters

Disaster RecoveryHurricane Sandy disrupted power, Internet, phone and various other technical services for millions of people and businesses along the East Coast in 2012. In the aftermath of the storm, organizations are reviewing the effectiveness—or lack thereof—of disaster recovery plans across all of their systems. Because video recording is increasingly used to monitor and manage the effect of natural disasters, surveillance planners are especially taking care to review internal plans for recovering from disasters, both man-made and natural. The adoption of IP technologies across surveillance cameras, IT networks, edge devices and hardware, such as storage platforms, opens up interesting new options for disaster recovery since video can be stored, copied and moved across local and wide area connections in ways that were simply not available in the days of analog systems.

In the Time of Tapes

When dinosaurs—analog systems and VHS recording—ruled the world, surveillance directors relied on sub-optimal methods for protecting stored video content in the case of a local disaster. Video recording happened in one format—a VHS recorder—and playback was limited to a VHS player running either the primary tape or a subsequently created copy.

With this approach, disaster recovery preparedness often required physically labeling, indexing and transporting bulky, unreliable tapes to a secure offsite location. Creating copies of tapes was a time-consuming task and video was captured and stored at a lower resolution or generational loss made the video suspect as evidentiary material. Even more challenging was the fact that the entire disaster recovery system relied on the delicate process of transporting and locating a single physical tape.

Search capabilities in the analog world were equally limited. Video content on a VHS tape represented a fixed amount of recording time from a specific camera. Content could only be reviewed serially with a limited set of fast-forward and skip options. The process of reviewing disaster footage was cumbersome and required a massive mobilization of staff at the physical tape location, who would methodically plod through the recorded video from start to finish, hoping to find relevant data. For example, following the 2005 London Bombings, more than 400 policemen were marshaled in to review more than 2,500 videotapes.

The Role of Digital Copies in DR

IP video introduced, for the first time, the ability to create identical digital copies of a video clip without any loss in video content. Where tapes introduced generation loss with each new copy, digital systems eliminated this resolution loss by allowing copies to be easily created and stored offsite for recovery purposes. Today, many surveillance departments create copies of locally recorded video on disks, DVDs or USB drives, and then move the physical copy to an offsite facility so that the video is not lost if the primary recording site is compromised.

The simple creation of digital copies can result in some unintended consequences, however. Creating hundreds of DVDs with uncontrolled copy privileges can be like mixing Mentos and Diet Coke, where the results can quickly spray out of control. Multiple copies can quickly increase unnecessary storage costs and be nearly as difficult to track as their VHS counterparts. Uncontrolled copy procedures also present the unwelcome prospect of releasing sensitive video content to the outside world. Ideally, the best practice for DR includes a responsibility to track and control how video copies are created, distributed and accessed.

How WAN Bandwidth Throttles DR Options

The limited availability of wide area network bandwidth forces a conscious examination of why video is being retained, so that the appropriate selection of cameras, image resolution and video retention can be selected. In effect, an optimization puzzle has to be solved for each use case.

For example, a retail store that is sensitive to liability cases may choose to save offsite DR video at lower resolution video over an extended period of time. DR video used to protect critical infrastructure surveillance may require exactly the opposite strategy so that high resolution is kept offsite for a shorter retention time to provide forensic evidence in the case that a threat is carried out at the primary facility. For at least the next five years, the quality of the WAN available to a customer will dictate the video surveillance DR solutions that are possible. Here are three potential solutions.

For several cameras with limited WAN, copy events remotely. IT systems frequently provide DR by copying locally stored data across a WAN to a second and, sometimes, third site. A small network pipe is often sufficient because most IT data changes in small incremental bits each day. For dynamically changing environments, replication over a WAN occurs at night to catch up the remote site when system activity is low.

This “store and forward” DR method is completely unsuited for surveillance environments where a single high-resolution camera can fill a T1 line, in which every single bit of data is new every day and continuous video capture offers no off-duty window to catch up.

Customers also need to remember that typical broadband connections only offer guaranteed download speeds. Upload speeds are carefully monitored, hence the name ADSL or Asynchronous Digital Subscriber Line.

In smaller installations such as retail, banking or remote enterprise environments, there is simply not enough bandwidth available to support any offsite capture of real-time video. For these environments, it makes more sense to simply copy events of interest and send these offsite to be retained in the case anything happens to the primary site.

For multiple cameras with a heavy-duty WAN, dual stream the cameras. Many critical infrastructure projects can justify a high-speed WAN that enables live video to be streamed off-site, as well as locally. In this scenario, incoming video is saved locally at high-resolution quality over the high-speed LAN while a second lower-resolution stream is sent across the WAN to a remote disaster recovery location. This approach matches video resolution to the available bandwidth and optimizes storage costs since the lower resolution off-site copy does not require the same usable capacity.

In some cases, the offsite copies are retained for shorter retention times to further minimize the duplication of storage, servers and licenses. DR site storage costs can also be managed by evaluating which cameras merit a disaster recovery approach since camera views are often not equally critical for forensic purposes.

Multi-streamed camera solutions also are ideal for modern corporate campuses or distributed metro installations where high-speed networks connect distributed buildings or depots together. Video is captured locally onsite and simultaneously streamed to a nearby facility for disaster recovery. This also may be effective for companies that offer more sensitive distributed services, such as daycare or outplacement services.

For few cameras and moderate WAN, direct to the cloud. For sites with limited cameras and moderate WAN bandwidth, the cloud or Video Surveillance as a Service (VSaaS) holds tremendous appeal for customers looking to reduce capital and operating expenses, and for resellers looking to offer a recurring monthly revenue service.

VSaaS can involve video sent to either a public cloud, such as Amazon Web Services (AWS), or to a private cloud. The public cloud offers a lower cost of entry and support but carries the security risks of sharing equipment and access with other customers. Many customers remain concerned that unauthorized access to the public cloud could allow sensitive video content to be distributed or that a hacker could access onsite cameras through the Internet. Private clouds provide enhanced security by dedicating network, storage and server resources to one customer.

For small retail environments, manufacturing sites, restaurants and non-critical infrastructure sites, VSaaS may offer the perfect mix of cost and offsite recovery. For larger critical systems, the bandwidth limitations of the WAN continue to dictate local solutions.

Infrastructure Considerations for Disaster Recovery

Whatever the type of DR site, it is critical to rely on high-availability infrastructure that continues to operate during power, component or system level failures. Pivot3, for example, eliminates any single point of failure throughout the server, network and storage infrastructure so that the system will continue to operate during adverse conditions and will self-heal during component interruptions, such as network or server failures. Disaster recovery is a type of insurance, and for those who anticipate the need to deploy such a system, there is no shortcut for the type of high-availability that Pivot3 offers across all of the key system elements.

For DR systems based on copies of local recording, dual-streaming video to an offsite location, or using VSaaS to private or public clouds, the expectation is that video data is always available. WAN bandwidth may dictate the specific DR solution deployed, but a common decision process on high-availability infrastructure leads users to select systems that have no single points of failure, which offer simple support and seamless expansion without downtime.

Today, surveillance directors experience and benefit from the advantages of IP-based surveillance technology including high-resolution video, remote and on-site video flexibility, remote management and operational efficiency. At the same time, digital video surveillance creates a steadily increasing stream of information, which requires a new approach for both storing video data efficiently and protecting it in case of a disaster.

Whatever the size of your surveillance infrastructure, it is critical to have a DR plan in place to safeguard surveillance operations in the most challenging environments because less than optimal solutions can be costly and a source of failure. Therefore, it is critical to understand DR options for surveillance and which work best for your organization.

This article originally appeared in the February 2013 issue of Security Today.

Featured

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.