Security Technology Executive

FEB-MAR 2018

Issue link: https://securitytechnologyexecutive.epubxp.com/i/956571

Contents of this Issue

Navigation

Page 36 of 61

www. SecurityInfoWatch.com • Februar y/March 2018 • SECURIT Y TECHNOLOGY E XECUTIVE 35 Member: AFA, DASMA, NAA, IDA, NOMMA, NPA, SIA, SSA, CANASA Parking Control Access Control Telephone Entry Gate Operators for more information doorking.com 800-673-3299 info@doorking.com Parking Control Telephone Entry Virtual Card Access Control Solutions Now you can program and operate your Residential 1812i or Commercial 1802i from anywhere, with the DKS mobile app. Choose the 1802i for a directory and use of up to two card readers. 1812 i and 1802 i Streamline the entry process with the new 1835 and 1837 Telephone Entry Systems with a built-in Card Reader. The DKS Virtual Card turns mobile devices into secure Access Cards, simply scan the supplied non- transferable QR code. High security MIFARE cards are also available for those who want a physical card. 1802 i Launching Summer 2018 DC Gate Operators For versatility without loss of power, the 9000 series of Commercial DC Gate Operators is available with a solar power option. The surface mount 1601 Barrier Gate Operator is the ideal formidable barrier where a higher degree of safe vehicle traffic control is desired. Request information: www.SecurityInfoWatch.com//10213482 tiers. That's because the long-term storage tiers grow as retention policies change and new applications for video data are uncovered, even if the ingest require- ments remain consistent. Another benefit of a multi-tier storage design is that it's scalable. You can start small and increase storage capacity over time by adding more nodes to your configuration without disrupt- ing the system. For example, you could start with a 100-camera, 500 TB system and scale it to a 1,000 camera, 8 PB system without any major disruption to your opera- tion, utilizing a consistent set of components. Accessibility is also a key factor. Security professionals want to be able to find the video they need, no matter what day of retention it is, hopefully without resorting to another application or their IT department. By utilizing the right type of file system to create a tiered infrastructure the benefit of working in the timeline is real- ized as one doesn't need to leave the VMS application to retrieve footage, no matter if it is on disk, tape, or stored in the cloud. Storage Represents a Strategic Opportunity Before a video surveillance system is implemented, a lot of decisions must be made. How many cam- eras will be needed? Where will they be installed? What specifi- cations are required? What are the connectivity and bandwidth requirements? There are many others, of course. But perhaps the most important decision is where to store the footage. End users are faced with a growing storage challenge. And not just with video surveillance data. According to the ESG sur- vey, 47 percent of respondents said unstructured data makes up more than half of their total capacity, and 46 percent said their unstructured data is growing more than 20 percent every year. The challenge to the end user is two-fold, not only how to structure a viable storage solution, but how to address the larger challenge of managing the growing volume of unstructured data. Having a well thought out technol- ogy roadmap for your video strategy in addition to having a trusted integrator partner to plan, implement and service the system once it is installed will ensure a successful and cost-effective project.

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - FEB-MAR 2018