SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Video surveillance
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Factors to consider when choosing a video storage system

Factors to consider when choosing a video storage system
Wayne Arvidson
Wayne Arvidson
Contact company
Contact Quantum Corporation
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Choose video-optimised storage systems for effective surveillance data management and retrieval.
  • Adopt multi-tier storage to balance surveillance system capacity, performance, and cost.
  • Ensure file systems integrate with VMS for seamless video access in surveillance operations.
Related Links
  • 6 reasons preconfigured NVR appliances can boost the performance of video surveillance systems
  • Benefits and challenges of omnidirectional cameras in video surveillance market
  • 13 tips for security and IT professionals to keep IP video surveillance networks secure
  • Video surveillance storage: What decision makers and integrators need to know
  • Improving healthcare security with modern surveillance technologies

What do users want from their surveillance system? Ask any security professional, and you will hear answers like these: sharp, high quality images; widespread camera coverage; real-time analytics; fast search and retrieval of video footage with minimal, if any, intervention from people in the information technology department.

In other words, they want the tools they need to do their job. Delivering those tools requires an underlying technology infrastructure that includes a storage file system—preferably, one designed for video applications.

How do you know if one storage solution is better suited for video than another? What makes a file system ideal for video applications? There are several factors to think about.

Optimising for write operations

What type of work do you expect the storage system to perform? It’s important to know because some systems are designed to handle certain types of work better than others.

Traditional information technology (IT) workloads consist of high volumes of transactions. Files are written to disk and then many read operations are performed. File systems that are optimised for read operations perform well for this type of workload, but they are not ideal for surveillance systems.

Surveillance workloads are different from typical transaction-based workloads. Streaming video and sensor data, from a network of hundreds or even thousands of multifunction cameras, flows continuously. Video management software (VMS) is used to manage the process—from image acquisition through visualisation, analysis, and storage—while performing real-time analytics and metadata generation.

According to IHS, adoption of network cameras is moving quickly, and unit shipments of HD cameras are increasing

In storage terms, that means the file system should be optimised for write operations, not read operations. To perform well, the file system must be capable of ingesting streaming video from many cameras concurrently and performing simultaneous write operations without creating input/output bottlenecks.

Multiple tiers of video storage

How much storage capacity is needed to support a surveillance system? It depends on how many cameras are installed, what type of cameras they are, and how long the video must be retained.

High-definition (HD) cameras require more storage than analogue cameras. Thanks to dropping camera prices, more organisations are replacing older cameras with digital units and expanding their surveillance coverage. According to IHS, adoption of network cameras is moving quickly, and unit shipments of HD cameras are increasing. By the time we reach 2019, according to IHS, 2.5 exabytes of surveillance data will be produced every day.

Since storage costs can account for as much as 60% of the budget for a surveillance system, the storage configuration must balance capacity, performance, and cost. That’s best accomplished by implementing multiple tiers of storage where older video files can be stored on a lower cost medium such as tape. The way files are managed between tiers, however, can make a big difference when working with video.

Managing video data storage

What method does the file system use to manage data and storage? The advantage of a multi-tier storage architecture is that you can make better use of high-performance disk by moving older files off to tape, lowering your storage costs, but still be able to retrieve them later if needed.

Many information technology-centric storage solutions use a process called information lifecycle management (ILM) to manage data and storage. With ILM, usage policies are created for files. When the policy conditions are met, the file is moved to another tier of storage using an archive or data mover application.

Since storage costs can account for as much as 60% of the budget for a surveillance system, the storage configuration must balance capacity, performance, and cost
Thanks to dropping camera prices, more organisations are replacing older cameras with digital units and expanding their surveillance coverage

This process is not ideal when working with video. High-resolution cameras generate large files. When ILM policy conditions are met, the video files are copied across the same ingest network to another tier, which impacts system performance. To lessen the impact, the data often is saved to a lower resolution (a process called grooming) before it is moved.

Using the ILM method, if a file resides on archive storage, it must be restored back to the VMS system before it can be searched. That adds complexity and time. Plus, if the file has been groomed, the image quality is not as clear and sharp because of the lower resolution.

File systems for video surveillance

When security professionals need to access recorded video, they want an easy way to search, find, and view it at the highest image quality possible, regardless of where the files are stored. Working in the timeline is important to security professionals. They want to perform their job from within the VMS application, not bounce between the VMS and an archive or data mover application to restore files.

Using the ILM method, if a file resides on archive storage, it must be restored back to the VMS system before it can be searched

File systems designed specifically for video applications meet these criteria. Like ILM, multiple tiers of storage are incorporated, and usage policies dictate when files are moved between tiers. The method used to manage data and storage, however, is better suited for video files.

These file systems can write multiple copies of the files at the same time. For example, when a file is written to disk it is simultaneously written to a tape device residing on a separate network. That way, when the usage policy is met, the data doesn’t need to be groomed and copied across the ingest network; the copy already resides on tape, so the storage management software just releases the blocks on disk, avoiding any performance issues.

Choosing file systems for video performance

In addition, file systems designed for video applications are integrated with the VMS software and don’t require a separate archive or data mover application to move files between tiers. From the user’s perspective, they see one drive letter—a single name space—that represents all storage, instead of separate drive letters for each tier. That makes searching files easier. Plus, if the file that a user wants resides on tape, it doesn’t have to be restored before it can be searched. The user works within the VMS system without worrying about where the file is located, and the storage management software does the rest.

Evaluating a file system to determine if it will perform well for video applications requires digging into the details. You need to examine the architecture and understand how the file system operates – but the results are worth the effort.

Which of the following do you MOST want from your video surveillance system?

33.3%

26.7%

0%

40%

0%

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Digital video surveillance
  • Security cameras
  • Network cameras
  • Security software
  • Video compression
  • HD CCTV
  • Video Management System
  • Data Security
  • Video surveillance
  • Related links
  • IP Surveillance Software CCTV software
  • Management Software CCTV software
  • Recording Software CCTV software
  • Articles by Wayne Arvidson
  • Related categories
  • CCTV cameras
  • Digital video recorders (DVRs)
  • CCTV software
  • IP cameras
  • Video servers (IP transmission)
  • Network video recorders (NVRs)
  • Storage
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Understanding AI-powered video analytics

Understanding AI-powered video analytics

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
Related articles
IDIS launches new AI PTZ cameras for enhanced security

IDIS launches new AI PTZ cameras for enhanced security

Everon & Alarm.com unify commercial security solutions

Everon & Alarm.com unify commercial security solutions

Axis joins CISA Secure by design for cybersecurity

Axis joins CISA Secure by design for cybersecurity

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Video surveillance
  4. News
  5. Expert commentary
About this page

Discover crucial factors for selecting the ideal video storage system, optimising performance, and ensuring data protection in surveillance systems.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec