Sunday, May 26, 2019

Globally Tailgating is common problem

Globally Tailgating is common problem

One of the biggest weaknesses of automated access control systems is the fact that most systems cannot actually control how many people enter the building when an access card is presented. Most systems allow you to control which card works at which door, but once an employee opens the door, any number of people can follow behind the employee and enter into the building. Similarly, when an employee exits the building, it is very easy for a person to grab the door and enter the building as the employee is leaving.
This practice is known as "tailgating" or "piggybacking". Tailgating can be done overtly, where the intruder makes his presence known to the employee. In many cases, the overt "tailgater" may even call out to the employee to hold the door open for him or her. In these cases, good etiquette usually wins out over good security practices, and the intruder is willingly let into the building by the employee.

Tailgating can also be done covertly, where the intruder waits near the outside of the door and quickly enters once the employee leaves the area. This technique is used most commonly during weekends and at nights, where the actions of the more overt tailgater would be suspicious.

Solutions To The "Tailgating" Problem

First, recognize that the tailgating problem is probably the biggest weakness in your security system. This is particularly true at doors that handle a high volume of employee and visitor traffic. Many security managers spent a lot of time worrying about unauthorized duplication of access cards and computer "hackers" getting into their security system over the network. It is far more likely that someone who wants access to your facility will simply "tailgate" into the building rather than using one of these more exotic methods to breech your security.

The practice of overt tailgating can be reduced somewhat through employee security awareness training. If employees are frequently reminded of the tailgating problem, they are less likely to let a person that they do not know into the building deliberately.

It is difficult to overcome the problem of covert tailgating through employee security awareness alone. While it would be possible to ask employees to wait at the door until it locks after they pass, it is probably not likely that this procedure would be followed except under the most extreme circumstances.

You can follow this link http://arindamcctvaccesscontrol.blogspot.com/2015/11/anti-passback-in-access-control-systems.html "Regular access control is more than adequate for standard control at entry points. Use anti-tailgating systems to address a specific problem that could or has happened" says Arindam Bhadra.


The problem of covert tailgating can usually only be reliably solved through the use of special "anti-tailgating" devices.

"Anti-Tailgating" Devices

To minimize the problem of tailgating, the security industry has created a number of "anti-tailgating" devices. These devices include mechanical and optical turnstiles, security revolving doors, security portals, and doorway anti-tailgating devices.

The essential function of each of these devices is that they permit only one person to enter or leave the building at a time. They either do this by providing a physical barrier that only allows one person to pass, or electronically by providing sensors that detect when a person attempts to tailgate in, or when more than one person tries to enter using the same card.

The following is a brief summary of each of the common types of anti-tailgating devices:

HALF-HEIGHT MECHANICAL TURNSTILE
Description: Rotating mechanical barrier arms installed at waist height prevent passage through opening. Electrically-controlled, using valid access card causes arms to unlock allowing passage of one person. Turnstile can be controlled in both directions, or allow free-passage in one direction.


Approximate cost: ₹ 4, 50,000 to ₹ 5, 50,000 per opening.
PROS: Lowest cost anti-tailgating device, readily accepted by most users, relatively unobtrusive, well-proven and reliable.

CONS: Can easily be climbed over or under, requires separate door or gate for emergency exit and for handicapped users, easily defeated by knowledgeable intruder, can be somewhat noisy when operated.

Comments: Good choice for use at visitor lobbies or employee entrances where cost is a consideration. Works best when turnstile can be observed by security officer or receptionist to allow detection of people climbing over or under the device.

FULL-HEIGHT MECHANICAL TURNSTILE
Description: Rotating mechanical barrier arms installed to prevent passage through opening. Extends from floor to height of approximately eight feet. Electrically-controlled, using valid access card causes arms to unlock allowing passage of one person. Turnstile can be controlled in both directions, or allow free-passage in one direction.

Approximate cost: ₹ 14,50,000 to ₹ 15,50,000 per opening.

PROS: Provides good security at a moderate cost. Well-proven and reliable.

CONS: Obtrusive in appearance, requires separate door or gate for emergency exit and for handicapped users, lacks sophisticated anti-piggybacking detection features, can be somewhat noisy when operated.

Comments: Good choice for commercial and industrial facilities where security and cost considerations are more important than appearance.

OPTICAL TURNSTILE
Description: Consists of two freestanding pillars mounted on each side of opening. Equipped with electronic sensor beams that transmit between pillars. Passing though opening interrupts sensor beam and causes alarm unless valid access card has first been used. Sensor beams are connected to computer processor that detects when more than one person attempts to pass though opening on a single card. Turnstile can be controlled in both directions, or allow free-passage in one direction. Available with or without mechanical barrier arms and in a wide variety of styles and finishes.

Approximate cost: ₹ 20, 50,000 to ₹ 25, 50,000 per opening.

PROS: Aesthetically-pleasing appearance, accommodates handicapped users, does not require separate emergency exit, has sophisticated anti-piggybacking detection systems, provides good visual and audible cues to users.

CONS: Expensive, units without barrier arms provide no physical deterrent, must be used at an entrance manned by security guard, relatively high "false alarm" rate, some user training required to work effectively.

Comments: Good choice for use in manned building lobbies where aesthetics prevent the use of a half-height manual turnstile.

SECURITY REVOLVING DOOR
Description: Standard revolving door that has been specially modified for security use. Extends from floor to a height of approximately eight feet. Typically has multiple quadrants equipped with electronic sensors that detect number of people in each quadrant. Use of valid access card allows one person to pass through door, if more than one person attempts to enter, door sounds alarm and reverses to prevent entry. Door can be controlled in one or both directions.

Approximate cost: ₹ 70,00,000 to ₹ 75,00,000 per opening.

PROS: Provides best protection against tailgating and piggybacking, fast, handles high volumes of traffic, unobtrusive in appearance, provides energy savings when used at exterior entrances.

CONS: Very expensive, requires separate door or gate for emergency exit and for handicapped users, door cannot be used for loading/unloading of large objects, relatively high maintenance costs.

Comments: Good choice for use at unattended building entrances where appearance is important.

SECURITY PORTAL (also called "Security Vestibule" or "Mantrap")
Description: Consists of passageway with door at each end. Regular swinging doors or automatic sliding doors can be used. Passageway is equipped with sensors that detect total number of people present. Sensors can include electronic beams, floor mat switches, and weight detectors. Video cameras with analytic software can also be used (see video analytics below). To use, user enters passageway and closes door behind him. He then proceeds to second door, and uses access card to enter. If more than one person is present in passageway, portal sounds an alarm and prevents entry. Portal can be controlled in one or both directions.

Approximate cost: ₹ 18,50,000 to ₹ 21,50,000 per opening.

PROS: Provides good protection against tailgating and piggybacking, unobtrusive in appearance, accommodates handicapped users, does not require separate emergency exit, allows load/unloading of large objects.

CONS: Expensive, relatively slow, cannot support large volumes of traffic, some versions can have high maintenance costs.

Comments: Good choice for use at unattended building entrances with relatively low traffic volumes and for entrances into high security internal areas, such as computer rooms.

DOORWAY ANTI-TAILGATING DEVICE
Description: Consists of devices installed on each side of regular doorway. Equipped with electronic sensor beams that transmit between devices. Passing though opening interrupts sensor beam and causes alarm unless valid access card has first been used. Sensor beams are connected to computer processor that detects when more than one person attempts to pass though opening on a single card. Doorway can be controlled in both directions, or allow free-passage in one direction.

Approximate cost: ₹ 6,00,000 to ₹ 7,00,000 per opening.

PROS: Easy add-on to existing doors; provides good protection against tailgating and piggybacking, unobtrusive in appearance, accommodates handicapped users, does not require separate emergency exit, allows loading/unloading of large objects, relatively inexpensive.

CONS: Must be used at an entrance manned by security guard, does not provide good visual and audible cues to users, some false alarms.

Comments: Good choice for use at doorways with relatively low traffic volumes and where conditions do not permit the use of another type of device.

VIDEO ANALYTICS ANTI-TAILGATING SYSTEMS

Description: Consists of video cameras installed at doorway opening. Cameras are connected to a computer with special video analytics software that detects and analyzes people and objects at the door. System may use multiple cameras that allow precise determination of object size, height, and direction of travel. When used at single door, video analytics anti-tailgating systems work similarly to doorway anti-tailgating devices and sound alarm when more than one person attempts to enter through door after a valid access card has been used. Video analytics anti-tailgating systems can also be used with security portals to both sound alarm and deny access when more than one person attempts to enter.
Approximate cost: ₹ 3,50,000 per opening for single door system, ₹ 12,50,000 to ₹ 15,50,000 for security portal system.

PROS: Easy add-on to existing doors; provides good protection against tailgating and piggybacking, unobtrusive in appearance, accommodates handicapped users, does not require separate emergency exit, allows loading/unloading of large objects.

CONS: Single door systems do not provide a physical barrier so must be used at an entrance manned by security guard, requires frequent user training to prevent false alarms, relatively expensive.

Comments: Popular choice for use at computer rooms and other high-security facilities.

Selecting the Right Anti-Tailgating System

Choosing the right anti-tailgating system is an important decision. You need to consider your overall level of security risk, your ability to provide security staff to monitor your entrances and respond to alarms, and your budget for initial purchase and ongoing maintenance of the anti-tailgating systems.

Artical Publish by Safe Secure Magazine in the month of May 2019 issue.

Sunday, May 5, 2019

8-steps System Integration Model

8-steps System Integration Model

BEMS, BMS, BAS, EMCS, and this list goes on and on. Welcome the acronym-filled wasteland know as building automation. What you are about to read may seem high-level, but I promise if you follow these steps you will take your skills to the next level. Let’s begin.
One of the persistent challenges I hear from my audience is around the topic of systems integration. Automated Buildings readers you’re in luck! Today I am going to give you a high-level overview of my 8-step process for systems integration.

The Systems Integration Model
Using this process I have personally done some of the most complex integrations in the smart building space.

OPC integration bringing 13 different Building Automation systems AND THEIR DATABASES into a single front end. Check!
Tying together Lighting, Physical Security, Video Management, BAS, Maintenance Management Software, and Google Calendars for scheduling. Check!
Writing applications that consume XML data feeds from clinical systems and then convert this data into a BAS system. You Bet!
What you are about to read may seem high-level, but I promise if you follow these steps you will take your skills to the next level. Let’s begin.

Step #1: Define the Business Challenge 
This may seem like an odd step especially for technical folks. The reality is without defining the business challenge you will never get adoption and support from all of the different stakeholders.


Step #2: Create the Use Case 
Now that you have defined the business challenge you need to create the use case. I prefer to use the UML modeling method for my use cases but you can use whatever method you and your customer are comfortable with. The key point is to:

·         Capture what the outcome is
·         How the outcome is reached
·         Who is taking the action
·         What action they are taking

Step #3: Identify the Systems 
You now have a functional use case. We will now begin to dive into the technical aspects of integration. It is here that you will go and dig into the use case and identify the systems that are being used. You need to be very detailed in this step. Often times there will be systems that are being used that are not called out in the use case. You want to:

·         Identify the systems in the use case
·         Identify any systems required but not detailed in the use case
·         Identify any people in the use case

Step #4: Detail out the Data Flows
Now that we have the systems detailed out we need to define our data flows. Where is data flowing? I like to use Crow’s Foot notation to show how my data flows are laid out. Essentially what you are trying to do at this point is to detail out:

·         Who is the master system and who is the slave system
·         Which way data flows in the integration
·         If the data will be one-to-one, one-to-many or many-to-many

Step #5: Build the Data Model
Great! We know which way data is flowing. Now we need to detail out our data model. 

What points do we need from each system? 
How will the points be formatted? 
What protocol will the points use? 
It is here that we detail out our “data model”. For this I like to use the UML class diagram. It may seem like overkill but a class diagram is a great tool to avoid having systems that won’t map to one another.

In the class diagram I map out:
·         The points that will be available at each system
·         How the points are formatted
·         The frequency of the points being sent

Step #6: Map out the Network Connections
Naturally we need to send data to and from our systems. The way we do this is via the network. Now you may be wondering why I waited to do a network map until now.

The reason I waited is because I wanted to know which systems needed to talk with one another. By first detailing out my data models and my data flows I defined who really has to talk to who. 
Many folks will look at the use case and immediately start mapping out their network connections. This results in people missing key systems that the use case did not actively mention.

Step #7: Prepare the Physical Integrations
It is at this point that we will want to begin to prepare the physical integrations. Here we will setup any integration cards, protocol gateways, etc. At this point in the process you should have a clear path to finishing your integration. This step usually includes:

·         Setting up any integration gateways
·         Configuring IP addresses
·         Working with IT to get any routing setup

Step #8: Implement the Integration
This almost isn’t a step! You simply need to implement your network map and data model. Really at this point you simply need to show up and coordinate the other vendors. It’s funny to me because this is the step so many people try to do first and then they wonder why this step is so hard. 

Honestly, if you’ve done each of the steps up to this point this step should be a non-event.
Artical Publish by Safe Secure Magazine in May 2019 edition.

Sunday, April 28, 2019

Interference issue in CCTV due to Grounding

Interference issue in CCTV due to Grounding

Most of small size CCTV installation faces various type of interference issue. Most of Home, jewellery shop, grocery shop, youth hostel …… etc.

There are several factors that can cause interference problems in a security camera. Below is a list of some of them:
1. Use of improper power supply.
2. Use of poor quality cables
3. Use of poor quality cameras
4. Use of poor quality converters
5. Incorrect grounding
6. Camera Warm Up
7. Poor connections
​8. Lack of adequate lighting

In this article we understand Famous issue 5. Incorrect grounding.


If grounding is done improperly, you may see bands rolling on the screen, if this is the case, there is an interference problem called the ground loop.
This problem basically occurs when the camera, DVR or power source groundings are made at distinct points that have different resistances, this causes an effect called a ground loop.
To solve the ground loop problem simply ground the equipment to the same common point (ground bus) or leave one side (camera) without contact with the ground.

A practical example would be to place a wood, plastic or other insulation material on the back of the camera mounting bracket so that it does not come in direct contact with the post or wall that is installed.

Now only that if we rectify Earth & Neutral line of main voltage, the issue is rectified.
Neutral:
Neutral is the normal”return” wire.
In systems where the load is supplied from only one Hot (or “Live”) wire, the Neutral completes the circuit and carries current back from the load to the power station.
Neutral is a conductor that carries current in normal operation.
Neutral represents a reference point within an electrical distribution system.

Earth:
Earth or Ground wire is a safety protective wire for the human body and electrical equipment from fault conditions.
Earth is a conductor that carries no current in normal operation.
Earth is a conductor that carries current under fault conditions such as insulation breakdown that occurs within electrical equipment.

In a polyphase (usually three-phase) AC system, the neutral conductor is intended to have similar voltages to each of the other circuit conductors, but may carry very little current if the phases are balanced.
The United States' National Electrical Code and Canadian electrical code only define neutral as the grounded, not the polyphase common connection. In North American use, the polyphase definition is used in less formal language but not in official specifications. In the United Kingdom the Institution of Engineering and Technology defines a neutral conductor as one connected to the supply system neutral point, which includes both these uses.

As per Indian CEAR (Central Electricity Authority Regulations, CEAR came into effect 20 September 2010, in place of The Indian Electricity Rules, 1956.) neutral conductor means that conductor of a multi-wire system, the voltage of which is normally intermediate between the voltages of the other conductors of the system and shall also include return wire of the single phase system.

All neutral wires of the same earthed (grounded) electrical system should have the same electrical potential, because they are all connected through the system ground. Neutral conductors are usually insulated for the same voltage as the line conductors, with interesting exceptions.

Keep in mind The camera also requires a minimum current, which is usually less than 1A (ampere) for our example of a traditional CCTV camera.



The indication of the electrical current required for the camera to operate must be in the product manual, consult your distributor to be sure about the consumption of the camera, because in some cases with the use of infrared illumination the required current may be higher.

May this issue you face during final commissioning or after handover. Solutions remain same.

Sunday, April 14, 2019

Know about BMS technical protocols

BMS - What you should know about technical protocols

If you or a client is choosing a building management system (or BMS), it’s important to understand how it communicates information with digital devices such as controllers, meters, and input/output boards, and computers.

The details are important because some BMS use languages—or technical protocols—that lock you into using their vendor’s proprietary technology. Use of such protocols may force you and your client to pay higher prices for software and hardware available from only one vendor or its licensees.

This article describes common categories of BMS protocols. It recommends that you avoid proprietary protocols and favor more open ones.

A BMS communicates through protocols
To exchange data, digital devices must use a common data structure and a common channel or medium of communication.

The figure below shows a master BMS that communicates with devices that use microprocessors. They include a roof-top unit (or RTU), refrigeration controllers, energy meters, and other input/output boards within a building. The building controller also uses the Internet to share temperature, operating parameters, or energy data with remote users through enterprise servers or personal computers.
A BMS protocol defines the format and meaning of each data element, in much the same way a dictionary defines the spelling and meaning of words.

The data exchange often occurs through a physical wire such as a twisted-pair RS485 or an Ethernet CAT5 cable). It may also occur wirelessly over wi-fi network, through an internet protocol (or IP).
The phrase “BACNet over IP” means the BACNet protocol communicates through an IP network.
Some protocols are more open than others
Protocols fit in one of four categories, depending on their relative “openness:”
1.       Open. The protocol is readily available to everyone.
2.       Standard. All parties agree to a common data structure. The protocol may be an industry standard, such as BACnet and Modbus.
3.       Inter-operable. The protocol is vendor agnostic. A controller from one vendor can replace one from a different vendor.
4.       Proprietary. The data structure is restricted to the creator of the device.

Why you want BMS with open protocols
A BMS with proprietary protocols locks the system owner into using a single BMS vendor. For example, you can’t remotely change the set points of a proprietary BMS unless you use the vendor’s software.
In contrast, with open and standard BMS protocols you can shop for alternative providers of digital devices and enterprise software.

This is why use of proprietary protocols is inconsistent with best practice. The lesson is clear:
In choosing a BMS, be sure its protocols are not proprietary.

How to know whether a BMS protocol is open
To determine whether a BMS protocol is open, ask the vendor two simple questions:
1.       Can your competitors exchange data with your BMS?
2.   Is the system’s protocol published in such a way that it’s easily accessible to everyone (including competitors)?

Best open protocols: BACNet, Modbus, and XML
For a master controller that exchanges data with devices and meters within a building, prefer the BACNet, Modbus or any other standard protocol. Otherwise, make sure it’s at least open enough so anyone with proper security access can read and write information.

For remote enterprise access (protocol B in the figure), organizations often use BACnet over IP.
The current trend is toward use of additional Internet technologies. Companies like Honeywell Tridium (Niagara framework) and many others have exchanged data through standard internet eXtensible Markup Language (or XML) with web services.

Even the ASHRAE BACNet committee has convened a working group to define use of XML with BACnet systems. The group is also working to define web services that will enable data exchange between building automation and control systems and various enterprise management systems.

Put in short, use these criteria when you’re choosing devices and BMS:
·         For devices such as RTUs and refrigeration controllers, look for ones that use open protocols such as BACnet or Modbus.
·        Make sure these devices give you both “read” and “write” capabilities so you can change set points.
·         For easy enterprise access, choose a BMS with web services and XML capabilities.
·         Make sure the web services of the BMS allow both read and write capabilities.
·      Be sure the BMS supplier provides the XML dictionary and definitions of web services to anyone, including competitors.

 
This Artical published on April 2019 at Safe secure Magazine.

Sunday, March 24, 2019

Software Market Trends to Watch in 2019

Software Market Trends to Watch in 2019

Global Software Market Overview The global software market size has witnessed staggering growth in recent decades and is expected to continue its acceleration…

Global Software Market Overview
The global software market size has witnessed staggering growth in recent decades and is expected to continue its acceleration in the coming years. Software has become essential for enterprises as modern-day equipment such as computers, smartphones, wearable devices, and automated machinery help businesses around the world to conduct business more efficiently. As businesses continue to rely further on various types of software, the global software market will continue to thrive. This blog explores some of the top software market trends to watch in 2019.

Technological developments and advancements of newly emerged software and the growing demand in the enterprise software market are continuously the primary factors driving global software market growth. In 2019, more and more businesses across different industries will begin to witness the increasing impact from these emerging software market trends – including artificial intelligence, blockchain, and cloud services.
Global Software Market Analysis
The global software market size is already worth hundreds of billions of dollars and is expected to grow at a CAGR of more than 7% by the end of 2022. The software market has numerous major end-user industries including retail, manufacturing, banking, financial services and insurance, enterprises, academia and government, healthcare, and telecommunication. By product type, some of the major segments include customer relationship management (CRM) software, supply chain management software, business intelligence software, enterprise resource planning software, and business process management.

Geographically, North America is currently the largest software market in the world, representing over 40% of the global software market share. The US is the top regional market in terms of software market revenues, as it is the home of many world’s largest software companies, including Oracle, Microsoft, and IBM. However, the fast-growing software demand in Asia Pacific, particularly led by China and India are expected to play a pivotal role in the global software market growth over the next few years.

1. Artificial Intelligence (AI) and Blockchain Technology will go Hand in Hand
Artificial intelligence in the software and IT industry is one of the keys to increasing efficiency and productivity. AI applications have combined machine and deep learning algorithms with automated processes to make business simpler and easier. Today, many large software companies are already integrating AI capabilities into cloud-based enterprise software and an increasing number of small and medium sized businesses are also adopting AI applications into their everyday business. We forecast the size of the global Artificial Intelligence-as-a-service (AIaaS) market will increase over USD 9.4 billion during 2019-2023.

Blockchain is also expected positively impact the global software market in 2019. As the whole world is increasingly connected, digital security and privacy protection have become a top priority. Blockchain offers a robust way to secure and manage user identities. Therefore, it is vital for businesses to implement these technologies to make their offerings more secure. Our latest analysis forecasts the global blockchain technology market size to grow steadily at a CAGR of around 56% by 2021.

2. Cloud Services is more important than Ever
Cloud services are giving businesses a great opportunity to considerably reduce their technology management costs in the most effective way. Due to these benefits, the global enterprise cloud services market will grow at a significant CAGR of close to 24% from 2018 to 2022. An increasing number of enterprises of all sizes are expected to rapidly adopt cloud computing by moving their IT systems and software applications to cloud based platforms in 2019 as a part of their digital transformation initiatives. The widespread availability and increased adoption of different cloud-based services by companies will also facilitate the enterprise cloud services market and become one of the top software market trends over the next few years.

3. CRM Software is Used Beyond the Conventional Sales Department
Customer relationship management ( CRM) software has become an essential tool in today’s interconnected business world. It is also one of the fastest growing segments in the global software market. CRM software is not only used for conventional sales department as now businesses of all sizes are increasingly understanding the importance and value of data management and analytics. A large number of companies now rely on analytics services to transform unstructured information into the structured information that is collected from various channels. They are increasingly using advanced analytical CRM software and tools to understand the pattern related to consumer behaviours. Today’s CRM software solutions offered by many world’s top CRM software companies can address enterprise’s requirements in different business processes as well as allow for flexibility and customizations. Therefore, the adoption of CRM software is projected to be much wider, making it one of the top trends to watch in the global software market for 2019.

Sunday, March 3, 2019

Guide of IP Camera’s Footage Storage

Guide of IP Camera’s Footage Storage


If you are end-user then you may make question “if somebody destroy or theft my NVR/DVR then how we get video footage”. Question is very much true. Analog camera store / record there motion event on DVR & IP Camera store / record there NVR, some IP camera store limited data to there internal microSD card.
Or, Is there a camera that saves the footage on a host with FTP? Can I use my computer to store surveillance videos or footage? Are there any cameras that support cloud storage? Is there any camera that has a built-in memory card?

Or, you may say I am looking for a camera that can store up to a few days of data or a camera that uploads footage offsite or to a cloud or server.
How Can you Store Footage and Video Recordings
Generally speaking, you can store footage and recordings on an SD card, cloud, NVRs/DVRs, FTP or NAS. It comes down to what you are looking for. That being said , it’s still very important to weigh on differences and conveniences of each solution to narrow down growing pool of models available and find the best match.
·         Option 1. Micro SD Card
·         Option 2. NVRs/DVRs
·         Option 3. FTP Server
·         Option 4. Cloud-Based Storage
·         Option 5. Workstation Computer

Option 1. Micro SD Card

People will be opting for onboard SD storage when they are just looking for cameras that save motion-triggered footage or don’t want to subscribe to cloud service. For example, users said
“I want to store footage locally instead of uploading to a cloud or getting a DVR/NVR.”
“I intend to keep and save footage but don’t want to subscribe to a cloud service for storage. “
Or people who are looking for cameras that will be used in a location where internet access is limited but still want to store motion-based footage. For example, one user explained that
“I have a rural property and only have power at the house and barn. Best option would be a motion activated cam outside that I could attach to a tree. Wifi at my house is only available very close to the house and we are on satellite internet, so no real broadband for cloud solutions.”
The obvious benefit of storing via SD card is that it’s relatively safe and inaccessible by others, micro SD card storage option is extraordinarily popular with homeowners for surveillance on the front doorbackyardapartmentremote areasvacation home, oany place that doesn’t require constant 24/7 recording.

Option 2. NVR's/DVR's

Standalone NVRs and DVRs, as offsite storage solutions, are increasingly popular and widely used among home security systemsmall businessworkshop and etc.
If you are looking for a security system that can record video constantly and be able to save weeks of footages, standalone NVR's/DVR's with a built-in hard drive are what you need. For example, users expressed their needs, saying
“No need for motion activation but constant recording. And must have ability to review footage without needing to pause or stop recording”, “I need 30-day non-stop recording and want to record and save more than 3 cameras’ footages to a hard drive”
NVRs/DVRs are not just for storage, they are also embedded with the operating system to multi-task including managing multiple cameras simultaneously, motion-triggered recording & alarm, scheduling recording, 24/7 recording.
NVRs can also be accessed remotely from a Smartphone, tablet or personal computer.
One piece of advice after buying NVRs/DVRs would be keeping them safe from burglars orthieves as well as backing them up regularly to FTP server if needed.

Option 3. FTP Server

FTP server is a great footage storage option for those who have a reservation for cloud storage but don’t want local network drive or built-in memory card. For example, many homeowners expressed their thoughts on , saying
“I don’t want to go down the road of paying for monthly memberships to a cloud storage option for recording. I am looking for FTP or some other generic protocol method that is NOT a subscription based ‘cloud’ solution.”
Or
“I would like to save the footage on a host with FTP instead of storing the footage on a local network drive that could just be taken. or I have a FTP server and want to manage the footages or videos on FTP server, configuring security cameras to upload event-based recordings or snapshot or recorded images and videos to a FTP server.”
FTP server is, without any doubt, a good solution. Security cameras such as Reolink cameras are proving to be increasingly popular with homeowners. Many Reolink security cameras do support FTP storage, both motion-based footage and constant video recordings.

Option 4. Cloud-Based Storage

Cloud-based storage is gaining popularity among users who are looking for an alternative to NVR/DVR, SD card, and NAS and there are growing numbers of cloud-based video surveillance cameras and IP camera with cloud storage available on the market.
Cloud-based storage is relatively convenient and safer; however, cloud services are commonly charged and require a varied monthly subscription fee.
Cloud-based storage is also potentially putting a strain on the home network by putting pressure on network bandwidth, as well as compromising photo or video quality to achieve optimal performance.

Option 5. Workstation Computer

Of course, you can always turn your personal computer into a storage unit by configuring storage path to your computer; however, massive data storage could slow your computer down and eat up storage space rapidly.
Not only that, CCTV forage auditing you can do from computer. You need window license based software only. That software takes screenshot of your open Camera Viewing window. In this scenario you can see what camera saw. Camera see 24Hr, you are able to see within 24min, I am confirm your DVR / NVR can’t do it. ‘Auditing’ means 'seeing' what the cameras 'saw'. CCTV video footage should be audited daily; several times a day if need be. Depending on the requirements, auditing of CCTV footage of critical cameras on a daily basis must become an SOP. Auditing will help relevant stakeholders to ‘discover’ the 'unknown'. Auditing as an activity may be manual, it may be post-facto, but it is a very dedicated and systematic process, which helps address some of the challenges of live monitoring (video blindness, poor attention span, boredom, bias, fatigue etc.), as well as the challenges related to alert-based systems (how often has one faced false alerts, or what is called the ‘cry-wolf’ effect). Auditing will help discover issues as mentioned above as well as in identifying and analysing threats and hazards (THIRA/HIRA) of various kinds. Auditing CCTV video footage will also be extremely helpful in waste reduction and following the 5S philosophy, i.e. sort, set, shine, standardize and sustain (all part of Six Sigma practices).  Moreover, in case of an accident/incident, relevant authorities can analyse CCTV video footage to determine whether implementing or improving existing policies, procedures, and processes could help reduce the potential for future occurrences.
And you can transfer those recordings from your computer to hard drive, pen drive, USB and etc accordingly.

The Tradeoff

There’s no right answer here. It’s really a matter of preference and there are plenty of models out there to suit either taste. Understanding each footage storage option will help you narrow down the growing pool of models available today and it will help you understand the features that matter to you most. Camera saw everything, but we can’t see what camera saw.
This Artical published on March 2019 on safe secure magazine 2019.