The pros and cons of edge surveillance

SMART Surveillance 2023 Surveillance, Infrastructure, Products & Solutions

In the middle of an enormous hype wave about cloud computing, which includes real benefits as well as challenges, edge processing has expanded. The cameras we see hitting the market today, not only include onboard storage, but also powerful processors that not only aid in capturing better images, but are able to run AI applications to enable the cameras to perform tasks previously reserved for servers.

There are continuous arguments on the pros and cons of processing AI on the edge, from the benefits of stopping false alarms before they get to the control room, lower bandwidth and reduced long-term storage needs, to the challenges of holding sensitive data at the edge, maintenance requirements and the question of updating software and firmware (we have mentioned the example of Azena’s camera ‘app store’ in www.securitysa.com/17683r).

Two companies engaged in producing edge systems and solutions (as well as onsite and cloud solutions) are Hikvision and Axis Communications, and they spoke to SMART Security Solutions about their edge developments.

Fortunately, edge surveillance is no longer a ‘new thing’ and users have been able to put various cameras and applications through their paces for some time. At first, edge seemed like a solution to everything, especially in a world adopting IoT at a rapid pace. Now that the initial excitement has died down, we asked what the general opinion of edge surveillance is today. Is it something to use in specific circumstances where it is beneficial, or is it an option for general surveillance tasks? Furthermore, what benefits do users see in deploying cameras with advanced edge functionality?


Rudie Opperman.

Rudie Opperman, Manager for Engineering and Training for Middle East & Africa at Axis Communications says that the benefits are many, but a good understanding of the need, use case and goals of the deployment comes first. Only after this is well documented and understood can an argument be effectively made.

“From experience, we have noticed that no two systems are the same and all end customers have unique challenges, and these challenges change over time. This means a basic, cheap, one-dimensional system cannot fulfil the needs of most users and there are many examples of systems being ripped out and replaced after the first year of use. Axis believes that it is not just one thing or one technology that makes the difference, but a combination of many used in unique ways that helps to future-proof the system and offer upgrade possibilities and expansion characteristics.”

Hunter Ye, Technical Director at Hikvision SA agrees, stating, “Users can surely benefit from edge storage, as security cameras can send video to a local NVR deployed on the edge. For smart cameras, the AI in the camera can determine what’s important and what’s not so important; in the case of the former the camera will record the associated image/video clip to the SD card. Either way, edge storage eliminates the need to constantly transmit video to the cloud, which can be a costly proposition.”

Importantly, Ye says that edge storage also includes on-premises network video recorders (onsite at a branch office or remote small office). In this case video streams can be hosted at the edge and there is no bandwidth issue as the devices are within an intranet. Again, this significantly reduces the bandwidth consumption and increases overall performance.

Bandwidth and costs

With the rollout of fibre across the continent, one must question whether bandwidth savings are as important today as they were in the past? Would a better solution not be to store the video on the edge and download it to a central server in off-peak periods, late at night, for example.

Again, Opperman says the use case and scope of each project determines the best strategy. “When you optimise bandwidth and storage, enhance decision making through edge computing and do this in a secure way, then the overall saving cannot be denied. Redundancy and backup is valuable, but at the same time comes at a higher cost.”

He adds that it is important to note that flexibility and quality also save costs over time due to longer life cycles and less down time.

Sending back video during off-peak time is a convenient approach, according to Ye. “Hikvision offers a solution named Scheduled Backup Solution. It is ideal for businesses whose networks are mostly used in the daytime and conduct few network activities at night, such as banks and convenience stores. With this solution, automatic backup can be scheduled per the customer’s needs during off-peak times to avoid network congestion.”

“This solution is also ideal for vehicles carrying mobile video recorders, such as public buses and tour coaches. When the vehicles are out running routes during the day, recordings are stored on the on-board MVRs. Scheduled, automatic backup starts when vehicles return to the garage, so that recordings will be transferred to centralised storage devices.”

The question of cost naturally involves more than bandwidth. Intelligent edge devices cost more than a traditional camera and the users need to include cybersecurity and upgrades into their installation, configuration and maintenance calculations. Additionally, you don’t want a camera or its SD card stolen with unencrypted video on it, especially if the video includes faces or licence plates etc.

From an Axis viewpoint, Opperman says the real cost of a system happens over time, and ‘a smaller than expected cost is in the procurement and deployment’. This is why he focuses on cost over time.

“When intelligence is harnessed to produce saving over time while mitigating the security risks (cyber and physical), then only can one understand the real value of a solution with streamlined and optimised components.”

Wired expenses

Then there is also the cost of connecting cameras to power supplies, as well as the cost of networking more remote installations. Opperman says that edge devices, with enhanced processing, normally require more electricity than ‘dumb devices’, however, they do offer savings because of their decision-making capabilities and enhanced processing capabilities to streamline compression of video.

Ye adds that edge storage makes sense in off-grid application scenarios. For example, infrastructure is often underdeveloped in rural and remote areas, hampered by steep costs and long deployment periods, which make edge storage difficult, time-consuming, and costly.

“Hikvision’s solar-powered camera setup kit is designed for reliability in the field, monitoring power levels and automatically switching to power-saving mode when battery power is low. This means it can work continuously for up to 7 days in cloudy and rainy weather when fully charged. This 4G camera further packs a 64 GB eMMC (embedded MultiMedia Card), ensuring continuous video recording even if there is an interruption to the SD card.”

What’s on offer

As usual, we end off with some insight into the edge solutions both companies have on offer at the moment.

“Axis has adopted a strategy to roll our deep learning, enhanced processing capabilities out across our M, P and Q line video products,” says Opperman. “We have done this in a way that aligns with our cybersecurity and sustainability commitments. There are not simply one or two products to highlight, but rather a strong message that we believe edge computing and cloud computing in harmony is the future.”

“We believe a hybrid approach presents more options for our potential customers. It is also important to mention that end-to-end encryption is supported, our devices are also power efficient and our compression technologies, like Zipstream, save on cost and improve or enhance streaming and storage requirements. All of these factors together are what we believe to be the Axis difference.”

Hikvision offers a range of products and solutions for edge processing and storage in video security applications, and recently it added the eDVR Series into its portfolio. “Powered by embedded solid state drive (eSSD) technology, the eDVRs are compact, durable, easy-to-use, and energy efficient,” says Ye.

“To make storage as efficient as possible, the Hikvision eDVRs use variable bitrates – with more storage allocated temporarily for complex scenes. When there is nothing going on in the camera view, the bitrate is reduced dramatically, saving storage resources and extending the continuous recording time of the device.”

“To ensure that the storage time is as predictable as possible, the eDVRs look at bitrate trends over the previous hours and days and allocates storage resources accordingly, in a properly measured way. This means that the device uses a variable bitrate in the short term, depending on the changing security scene, but a fixed code rate is used over the longer term to ensure video images are stored for the required timeframe before they are overwritten (typically for at least 2 weeks of continual recording).”

For more information contact:

• Axis Communications, +27 11 548 6780, terri.miller@axis.com, www.axis.com

• Hikvision South Africa, +27 87 701 8113, support.sa@hikvision.com, www.hikvision.com


Credit(s)






Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
Edge AI-powered night vision
Surveillance Products & Solutions
By eliminating the need for supplemental lighting, the VIVOTEK Chroma24 low-light full-colour AI camera series provides quiet, unobtrusive protection, while also reducing power consumption and minimising impact on people, ecosystems, and the environment.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.