CCTV Recording Backup

Debasish Pramanik | March 25th, 2016 | Articles

CCTV is becoming integral part of every enterprise security aspect. It is very imperative for the enterprise to ensure the recordings of the cameras are kept intact for the interval mentioned by country’s guidelines or laws. Many times the enterprises are not aware of such compliance and as a result they to fail to comply when situation arises resulting in losses exceeding expectation.

Backup as a Solution

One of the preferred solution can be backing up recordings on a continuous basis. The data can be stored on additional AS/SAN drive within the organisation. But using such option will become expensive as storage requirement for such type of data is huge and it will incur ongoing capex/opex for the organisation.

Cloud Storage has become a commodity in today’s world. There are various type of storage which are being provided by various public cloud storage provider. Amazon AWS provides Glacier whereas Google provides Nearline. The cost of such storage is as low as $0.01/GB/Month.

CloudCodes Vault1 can be used by organisation to backup their CCTV camera recording on cloud. Cloud is becoming a very affordable options for organisation when such large amount of data need to be backed up. On-premise will become a pain considering the fact that storage requirement is almost exponential and will add additional cost on a regular basis.

CloudCodes Vault1 provides option to store such data on cold storage mode. This is very cheap option considering the fact that retrieval frequency is less and RTO need not be very aggressive.

Vault1 provides various option to organisation to configure backup frequency of the data. The backup can be scheduled at a particular time interval or it can be scheduled to occur from 5 minutes to 1 Day. It also can be configured to take backup of particular type of files.

The solution also provides the option to admin or business user to search for a particular file based on various attributes. The administrator can leverage the security policies to provide controlled access to other users to access the data. These can be provided access for limited period of time with limited set of access control.