Volume 6
While the use cases may be different, these same
industry changes are having a similar impact on
law enforcement. More digital cameras are being
deployed, more video is being captured, public expectations are becoming more stringent, retention
time is increasing to meet legal requirements, and
new use cases are being discovered through aggregated content, analytics, and predictive policing.
Addressing today’s demands and positioning for
tomorrow requires law enforcement agencies to
take a long-range view of storage architecture and
to make decisions accordingly. Selecting a storage
architecture that is purpose-built for processing
video data and combines high-performance, scalability, and accessible long-term retention of data
at an affordable cost per megabyte will help law
enforcement simplify evidence management and
explore new technology innovations in the future.
Sources:
1 “Top Video Surveillance Trends for 2016,” IHS
About Wayne Arvidson
Wayne Arvidson is Quantum’s Vice President of
Video Surveillance and Security Solutions. A seasoned global marketing, product management,
and business development executive, Wayne has
25 years senior management experience in companies ranging from start-ups to Fortune 500 firms
and drives Quantum’s strategy in the surveillance
and security market.
July-Aug 2016 Edition
AppGuard Competes in AST Homeland
Security Awards
AppGuard offers an effective defense against vulnerabilities
not addressed by conventional means. Without relying on
detection, identification, signatures, or scanning, AppGuard
disrupts malware attacks, halting breach attempts before a
compromise can occur.
AppGuard from Blue Ridge Networks is a unique
Anti-Malware solution that stops malware breaches at the earliest stages. Recognized by Gartner
in the isolation and containment category for endpoint protection, AppGuard delivers a multi-layered
defense based on Blue Ridge’s patented technologies that establish trust zones to protect running
applications, operating system resources, firmware, and process memory from risky modification, unauthorized information extrusion attempts,
or disruption by any malware.
Today, modern malware does not need to use ex77