In the past few weeks, we’ve explored the ways in which IP surveillance is changing the face of security. First, we discussed cameras as a system, the influx of built-in analytics and 3-dimensional cameras . Then, we talked about day/night capabilities, changes in resolution, frame rates, omnidirectional and light-field cameras. In the third and final installment of our series, we delve into developments in storage, transmission and data security.
Larger amounts of data are being recorded and stored than ever before from IP cameras, and IT and security departments have lowered the costs of keeping and recalling mass amounts of video camera footage by investing in cutting-edge surveillance storage techniques, such as on-board storage, Cloud storage or virtual servers. On-board storage equips individual video surveillance cameras with the ability to store high quality video for a certain period of time, so that lower quality video can be archived, hence lowering overall storage costs. These cameras can currently hold up to 256MB cards, but some are being tested with up to 2TB.
More cameras will integrate with monitoring systems to store video directly in the Cloud, which allows for lower on-site infrastructure requirements, which provides significant savings in power and cooling costs as well as environmental waste.
Many industries have made great strides in wireless transmission technology to make life easier (think wireless speakers, charging stations or headphones as a few examples). The security industry is uniquely positioned to take advantage of secure wireless capabilities for remote video surveillance and perimeter protection in areas previously unreachable to surveillance, such as critical infrastructure and warehouses. These technologies will also go a long way in reducing trenching and cabling costs as well as improving our global carbon footprint.
The growing usage of wireless technologies, as well as digital or cloud storage for video surveillance cameras have pushed camera companies to address cyber security and comprehensive data protection efforts. Last year, thousands of video streams were hacked into and broadcast on a public website, compromising the physical security of millions of individuals and of sensitive data. As we continue to innovate the gathering and storing of data through the IP network, stronger encryption standards and methods will become a top priority in preventing intrusion, data corruption or theft, virus protection and physical incidents for corporations and surveillance initiatives.
Overall security will also be enhanced by integrating surveillance access control, identification and biometric systems as internal vetting processes to prevent critical data from falling into the wrong hands.