Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

How to Maximize Your DVR and NVR Storage

By Mark S. Wilson
March 21, 2010

Surveillance storage solutions can have many challenges, thanks to myriads of DVR and NVR features and benefits that can range from common specifications to helpful elements such as intelligent PTZ control with preset positions and e-mail or SMS message notification upon motion detection or an alert from an event. Today, even organizations using analog cameras tend to have digital and network video recorders for storage and retrieval of surveillance video. Megapixel cameras are bringing new concerns, especially when one remembers that megapixel cameras – by their very nature – generate more data than lower resolution cameras.

 Therefore, the question security professionals need to ask is, “How can I maximize my DVR and NVR storage, especially as I add more and more higher resolution cameras into my surveillance system?” There are several ways.


Lower recording rates at times and in areas of low activity

By controlling recording speeds, users can obtain recording savings of up to 80 percent. Typically, there is less activity in a building at night. Even during the day, many conference rooms have limited use. There is no need to be recording them at higher rates, such as 15 fps which simply take up more storage space. These slower times and areas can be recorded at only 2-3 fps.

But, what if something was to happen? A nice add-on to the system is basic motion analytics. If something happens, the frame rate goes up to normal recording speeds. When motion stops, the recording rate goes back to 2-3 fps.

Don’t record what you don’t need

Motion exclusion zones can save up to 50 percent of the recording of some of your cameras. Do you need a record of the cars speeding down the freeway? What about those bushes which sway in the wind? They’re showing up, forcing the system to keep recording, as your cameras watch over your perimeter. To rectify, a nice add-on to the system is a basic motion analytics package. It eliminates unnecessary recording of cars and bushes.

How much of your old video do you need?

Is your old video as important to you as your newer video? If not, reduce the number of frames in your old video. The evidence will still be there if needed, but you’ll reduce your storage space dramatically.

Choose the right CODEC in the first place

Migrating from MJPEG to H.264 can reduce storage use by 50 percent or more. That’s why security users migrated from MJPEG to MPEG-4 and now are moving to H.264, which compresses video into a smaller size yet maintains the same video quality when compared with MPEG-4. 
 
Here’s why. With H.264, a representative frame (R-frame) is selected from a group of frames in a video sequence. Only the selected R-frame is stored. By using R-frames, H.264 can compress a video stream, thereby more efficiently generating significantly less bandwidth.

This is true for most camera situations, such as a fixed camera with a low amount of motion. If there is a lot of motion, as in an airport lobby, or if the camera is moving, such as a PTZ, the number of the R-frames generated will increase. In some situations, the compression provided by H.264 may be only marginally better than M-JPEG. Nonetheless, because of the lower bandwidth generated by H.264, less storage is required to archive the video.

Overall, in most surveillance situations, H.264 is a more efficient codec to use for both bandwidth reduction and storage. Just be aware, that in busy locations with lots of motion, bandwidth may spike.


Here’s a problem – many megapixel cameras don’t use H.264

MJPEG does not yield the bandwidth and storage savings of H.264 because its compression algorithm is less complex. Therefore, MJPEG does not require as powerful PCs or processors as H.264. For this reason, manufacturers still use MJPEG in high resolution megapixel cameras (3MP, 5MP).

Therefore, although H.264 offers meaningful bandwidth and storage advantages, this has to be offset against the increased cost for more powerful PCs for video management. When using megapixel cameras, especially when viewing multiple cameras simultaneously, integrators will need to over-configure the servers in the control room to cope with the more intensive processing requirements.


Two Solutions to the MJPEG versus H.264 conundrum

First, there are NVRs and DVRs that record in H.264 and that function as both a Digital Video Recorder (DVR) and a Digital Video Server.

Secondly, most cameras support dual streaming. One can garner the advantages of MJPEG’s clearer live monitoring with the lower storage consumption of H.264 simply by deploying dual streaming.


What’s on the horizon?

As they did with VCRs, at some point, security professionals will leave DVRs and NVRs behind for clustered storage. Larger systems especially will start using them to communicate with servers over their IP network. Modular, they allow storage to be added over time, as needs arise. One can start with a storage cluster as small as a few TBs (terra-bytes) to many, many TBs. However, since the smallest cluster one can really have is 4 TB, they are not yet economical for smaller installations.

Nonetheless, 4 TB is about the amount of storage it takes to handle six megapixel cameras. As storage cluster prices start to emulate those of DVRs and NVRs, they will become a reasonable alternative to review for almost any system.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mark S. Wilson is vice president of marketing for Infinova

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Think Hybrid and Save Money: How to Maximize Your Existing Video Surveillance Assets

    See More
  • Woman working on phone and laptop

    Starting a job in tech? Read this advice to maximize your experience

    See More
  • How to maximize traffic visibility with virtual firewalls

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing