AST Digital Magazine July/August 2016 - Page 77

Volume 6 While the use cases may be different, these same industry changes are having a similar impact on law enforcement. More digital cameras are being deployed, more video is being captured, public expectations are becoming more stringent, retention time is increasing to meet legal requirements, and new use cases are being discovered through aggregated content, analytics, and predictive policing. Addressing today’s demands and positioning for tomorrow requires law enforcement agencies to take a long-range view of storage architecture and to make decisions accordingly. Selecting a storage architecture that is purpose-built for processing video data and combines high-performance, scalability, and accessible long-term retention of data at an affordable cost per megabyte will help law enforcement simplify evidence management and explore new technology innovations in the future. Sources: 1 “Top Video Surveillance Trends for 2016,” IHS About Wayne Arvidson Wayne Arvidson is Quantum’s Vice President of Video Surveillance and Security Solutions. A seasoned global marketing, product management, and business development executive, Wayne has 25 years senior management experience in companies ranging from start-ups to Fortune 500 firms and drives Quantum’s strategy in the surveillance and security market. July-Aug 2016 Edition AppGuard Competes in AST Homeland Security Awards AppGuard offers an effective defense against vulnerabilities not addressed by conventional means. Without relying on detection, identification, signatures, or scanning, AppGuard disrupts malware attacks, halting breach attempts before a compromise can occur. AppGuard from Blue Ridge Networks is a unique Anti-Malware solution that stops malware breaches at the earliest stages. Recognized by Gartner in the isolation and containment category for endpoint protection, AppGuard delivers a multi-layered defense based on Blue Ridge’s patented technologies that establish trust zones to protect running applications, operating system resources, firmware, and process memory from risky modification, unauthorized information extrusion attempts, or disruption by any malware. Today, modern malware does not need to use ex77