Micron CCTV Storage System / HDD(5)
In edge storage applications, system integrators can optimise the design for IP network load/capacity availability by leveraging local microSD card-based storage, recording redundancy and mobile access. Micron’s is optimised for these applications with: High endurance: Micron’s industrial card supports 3 years or more of high-quality continuous 24/7 video recording Outstanding recording performance: Micron’s industrial card contains firmware optimised to provide stable performance for 24x7 high quality video recording with minimal frame drops Industrial quality: Micron’s industrial card is a high-reliability microSD card for video surveillance usage with 2 million hours mean time to failure (MTTF) Smart tool for health monitoring: Micron’s industrial card offers a health monitoring feature for IP camera integration which reports card usage and lifetime remaining. Systems can integrate this feature into their software to alert end usersAdd to Compare
For mobile surveillance recording systems in transportation, storage devices need to be designed with application-tailored reliability, performance, security and product longevity in mind. Micron understands these requirements and offers one of the most rugged and robust industrial SSD product lines in the industry (M500IT). Temperature: Standard SSDs typically operate at 0°C to 70°C for applications with some degree of environmental controls. In mobile surveillance recording systems, temperature requirements are expanded to deal with outdoor or adverse environmental conditions. M500IT SSDs are designed to operate at -40°C to 85°C. In addition to ensuring read, write, and erase operations throughout the larger operating temperature range, the M500IT offers excellent cross-temperature performance, i.e. users can write at -40°C and read at 85°C (and vice versa), something not achievable by most SSDs. Endurance: With SSDs, endurance is measured by mean-time-to-failure (MTTF). In mobile surveillance applications, an SSD’s useful life is an important factor as they are deployed in vehicles that are in the field. Servicing them for SSD replacement may not be easy and may have significant cost associated with vehicle downtime. Typical standard SSDs have an MTTF of 1.2 million hours, whereas M500IT SSD is designed for continuous operation and offers high endurance up to an industry best-in-class 3 million hours. Vibration: For mobile surveillance recording systems on trains, buses, and police vehicles, SSDs need to withstand high vibration requirements. Standard SSDs support vibration rates of 3.13G @ 5-800Hz, whereas M500IT SSDs support 20G @ 7-2000Hz, making them a perfect choice for vibration sensitive mobile vehicle applications. Micron’s M500IT SSDs are available in 2.5” SATA format for traditional disk drive loading systems, as well as in a mSATA format for compact designs. These SSDs offer 256-AES encryption and TCG Opal2.0 compliance for data security. These SSDs are available for long-life, 5 years from the time of introduction vs. typical 2 years for standard SSDs, making them a great choice for deployments and serviceability in mobile surveillance applications.Add to Compare
Browse CCTV Storage System / HDD
Storage products updated recently
The past decade has seen unprecedented growth in data creation and management. The products and services that consumers use every day – and the systems businesses, large and small, rely on – all revolve around data. The increasing frequency of high-profile data breaches and hacks should be alarming to anyone, and there’s a danger data security could worsen in the coming years. According to DataAge 2025, a report by IDC and Seagate, by 2025, almost 90% of all data created in the global datasphere will require some level of security, but less than half of it will actually be secured. Nuanced approach to data security Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its securityThe rapid proliferation of embedded systems, IoT, real-time data and AI-powered cognitive systems – as well as new legislation like the European Union’s GDPR – means that data security has to be a priority for businesses like never before. With data used, stored and analysed at both the hardware and software level, we need a new and more nuanced approach to data security. Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its security. What this means in practice is renewed focus on areas of hardware and software protection that have previously not been top of mind or received large amounts of investment from businesses, with security at the drive level being a prime example. The importance of data-at-rest encryption In a world where data is everywhere, businesses need always-on protection. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways. Hardware-level encryption, firmware protection for the hard drive, and instant, secure erasing technology allow devices to be retired with minimal risk of data misuse. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways A recent report from Thales Data Threat found that data-at-rest security tools can be a great way to help protect your data. However, it’s important to note that this must be used in conjunction with other security measures to ensure that those that fraudulently gain access to your key management system can’t access your data. Ensuring drives to be Common Criteria compliant One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliantDespite the clear benefits, this kind of encryption lags behind other areas, such as network and endpoint security, in terms of the investment it currently receives. The same Thales Data Threat report found that data-at-rest security was receiving some of the lowest levels of spending increases in 2016 (44%), versus a 62% increase for network and a 56% increase for endpoint security. One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliant. Common Criteria is an international standard for computer security certification, and drives that meet this standard have a foundational level of protection which users can build on. Providing an additional layer of security The retail industry has seen a spate of security breaches recently, with several major US brands suffering attacks over the busy Easter weekend this year. As frequent handlers of consumer card information, retailers are particularly vulnerable to attack. Data-at-rest encryption could enhance security in these instances, providing an additional layer of security between customer records and the attacker The advanced threats retailers face can often evade security defences without detection. Such a breach could grant attackers unrestricted access to sensitive information for possibly months – some breaches are known to have been detected only after consumer payment details appeared on the dark web. These types of undetected attacks are highly dangerous for retailers, which are relatively helpless to protect consumer information once their defences have been compromised. Data-at-rest encryption could significantly enhance security in these instances, providing an additional layer of security between customer records and the attacker which has the potential to make the stolen data valueless to cyber criminals. Industries in need of data-at-rest encryption Healthcare organisations, which hold highly sensitive customer and patient information, have a strong use case for data-at-rest encryption. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack. Recent research from the American Medical Association and Accenture revealed that 74% of physicians are concerned over future attacks that may compromise patient records. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack The financial sector would also benefit from further investment in data-at-rest encryption, given 78% of financial services firms globally are planning on increasing their spending on critical data, according to Thales’ Data Threat Report. It’s helpful to view security as a circle in which every piece of hardware and software handling the data plays its part SMEs and enterprises are not immune to security threats either – with growing numbers of people traveling for work or working remotely, the risk of sensitive business data becoming exposed via device theft is heightened. Usernames and passwords have little use if thieves can simply remove unencrypted hard drives and copy data across. Securing every hardware and software Technology vendors often focus on aspects of hardware and application security that are within their control. This is understandable, but it risks proliferating a siloed approach to data security. There is no single line for data security -- rather, it’s helpful to view it as a circle in which every piece of hardware and software handling the data plays its part. There’s a clear need for more industry dialogue and collaboration to ensure data security is effectively deployed and connected throughout the security circle and across the value chain.
The use of facial recognition has become a highly debated topic recently, and has increasingly and misleadingly been criticised by some for being an unethical tool used to spy on the public. The reason for such criticism is however largely due to lack of information and regulation around the technology. Used proportionately and responsibly, facial recognition can and should be a force for good. It has the ability to do a lot more to increase security in the future – from street crime to airport security, all the way through to helping those battling addiction, the technology can take security and operations to new heights. The rise in knife crime Knife crime has dominated the headlines in the UK throughout the year. Recent statistics show the number of people being admitted to emergency care due to attacks by a sharp object to be up by nearly 40 per cent from two years ago, whilst the number of children under the age of 18 being admitted to hospitals with stab wounds is up by 86 per cent in only four years. This recent surge in knife crime has put police forces under immense pressure, and the intelligent use of facial recognition has a role to play in enabling more informed stop & search interventions. Currently UK police can stop and search an individual they suspect to be carrying drugs or weapons or both, or they can stop and search a person in a location where there have been or are considered likely to be “incidents involving serious violence.” In both cases they must do so with access to limited information, leaving themselves open to accusations of bias or discrimination. Knife crime dominated the headlines in the UK throughout 2018 Police systems benefiting crime investigations This is where facial recognition can offer up additional intelligence. These systems can memorise the faces of persons of interest, networks of gang members, wanted criminals and those suspected of involvement in serious violent crimes. Furthermore, these systems don’t need prior personal engagement to recognise an individual and see only data, not gender, age or race. The technology doesn’t take the decision away from the human police officer. However, it does bring greater transparency and context to the decision-making process of whether a stop and search intervention is justified. Similarly, the advanced technology can recognise and match an individual seen on a CCTV camera at a crime scene to someone the police encounters on the streets some time later, justifying a stop and search on that individual. Its ability to check in real time if a person is on a criminal watchlist adds an extra layer to the decision-making process prior to conducting a stop and search, lowering the likelihood of discrimination. Facial recognition thus helps eliminate both weapons and criminals off the streets and potentially prevent crimes before they have a chance to take place. Gambling addiction and how facial recognition can help There are an estimated 593,000 people in the UK currently battling a gambling problem, making it a serious public health issue in the country. Having understood the gravity of the issue, the UK gambling commission have set limits and advice in place to help those suffering this addiction; yet as with all addictions, gambling is a tough habit to beat. In order to put effective limitations in place and make a real difference, the gambling commission needs the right technology to protect those most vulnerable in the industry. Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers to a higher degree. Monitoring those entering and moving around gambling areas is an extremely difficult task for human staff to do alone, especially in large crowded areas such as casinos. Facial recognition technology installed around the premises would be able to help the company and the staff to identify people who have registered as gambling addicts, and keep record of their day’s play in order to inform staff if and when it was time for them to stop. It would also be able to ensure effective self-exclusion procedures, by identifying a self-excluded individual via CCTV as soon as they entered the venue to then allow security staff to respectfully escort them out. Utilising facial recognition at airport security Facial recognition has by now become a normal sight at many airports around the world. Several people today hold a so-called biometric passport, which allows them to skip the normally longer queues and instead walk through an automated ePassport control to proceed to the gate faster without having to deal with control officers. Facial recognition used in this way has managed to significantly cut waiting times at the passport control, but it also has the ability to enhance security in and around airports. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces Earlier this year, facial recognition technology managed to catch an imposter trying to enter the US at the Washington Dulles Airport. The false passport may have been uncaught by the human eye, yet due to the accuracy of the facial recognition technology it managed to help officers catch the imposter and bring him to justice. Facial recognition thus allows officers to identify an individual faster and more accurately than the human eye. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces, which have been collected from visas, passports and other sources. Facial recognition allows officers to identify an individual faster and more accurately than the human eye Whilst some critics may worry about issues of privacy related to the technology, at airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-in and, in the future, even boarding proceedings. At airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-in If used correctly and proportionately, facial recognition can help safeguard the public and improve national security on several fronts. Whilst the many benefits of facial recognition are evident, the lack of regulation and understanding of the technology has led to misconception around how it works and what it is used for. Facial recognition technology can match faces in crowded public places against criminal watch lists, and register faces that match with those on criminal watch lists – whilst ignoring everyone else.
Terry Gold of D6 Research has been giving “cyber in physical security” presentations at a variety of conferences, including ISC West and the Cyber:Secured Forum. We caught up with him for some insights about the intersection of cybersecurity and physical security. Q: Tell us a little bit about your background, specifically in the context of its relevance to cyber security in physical access. Gold: I started out in information security and then got involved in physical security along the way. I started really focusing on physical from a cyber standpoint about 10 years ago. I got into ethical hacking about 8 years ago, and then worked on putting it all together. There wasn’t a roadmap, so I had to build a methodology which I now share with other hackers, end users and law enforcement. I spend all my time either in the lab building success models, methods, and testing them out in some of the largest customers or agencies in the world for validation and improvement. Also, a chunk of my time is spent re-engineering security assessment and controls for end users or validating vendors on their behalf from a unique viewpoint that’s not (yet) typical in the industry. Q: How well prepared is physical security overall against cyber threats? Gold: Not well at all. While security is imperfect anywhere, much of the practices and designs have critical defects and overlook either best practice or fundamental application security principles. I’d say that the industry is very wide open for exploitation that doesn’t take much sophistication to execute. Breach disclosure laws are focused on mandatory reporting for personally identifiable information (PII) Q: What things stand out to you along your journey regarding the changes that you are seeing on this topic? Gold: Culture. Over the years, the industry (and most end users) have been dismissive of my findings. Industry culture hasn’t been aligned to embrace the topic and make requisite improvements that are needed to achieve “good security.” However, I’m finally starting to see that change – quickly and at scale. It doesn’t mean that we’re close to “good,” but rather reached the inflection point of change – and I’m rather pleased about it. Breach disclosure laws has resulted in IT getting a lot of media attention in comparison to hacks made against physical security Q: D6 does a lot of research in this area. What is the analysis behind the recent push for cyber security in physical security? Gold: First, it must be recognised that the threat isn’t new, but rather that the industry is only now coming to the table on it. Industry sentiment has been that breaches in physical security don’t happen or that there’s little impact.It must be recognised that the threat isn’t new, but rather that the industry is only now coming to the table on it Both are false. Mainly, IT gets all the media attention with breaches for two reasons; 1) breach disclosure laws are focused on mandatory reporting for personally identifiable information (PII), and 2) there is really poor detection (mostly non-existent) against hacks in physical security, so they go unrecognised. On the other side, as physical security systems increasingly resemble an IT architecture, so does their risk profile. As it expands to mobile, cloud, IOT and intelligence - InfoSec and auditors are taking a look and are alarmed at what they’re seeing. Before you know it, the scrutiny is cutting pretty deep, pressure for alignment becomes intense, and vendors feel the pinch on the sales cycles. It’s not a comfortable position for anyone. Q: What will be the projected impact? Are practitioners seeing the whole picture? Gold: No, and this area is probably the most important takeaway of this interview. The industry is where InfoSec was about 15 years ago in their journey, except we have an additional headwind to deal with – culture change. This industry tends to rely more on trusted relationships than validating the recommendations are being provided. There are too many prevailing misconceptions, that unless remediated, investments won’t be as effective as expected. Q: What do you believe are the top misconceptions? Gold: Well, this is a longer topic, but here’s a sampling that cuts across different areas. Regarding hackers: A misconception is that they’re generally not interested. Hackers are increasingly very interested. When I teach a workshop at a hacker conference, it’s usually the quickest to fill up and go to wait list (within a couple hours). Regarding attacks: A misconception is that attacks are executed directly against the target system. Example, their goal is to get into VMS and attack it directly. The reality is that they’re more commonly dynamic where physical is part of a larger attack and its role is an easier gateway to another system (or vice versa, with many hops). Regarding protective measures. The most prevalent mistake that the industry is currently making is too much focus and reliance on air-gapping networks or locking ports. This is only a slice of the attack surface and there are various ways to get around it. There’s a heavy price to pay for those that that rely too much on this strategy since its often accompanied by few mechanisms to deal with actors once they do get in (and they definitely will). Regarding the value of exploiting physical security. Too often perceived as low value. In our white paper we review many of the things that hackers can do, what they gain, and how it can impact the overall organisation. It’s far broader and deeper than most. Q: What are the top things that need to change in the industry? Gold: First, culture. This can be answered by adopting the same principles as InfoSec. From an execution standpoint, the industry needs to change how they perform risk assessments.At D6, we’ve developed a stepwise methodology from ground up and it’s a huge difference Industry practices, including certifications, are significantly outdated and don’t reflect a methodology that accurately considers cybersecurity, actors, methods, and proactive remedy. At D6, we’ve developed a stepwise methodology from ground up and it’s a huge difference. End users that don’t re-engineer their practice, will be very limited for meaningful cybersecurity improvement. One of the changes needed in the industry includes how risk assessments are performed Q: Generally, what advice do you give to clients on steps to move their cyber security to the next level? Gold: Don’t operate like a silo anymore. Transition from industry “common practices” to best practices that can be validated. Rely less on previous relationships and more toward domain competence. Collaborate with the CISO to a principled, goal-oriented and metrics-based approach. Embed an InfoSec person on the physical team. Present priorities and risks jointly to the board within an overall risk portfolio. Invite scrutiny from auditors. Get a red team performed once a year. Until you do the last step, you don’t really know where you stand (but don’t do it until the other things are done). Last, set the bar higher with vendors to support these improvements or their products will just end up being weak link. Q: What type of challenges do you see and any advice on how end user and integrators can overcome them? Lessons learned? Gold: There are too many specific domains across cybersecurity – it’s not just a network security resourceFeedback I get from integrators is that they’re struggling to figure out how to deliver expertise to their clients in their area. They’re somewhat overwhelmed with the complexity, becoming an expert or how expensive it is to hire and maintain those skilled resources. My best advice is not to do either. There are too many specific domains across cybersecurity – it’s not just a network security resource. Not even the large integrators have the right bench, and unfortunately, they’re just further down a doomed path than smaller integrators. Form a partnership with boutique cybersecurity firms that have multiple specialists. Negotiate rates, margins, scope, and call on them when needed. It won’t come out of your bottom line, the results will be better, and the risk will be extremely low. You’ll learn along the way too. Q: Anything notable that your research is uncovering in this area that might not be on people’s radar yet? Gold: Yes, quite a bit. Our Annual Industry Assessment Report goes through every segment. We’re making pretty bold statements about the future and impact, but we’re confident. One thing that stands out is how intelligence (and the swath of subsets) will impose stringent demands on physical security due to attribute and data collection (for analysis) which will absolutely require privacy compliance, integrity, and controls. It will even shape organisations that might not care about cybersecurity but are prioritising function. Q: Where can readers learn more about your perspectives on this topic? Gold: Blogs on the D6research.com website. Our annual report. Val Thomas of Securicon and D6 have collaborated on a three-part cybersecurity in physical white paper series. It goes into all of this in detail, as well as remedy.
Micron Technology, Inc., unveiled the world’s highest-capacity industrial microSD card — Micron® i300 1TB3 microSDXC UHS-I — to address the edge storage needs of the video surveillance market and other industrial applications. The new Micron® i300 1TB microSD card is based on Micron’s advanced 96-layer 3D quad-level cell (QLC) NAND technology, now making it cheaper for small- to medium-sized deployments to have primary storage in the camera compared to a centralised storage architecture. The i300 microSD card enables users of video surveillance systems to capture and store more than three months of high-quality video footage on-device and at the edge. Cloud-based service models “Micron’s i300 industrial-grade microSD cards for edge storage open the possibility for a broad range of video surveillance as a service deployments that no longer require local network video recorders,” said Amit Gattani, senior director of Segment Marketing in Micron’s Embedded Business Unit. “Micron’s 96-layer 3D QLC NAND is instrumental in helping us deliver 1TB of storage in a microSD form factor and at a breakthrough price point to accelerate edge storage and cloud-based service models.” Users of video surveillance systems can now store large amounts of video footage on-device VSaaS systems are increasingly integrating artificial intelligence-based and higher-resolution cameras that require more storage at the edge. The Micron i300 1TB microSDXC card allows 24/7 continuous capture and storage of up to 1TBof high-quality video in the camera. Users of video surveillance systems can now store large amounts of video footage on-device, opening a broader set of uses for cloud-managed solutions. Intelligence at the Edge “Demand for commercial surveillance cameras continues to grow at a rapid pace,” said Jeff Janukowicz, research vice president at International Data Corporation (IDC). “Smart cameras, artificial intelligence, machine learning and threat detection are being driven to the edge for real-time responsiveness, making Micron’s 1TB microSD card an invaluable solution for differentiation and innovation.” The VSaaS market is projected to reach $6 billion in 2022, corresponding to a growth of 22% compound annual growth rate between 2017 and 2022.4 The rising adoption of VSaaS by small to medium businesses and enterprises is attributed to lower overhead costs achieved through ease of installation and elimination of the need for on-site NVRs and DVRs. The ability to store large video footage files in the camera and at the edge reduces the demand for network bandwidth and expenditure associated with continuous cloud storage. Cloud-based implementation models These savings contribute to lowering the overall cost of ownership for businesses while bringing flexibility and scalability associated with cloud-based implementation models. Micron’s microSD portfolio is designed to endure harsh environments in which surveillance systems are deployed "The video surveillance market is quickly shifting toward hybrid cloud architectures that store video footage on-camera, allowing secure access via cloud-based software,” said Raj Misra, director of Hardware Engineering at Verkada. "Enterprise customers are choosing hybrid cloud offerings to reduce operational costs, simplify installation and management, and gain from powerful video analytics. Micron extending its range of reliable industrial-grade microSD cards to 1TB enables us to provide our customers with industry-leading data retention, security and video resolution options at very cost-effective price points." Micron’s industrial-grade microSD portfolio is designed to endure the harsh environments in which surveillance systems are deployed. Flexibility, scalability and maintenance efficiency The Micron i300 1TB microSDXC card minimises frame drops in a 24/7, 30 frames per second (FPS) recording environment, offering twice the reliability of hard disk drives at 2 million hours mean time to failure. The card features a smart tool for monitoring the health of devices. “VIVOTEK has launched a series of edge-computing network cameras and successfully deployed Micron’s high-quality industrial-grade microSD cards,” said Shengfu Cheng, director of Marketing and Product Development Division, VIVOTEK Inc. "Micron’s portfolio of industrial microSD cards up to 1TB equips us to deliver greater flexibility, scalability and maintenance efficiency to our customers, all of which contribute to a better return on investment.” The Micron i300 microSDXC UHS-I card is offered in 128GB to 1TB capacities, which are available for ordering. The entire industrial-grade portfolio includes capacities ranging from 32GB to 1TB.
Micron has announced general availability of the 128GB and 256GB density of edge storage microSD card solutions and collaboration with several leading video surveillance solution providers to promote surveillance-grade edge storage. Built on Micron’s industry-leading 64-layer 3D TLC NAND technology, the newly released solutions enable greater capacity in a smaller space, delivering up to 30 days of surveillance video storage in the camera itself. Over 98 percent of all microSD cards sold globally in 2017 were used in consumer applications, according to IHS Markit Industrial microSD cards Over 98 percent of all microSD cards sold globally in 2017 were used in consumer applications, according to IHS Markit. These consumer-grade memory cards are not designed and validated for commercial use in video surveillance applications. Micron’s industrial microSD cards are designed specifically for professional video surveillance use cases and include a three-year warranty for 24x7 continuous video recording usage. The Micron microSD card design and firmware is optimised to ensure a reliable, robust and low-maintenance system design that delivers 24x7 continuous recording capability with minimum video frame drops. Due to a lack of surveillance-grade solutions, organisations have relied on the use of retail microSD cards that are not optimised for 24x7 recording" “Due to a lack of surveillance-grade solutions, organisations have relied on the use of retail microSD cards that are not optimised for 24x7 recording. As a result, these cards may fail earlier and also experience video frame drops as high as 30 percent,” said Amit Gattani, Sr. director of embedded segment marketing at Micron. “With a strong industry trend toward more analytics and artificial intelligence (AI) in surveillance cameras, there is a growing demand for higher reliability and higher density storage in the cameras. Micron is addressing this need with industry-leading density of 256GB in a surveillance-grade microSD card.” Edge Storage: Industrial-Quality Storage Designed for Professional Video Surveillance Applications Micron’s industrial microSD cards are specifically designed for IP video surveillance workloads and feature: Storage densities of 256GB, 128GB, 64GB, and 32GB, which enable more video to be stored at the edge, giving system designers increased flexibility Over three years of high-quality, continuous, 24x7 video recording3 in a wide range of temperatures and environments Technology for the cards to self-monitor and provide information on card usage and expected useful life remaining for each card Special firmware designed for continuous video recording, which minimises frame drops and video loss A two million hours mean-time-to-failure (MTTF) or 0.44 percent annualised failure rate (AFR), which is equal or better than most surveillance Hard Disk Drive4 High demand for video surveillance cameras According to IHS Markit5, demand for professional video surveillance cameras continues to grow rapidly According to IHS Markit5, demand for professional video surveillance cameras continues to grow rapidly. It forecasts that over 130 million professional video surveillance cameras will be shipped in 2018, up from about 100 million in 2016. Following Micron’s release of increased capacities for their surveillance grade offerings, many leading professional video surveillance providers have adopted and deploying the solutions across their products with great success. “We are pleased that Micron is addressing the surveillance market with high reliability and high-performance edge storage products,” said Zhiming Li, product director at Dahua Technology. “Micron’s new 256GB industrial microSD card now enables use of edge storage as the primary storage in many SMB solutions and secondary storage in Enterprise solutions, enabling system integrators to optimise solution design, increase deployment flexibility and lower total cost of ownership.” Surveillance cameras are now deployed everywhere in highly distributed environments like smart cities and smart infrastructure" Edge storage of video and analytics data “Surveillance cameras are now deployed everywhere in highly distributed environments like smart cities and smart infrastructure. Edge storage of video and analytics related data in the surveillance camera gives unique flexibility to system integrators in optimising the systems for performance and cost,” said Yul Pi, product collaboration director at Infinova. “Micron’s new ultrahigh density microSD cards bring the reliability and performance required for surveillance systems.” “The IP surveillance market continues to grow rapidly across all verticals and has created a rising demand for high-performance and reliable video storage. Recognising this increasing need, VIVOTEK has deployed Micron’s new ultra-high-density microSD cards in our products to provide effective edge storage-based solutions for both SMB and Enterprise use case that enhance design flexibility and optimise system resources and total cost of ownership,” said Shengfu Cheng, director of marketing and product development division at VIVOTEK INC. “It’s important to adopt high-quality, surveillance-specific microSD cards, and we are pleased that Micron is leveraging its 3D flash memory leadership to deliver an optimised solution for this industry.” Small to medium businesses will drive significant growth in the coming years in the video surveillance-as-a-service market” Ultra-high-density edge storage solutions “Small to medium businesses will drive significant growth in the coming years in the video surveillance-as-a-service market,” said Jon Cropley, senior principal analyst for video surveillance at IHS Markit, a global business information provider. “Currently, these organisations typically rely on backend recording solutions for data storage. However, an increasing number of systems are available that do not require local network video recorders. The emergence of high-density edge storage has played a major role in this.” Micron understands launching ultra-high-density edge storage solutions based on 3D flash memory technology will change the way video is captured and stored" “Micron understands surveillance application cases and launching ultra-high-density edge storage solutions based on 3D flash memory technology will change the way video is captured and stored in future surveillance deployments,” said David Huang, president of GeoVision, US division. “We view our collaboration with Micron as a way to leverage edge storage to improve flexibility in solution designs and deployments while effectively bringing down the total cost of ownership for our customers.” Pricing and availability The 128GB ($59 MSRP) and 256GB ($119 MSRP) versions of the Micron Industrial MicroSD Cards are available now for ordering through Micron global distribution channels. Micron is also showcasing the new 256GB Edge Storage solution at Security Industry Association's (SIA) New Product Showcase at ISC-West trade event in Las Vegas on April 10th, 2018.
Micron Technology, Inc. has announced a full portfolio of edge storage solutions for video surveillance that will enable new deployment models and reduce total cost of ownership for both commercial and enterprise use cases. The new industrial-grade microSD products will be available in 2018 and will leverage Micron's 3D NAND technology, providing up to 256GB of ultra-high-density storage. Freedom in video surveillance design Micron's new solutions give system designers unprecedented freedom in the design of large distributed video surveillance systems. This architectural approach enables large amounts of video to be stored at the network edge, with a unique level of reliability for 24x7 video recording. In addition, Micron has also announced collaborations with the Shenzhen Security and Protection Industry Association (SSPIA) and China channel partner, Jinyu Global, to speed deployment of the new Micron-based solutions regionally. "The video surveillance industry is unique as its customers demand consistent recording performance over years of use," said Jeff Bader, Vice President of the Embedded Business Unit at Micron. "Edge storage improves the economics of this high-growth market and delivers value for camera OEMs, system integrators and end customers by improving video quality and increasing network reliability. Our collaborations with Jinyu and with the industry association in Shenzhen will help ensure that Micron is aligned with industry standards while expanding its storage offerings and presence in China and beyond." Micron has announced collaborations with theSSPIA and China channel partner Jinyu Global Edge video of the future Edge video — defined by the ability to store data or video content within a camera versus in a centralised recording facility across the network — is the future of IP video surveillance applications. By leveraging Micron's highly reliable local microSD card storage, system integrators can optimise designs that factor in IP network load and capacity availability, recording redundancy and mobile access. Additionally, IHS Markit, a global business information provider, forecasts that the global market for video surveillance equipment will be worth $19.7 billion in 2020*. Higher densities of highly-reliable storage Most microSD cards are designed for consumer applications, such as digital cameras and car dash cams, and are not suitable for continuous, 24x7 recording over years in harsher environments. In contrast, the new Micron industrial microSD cards are designed specifically to meet the demands of surveillance edge storage use cases and feature: Storage densities of 32GB, 64GB, and forthcoming ultra-high-densities of 128GB and 256GB, which enable more video to be stored at the edge, giving system designers increased flexibility Over three years of high-quality, continuous, 24x7 video recording in a wide range of temperatures and environments Technology for the cards to self-monitor and provide information on card usage and expected useful life remaining for each card Special firmware designed for continuous video recording, which minimises frame drops and video loss The ultra-high-density products are possible because of leading-edge process technology — in this case, 64-tier 3D NAND technology produced at Micron's Singapore labs. This technical leadership is enabling Micron to introduce innovative storage solutions for new markets, such as industrial video surveillance. Ecosystem enablement for partner innovation Accelerating industry momentum for the system solutions, Jinyu Global has seen early customer success. Additionally, Micron is entering into a strategic collaboration with SSPIA as a technology advisor and will work jointly with the association to provide cutting-edge solutions to China's surveillance industry. "This edge storage solution will change the way video is captured and stored in future surveillance deployments" "We are excited to add Micron edge technology to our portfolio of surveillance storage solutions," said Charles Zhang, vice president for Jinyu. "This technology will help educate system designers and solution providers to understand the value of integrating edge storage into future projects to increase reliability and lower TCO." "Micron truly understands surveillance use cases, and launching edge storage solutions on advanced flash memory technology will change the way video is captured and stored in future surveillance deployments," said Michael Yang, Vice President for SSPIA. "We view our strategic technical collaboration with Micron as a way to educate and promote edge storage, and to better meet China's future needs in video surveillance." Availability "Customers across Europe are increasingly asking for edge storage to meet the demanding requirements of 24x7 recording," said Michaël Uyttersprot, Technical Marketing Manager, EMEA Embedded Vision at Avnet Silica. "They are also asking for higher densities that will enable longer timespans of video surveillance footage to be retained in cameras at the edge. We look forward to discussing how Micron's 3D NAND addresses these needs at the upcoming SecTech show in Sweden." The 32GB and 64GB versions of the Micron industrial microSD cards are available now. The 128GB and 256GB versions are scheduled to begin general sampling in early 2018 and volume shipments by the second quarter of 2018.
Related white papers
Hybrid hyperconverged systems benefit growing storage and retention needs
Five things to consider for AI with video technology
Making your surveillance cyber secure
How to ramp up perimeter security with license plate reader technologyDownload
Solve access control challenges in the healthcare sectorDownload
Getting the most value from Software Subscription AgreementsDownload
Shifting trends in operation centers and control rooms for 2021Download
- Ava Security highlights ways to protect commercial properties and safeguard people
- Ava Security provides improved security and customer experience with advanced analytics for the retail sector
- HPE enhances data storage solution for the Irish Prison Service along with Scality and CTERA
- IDIS video surveillance solutions strengthens the video infrastructure of Newman University