FUJIFILM INSIGHTS BLOG

Data Storage

Storage in the Age of Video Surveillance

Reading Time: 6 minutes

By Andrew Dodd, Guest Blogger, Worldwide Marketing Communications Manager
at Hewlett Packard Enterprise Storage

The presence of a ring of video surveillance cameras clinging to a vantage spot like a cluster of digital coconuts has long been a familiar sight in public spaces. And for many years, in both Hollywood and on television, countless storylines have turned on whether the detectives or investigators could access CCTV footage and solve the mystery by reviewing the tale of the tape.

But although the idea of cameras and surveillance has become an accepted feature of society (like it or not), what is less obvious perhaps is how much the market for video surveillance equipment is growing and how much the cameras themselves have changed. Both of these factors have profound implications for digital storage.

You had better be ready for your close up

First, the market. A 2020 report from IDC entitled “Worldwide Video Surveillance Camera Forecast, 2020-2025” (#US46230720) estimates that by 2025, the worldwide video surveillance camera market will grow to $44 billion, up from $23.6 billion in 2019, with a five-year compound annual growth rate (CAGR) of nearly 13%. This is largely due to the increasing adoption of smart camera systems and analytical software that enables them to be utilized in a variety of roles — beyond simple surveillance. Another report, by research firm IHS Markit, predicts that by the end of 2021 alone, there will be 1 billion surveillance cameras installed globally, with over 50% of those in a single country: China.

The growth of 4K

In the past, video surveillance cameras have sometimes been criticised both for their ubiquity and their usefulness: critics pointed out that although the cameras seemed to be proliferating in many public spaces, their benefit was undermined by poor image quality and resolution. Not any more. The next-gen cameras that are driving the growth to 2025 will increasingly deliver HD and Ultra HD (4K) images of astonishing detail and clarity. In turn, this is opening up a wealth of new applications that can be managed by artificial intelligence systems: for example, monitoring industrial equipment, providing security, and (more controversially) real-time facial recognition.

Why are cameras being deployed?

Many of today’s larger organizations such as hospitals, airports, university campuses, and casinos find themselves needing a video surveillance system as either a replacement for an aging CCTV installation or as a brand-new installation. The ability to quickly and easily provide high-resolution video evidence of a security incident can be very relevant in narrowing down suspects in case of a crime. And the same video evidence can also limit the liability of an organization in case of a lawsuit. So there are clearly business benefits in upgrading to the latest surveillance technology.

The storage challenge

But if the number of cameras is increasing rapidly, and if the quality of the images they produce is becoming more refined and detailed, then all of this can only mean one thing: we’re going to need a lot more storage. Gone are the days when weeks of footage could be kept on a handful of old videotapes that could be wiped and reused at the end of the month. In the first instance, today’s surveillance cameras record primarily record to disk. And a single hour of RAW 4K video footage produced by just one unit consumes something in the region of 110GB of disk capacity. Multiply this by millions of hours, and hundreds of millions of cameras, and it’s clear that video surveillance applications will require colossal amounts of storage, not just for the primary purpose of storing the original footage, but also for backing up and archiving that material.

Read more

Read More

Top 7 Questions Cyber Insurance Companies Will Ask Applicants Seeking Risk Protection from Ransomware and Top 5 Best Practices to Qualify

Reading Time: 4 minutes

With the recent high-profile cases of ransomware hitting the news cycle like Colonial Pipeline, JBS and others, it appears ransomware is not going away anytime soon and may just be in its infancy. Ransomware is a lucrative business model for cybercriminals with ransom demands that can reach into the millions of dollars as was the case with Colonial ($4.4 M) and JBS ($11.0). Ransomware-as-a-Service (RaaS) is making the barriers of entry extremely low, so we can expect to see more bad actors entering the business and more attacks across every industry.

The sense of urgency is ratcheting up as the C-suite is clearly focused on cybersecurity. I was speaking to one customer about deploying offsite/offline backup tapes as an air gap who said “Cybersecurity is the top focus for us in the next six weeks. We need to act fast”. In addition to shoring up cybersecurity plans, or putting key components in place, the notion of acquiring cyber insurance is cropping up and no doubt is also on the C-suite agenda.

So what is Cyber Insurance?

Cyber insurance, also referred to as cyber-liability insurance, seeks to help companies recover and mitigate the damage from cyberattacks such as ransomware, data destruction or theft, extortion demands, denial of service attacks, etc. This class of insurance has been around since the early 1990s and is rapidly evolving and growing in terms of revenue for insurance companies. One report I came across pegged the market for this type of insurance at $3.15 B in 2019 and is expected to rise to over $20 B by 2025. According to another report, about a third of all large U.S. companies carry cyber insurance.

Typical corporate insurance policies for general liability and property damage most likely don’t cover cybercrime, so cyber insurance has become a stand-alone offering specifically suited for cybercrime protection. Depending on the policy, below are just a handful of items that typically may be covered:

  • Incident response costs related to restoring systems to pre-existing conditions
  • Recovery cost of data or software that has been deleted or corrupted
  • The cost of cyber extortion including the negotiation and execution of ransom payments
  • Lost profits due to IT system downtime
  • Financial theft or fraud arising from the cyber attack
  • Physical asset damage
  • Data privacy liability

Read more

Read More

Colonial Pipeline Ransomware Hack Reinforces the Need for a Tape Air Gap to Support 5 Best Practices Recommended by the FBI

Reading Time: 4 minutes

Ransomware attacks used to be relatively simple, if unpleasant, affairs. A device would be compromised, the user locked out, and a ransom notice would appear: Pay up if you want to access those files again. On an organizational level, hackers would sometimes gain enough presence in the network to be able to lock IT and users out of their systems. Many of these attacks would go largely unnoticed, even unreported with minimal impact to anyone except the victim organization.

But the Colonial Pipeline hack added a more sinister element – shutting down the pipeline backbone that provides 45% of the gasoline consumed by most of the U.S. eastern seaboard. Gas prices spiked as supplies began to run out. Lines appeared as panic set in at the pumps. The pipeline operator acted quickly and made a ransom payment of $4.4 million dollars in bitcoin to the cybercriminals behind the breach. In return, they provided Colonial with a decryption tool to regain access to their systems. Not surprisingly, the decryption tool turned out to be less than effective, forcing Colonial to restore from existing backups anyway.

But the success of the attack and money paid over is likely to embolden hackers to go after even more lucrative infrastructure targets. That’s why the FBI strongly advises organizations not to pay a ransom. It’s not unlike the policy of refusing to negotiate with terrorists. Paying the ransom not only emboldens the criminals, it does not guarantee complete recovery or prevent repeated ransomware attacks. The more you give in to their demands, the more likely they are to try again.

But Colonial Pipeline paid after careful consideration of what was best for all those that depend on its infrastructure. Some are now wondering if the FBI will carry out its threat to fine Colonial and those who do decide to pay out a ransom. This remains to be seen. Yet, in the high-stakes game of oil and gas, any fine is likely to be no more than a minor inconvenience compared to the potential revenue and profits at risk – perhaps one of the motivations behind the company paying fairly soon after the attack.

Brazen Attacks on the Rise

Expect, then, even more brazen and perhaps costly attacks on U.S. infrastructure, government, industry, and essential services. Remember the SolarWinds saga from earlier in the year? The vulnerabilities of the U.S. Government and its software contractors exposed in this case prompted the White House executive order on “Improving the Nation’s Cybersecurity” issued on May 12th.  The fall-out from the Colonial Pipeline attack will likely lead to stiffer regulations imposed on pipeline operators and other critical infrastructure players. The broader market needs to pay attention, too, as the frequency of ransomware continues to rise:

  • Department of Homeland Security figures show a 300% increase in ransomware in 2020 compared to the previous year.
  • Small business targets paid out $350 million in ransoms last year.
  • Attacks on schools, local government systems, and healthcare providers have risen sharply.
  • And the volume of ransomware victims is expected to rise sharply this year.

Most organizations are understandably far more focused on their primary mission than on instituting cybersecurity measures. This often makes them easy targets. All it takes is one slip by IT or one gullible user and the bad guys can move in and do their damage. Increasingly, that damage involves ransomware.

Read more

Read More

Why Active Archiving is a Hot Concept in Storage Today

Reading Time: 2 minutes

The 2021 Active Archive Alliance annual market report has just been released, entitled “Saved by the Data. Active Archive Leads the Way in a Mid-Pandemic World”.

Certainly, the COVID pandemic was a shock to many companies and put tremendous strain on operations, revenue, and profit. But those companies who had already implemented a sensible active archive strategy were at a competitive advantage thanks to their ability to intelligently manage access to their data.

I think active archiving, the practice of keeping data online all the time and easily accessible to users, is a hot concept in storage right now because it is really about optimization – getting the right data in the right place, at the right time, and at the right cost.

We know that IT budgets are not keeping up with the relentless growth of data. We also know that 60% to 80% of data quickly becomes archival. Typically after 30, 60, or 90 days, files become static and the frequency of access drops off. So why keep that kind of data on expensive primary storage?

Why not let intelligent data management software that is typical of an active archive solution move that data by user-defined policy from high performance, expensive tiers, to lower performance but more cost-effective tiers like economy disk or tape systems, or even cloud? All while maintaining transparent access for users.

We know that the value of data is increasing, retention periods are getting longer, and users want to maintain ready access to their data without IT staff intervention. But we also need to worry about the bottom line, about efficiency, compliance, sustainability, and cybersecurity! Active archiving provides the right solutions to these worries and that’s why it is such a hot concept in storage today.

But enough said, read the full report here and check out what Alliance members had to say in their related virtual conference.

 

 

.

Read More

Reducing IT’s Carbon Footprint via Tape While Improving Cybersecurity and Protecting the Bottom Line

Reading Time: 4 minutes

By Drew Robb, Guest Blogger

There is increasing pressure around the world to reduce emissions and lower mankind’s carbon footprint. It is up to the IT sector to do its part, and that means considerably lowering power usage. But that is easier said than done when you consider the statistics.

IDC predicts we will arrive at the mind-boggling figure of 175 zettabytes of data in the digital universe within 4 years. 175 ZB? Consider how long it takes most users to fill a one TB drive. Well, 175 ZB equates to approximately 175 billion TB drives.

The problem is this: how do you reduce IT’s overall power draw in the face of a massive and continual upsurge in data storage? Once 175 ZB of data exists, there is no possibility of containing electrical usage if the vast majority of storage is sitting on hard disk drives (HDDs). The only solution is to cure the industry’s addiction to disk.

Here are the numbers. Data centers alone account for close to 2% of all power consumed in the U.S., about 73 billion kilowatt hours (kWh) in 2020. That is enough to set off the alarm bells. Yet tremendous progress has been made over the past two decades in terms of data center efficiency. When power consumption in data centers soared by 90% between 2000 and 2005 period, the industry acted forcefully. The rate of growth slowed to 24% between 2005 and 2010 and then fell to less than 5% for the entire decade between 2010 and 2020. That’s miraculous when you consider that it was achieved during a period that represented the largest surge in storage growth in history. Smartphones, streaming video, texting, multi-core processors, analytics, the Internet of Things (IoT), cloud storage, big data, and other IT innovations demanded the retention of more and more data.

Big strides were made in Power Usage Effectiveness (PUE – the ratio of data center power consumption divided by the power usage). Data centers have largely done a good job in improving the efficiency of their operations. But the one area lagging badly behind is storage efficiency.

Read more

Read More

Reducing Carbon Emissions through the Data Tape Ecosystem

Reading Time: 5 minutes

By Rich Gadomski, Fujifilm, and Paul Lupino and Tom Trela, Iron Mountain

If there was ever a time for industries and governments around the world to come together and finally take steps to mitigate climate change, now would seem to be it. The return of the United States to the Paris Climate Agreement and the recent U.S. –  China talks on climate change are all positive signs when it comes to moving the needle forward on sustainability initiatives. While fighting COVID-19 took center stage in 2020 and early 2021, our future depends on what we do collectively to reduce our environmental impact now and in the immediate years ahead.

It’s Hard to Deny Global Warming and Climate Change

According to an article that appeared in the Wall Street Journal earlier this year, NASA has ranked 2020 as tied with 2016 for the warmest year since record-keeping began in 1880. In a separate assessment, NOAA  (National Oceanic and Atmospheric Administration), which relies on slightly different temperature records and methods, calculated that the global average temperature last year was the second highest to date – just 0.04 degrees Fahrenheit shy of tying the record set in 2016.

On top of the record number of hurricanes and the wildfires out west, the recent Texas deep freeze, which caused widespread power outages and other weather-related tragedies and calamities, seems to be just one more example of climate change. Weather patterns are becoming more unpredictable, which can result in extreme heat, cold and increased intensity of natural disasters.

It is widely acknowledged that global temperatures have been rising especially in the north polar region where we have seen a dramatic shrinking of the polar ice cap. When Arctic air warms, it sets off an atmospheric phenomenon that weakens the polar vortex (the normal jet stream of wind that keeps frigid air to the north) and allows cold air to fall…as far as Texas.

Data Center Energy Consumption and the Advantage of Modern Tape Technology

The key to mitigating the worst impacts of climate change is a reduction in the amount of greenhouse gases produced by humans. Producing energy is extremely resource-intensive, so reducing the amount of energy we consume in all aspects of our lives is of critical importance.

Data centers are significant consumers of energy accounting for as much as 2% of global demand and rising to 8% by some estimates. Data centers can do their part to reduce energy consumption in many ways by becoming more energy-efficient, including simply migrating the vast amounts of still valuable, but rarely accessed, “cold data”.

Read more

Read More

Is Online Object Storage Really Immune to Ransomware? Achieving True Object Storage Immutability with Tape

Reading Time: 3 minutes

By Chris Kehoe, Head of Infrastructure Engineering, FUJIFILM Recording Media U.S.A., Inc.


Object storage has many benefits. Near infinite capacity combined with good metadata capabilities and low cost have propelled it beyond its initial use cases of archiving and backup. More recently, it is being deployed as an aid to compute processing at the edge, in analytics, machine learning, disaster recovery, and regulatory compliance. However, one recent paper perhaps got a little over-enthusiastic in claiming that disk-based object storage provided an adequate safeguard against the threat of ransomware.

The basic idea proposed is that ransomware protection is achieved by having multiple copies of object data protecting against that kind of intrusion. If the object store suffers ransomware incursion, the backup is there for recovery purposes. The flaw in this logic, however, is that any technology that is online cannot be considered to be immune to ransomware. Unless it is the work of an insider, any attempt at hacking must enter via online resources. Any digital file or asset that is online – whether it stored in a NAS filer, a SAN array, or on object storage – is open to attack.

Keeping multiple copies of object storage is certainly a wise strategy and does offer a certain level of protection. But if those objects are online on disk, a persistent connection exists that can be compromised. Even in cases where spin-down disk is deployed, there still remains an automated electronic connection. As soon as a data request is made, therefore, the data is online and potentially exposed to the nefarious actions of cybercriminals.

Read more

Read More

How to Leverage the 3-2-1 Backup Rule and Modern Tape Technology in Backup Applications

Reading Time: 3 minutes

In case you were not aware of it, March 31st is World Backup Day. To be sure, a quick visit to the official website confirms that this day is just a reminder for consumers to backup their PCs and cell phones. According to the website, only 25% of consumers are protecting their precious memories. Surely the helpful recommendations for routine backup doesn’t apply to the storage professionals that keep our enterprise data safe and our websites up and running.  Or does it?

When Disaster Strikes a Data Center

On Wednesday, March 10th, 2021, a fire broke out at the OVHCloud data center in Strasbourg, France. The fire quickly spread out of control and completely destroyed compute, network and storage infrastructure. According to some accounts, as many as 3.6 million websites including government agencies, financial institutions and gaming sites went dark. Others complained that years’ worth of data was permanently lost.

We know that the statistics regarding cost of downtime and the number of companies that don’t ever recover from catastrophic data loss are alarming. The often-cited University of Texas study shows that 94% of companies do not survive, 43% never reopen and 51% close within two years. That’s why the cardinal sin in data protection is not being able to recover data.

OVH reminds us that, however unlikely, data center disasters like an all-consuming fire can still happen. Although these days a more sinister threat continues to loom and tends to grab the headlines and our attention, namely: ransomware.

Read more

Read More

New Video Surveillance TCO Tool Makes the Case for LTO Tape Tier in Video Surveillance Operations

Reading Time: 4 minutes

Recently my neighborhood had a rash of car break-ins by what turned out to be just a band of mischievous teenagers. But what struck me about this occurrence was the flood of homeowner video surveillance clips that appeared on social media and that were sent to the local police department to help identify the wrongdoers. It seems like everyone in the neighborhood has a home video surveillance system, perhaps to catch a doorstep package thief, or if nothing else, to catch the guilty dog walkers!

A Booming Market for Video Surveillance Solutions

Indeed, the video surveillance market is booming, not just in the relatively nascent consumer market, but in the commercial market and has been for a long time – in a much bigger way. The reasons for this include more affordable cameras with better resolutions soaring from 720p up to 4k and even 8k. In the meantime, video surveillance systems are finding more and more applications. Retail shopping malls, banks, hotels, city streets, transportation and highways, manufacturing and distribution operations, airport security, college dorm and campus security, corporate security, police body and dash cams, to name just a few – all need good quality video surveillance.

Video Retention Costs Soar

However, these higher resolution cameras have sent the costs of video retention soaring. So much high-resolution raw footage quickly fills up available hard disk drives commonly used to store or retain video surveillance content. According to a Seagate video surveillance calculator, an installation of 100 cameras recording eight hours a day at 30 frames per second, 1080p resolution, with a retention period of 90 days would require 2,006 terabytes of storage. That’s 2.0 petabytes of expensive, energy-intensive hardware. Those with unlimited budgets can simply add more disks. But everyone else faces tough choices: shorten retention periods? lower video resolution? reduce the number of cameras or frames per second? None of these support the goals of why the video surveillance system was installed in the first place.

Read more

Read More

Air-Gapped Storage Solutions Simply Can’t Be Hacked

Reading Time: 2 minutes

The changing landscape of the data protection industry has evolved from primarily backing up data in order to recover from hardware, software, network failures and human errors, to fighting a mounting wave of cybercrime. Over the years, hardware and software have significantly improved their reliability and resiliency levels but security is a people problem, and people are committing the cybercrimes.

Cybercrime has now become the biggest threat to data protection and the stakes are getting higher as anonymous individuals seek to profit from other’s valuable digital data. With a cease-fire in the cybercrime war highly unlikely, we are witnessing a rapid convergence of data protection and cybersecurity to counter rapidly growing and costly cybercrime threats, including ransomware. The growing cybercrime wave has positioned air-gapped storage solutions as a key component of digital data protection – they simply can’t be hacked.

Traditional backup and archival data can be stored locally or in cloud environments. In contrast, a cyber-resilient copy of data must meet additional more stringent requirements. This is where “air gapping” and tape technology are gaining momentum. The rise of cybercrime officially makes the offline copy of data stored on tape more valuable and takes advantage of what is referred to as the tape air gap. The tape air gap is an electronically disconnected or isolated copy of data in a robotic library or tape rack that prevents cybercriminals from attacking a backup, archive or any other data.

Tape cartridges in a robotic tape library or manually accessed tape cartridges in tape racks, are currently the only data center class air-gapped storage solution available.

For more information, check out this Horison Information Strategies White Paper “The Tape Air Gap: Protecting Your Data From Cybercrime.”

 

 

Read More

LET’S DISCUSS YOUR NEEDS

We can help you reduce cost, decrease vendor lock-in, and increase productivity of storage staff while ensuring accessibility and longevity of data.

Contact Us >