X
Get all access to the world's best video surveillance information.
Logo
680-70-2015-free-banner

Security Manager Statistics and Surveys 2009

by John Honovich, IPVM posted on Oct 03, 2009 About John Contact John

The needs and constraints of security end users are key elements in determining the selection of security technologies such as video surveillance. This is even more important over the last year as significant economic changes have occured.

In this premium report, we analyze and reference 7 different public surveys of security end users from the last 6 months.

The most consistent findings we see include:

  • Most security budgets have been negatively impacted with a sharp increase in the importance of price in decision making
  • The role of IT continues to increase though its exact form remains debatable (i.e., will IT control purchasing or recommend, etc.)
  • Analytics interest remains lower than other emerging video surveillance technologies with some indicators that interest is actually decreasing

Beyond these overarching trend, these surveys provide a wide range of statistics and potential trends to consider.
The complete report is available only to PRO Members.
Inside the Pro Section

Premium members may access our analysis on these statistics including references to each report and an examination of emerging trends and drivers behind the numbers. 


Log in to read this IPVM research.
Why do I need to log in?
IPVM does original testing and research that is funded by member's payment enabling up to offer the most independent, accurate and in-depth information in the industry.

General Security End User Survey

*** ********* **** ******** ***** ******** ******** * ******** * **** ****** ******** ******** *** **** **********. *** ******** *******:

  • **% ** *** ***** ****** **** ******/******* *** ***** *******'* ******* ******** ** ********* * **** ****** *********. **** ** ** ** ********** ****** ******** ** ****.
  • ** ********* ******** ***** *** *********'* ******, **** **% ****** ******** *** **** ** ******. *** ************ ******** ****** ***** ********** ******** ********* **% '****** ** *** **** ************' *** **% '******** ******* ** **** ** *** ****.'
  • **** ** **** *** ******* ********* **** *** ***** **** **** ***** ******** *******, **** **** **** ****** ** ** * ******* (**%). **** ** ** ** ********** ****** **** *** ******** ****.
  • ***** ***** ************ ************ **** *** ***** ****** *** ******** ******** **, ***** ********* ******* *** ****. ** ****, **** **% ****** ******** ** ***** ********* ***** ** *** ****** *** ********** ** ** *****.
  • ***** *** ************ ******** ** *** ***** **** **** ******** ******** ******* ***** ****** *** **** *** ********, *** ****** *********** *** ******* ***** **** (***** **** *% ** **%). * ***** ********* **** *** **** ****** *** **** ** *** ******* ** ***** ********* ***** ***** ****** ******** ** ** * *** ****** ** ******** ******** *****.
  • ********* *** ************ ******* ** *** ********, **** *% ******** ** ** ** ****** ** **** ** *** ******** (****** **** ****** *** **** *% ** ****). **% ** *********** ****** ** ****** ** ***** ** ******* **** ** ********** ******** ******* (** ** ********** ****** **** ****).
  • **% ** ******** ******** ****** **** **** **** ********* ******** ******** **** ************* ** **** ********* ************ (** ** ********** ****** **** ****). **** ** * **** **** ********** *** *** ******* ** *** ******** ****** ***** ** ******. *** ******** **** ** *** ********** "**** *********" ****** **** ******* ** *********. ** ** ****** **** **** *** **** ********* ******** ******* ***********. *******, ** ** ******* ** *** "****** * *** ** ******* ******?", **** ***** ** *******. 

Budget Cuts for Security Programs

** * ****** ** **** *** ******** ******** ********* ** ******* ****, *** ******** ********* ******* ** ********* *********** ***** ** ******** ********** ******* (*** ***** ********* ******* **** ***** ******** *******). *** ********** *******:

  • **% *********** ****** ****** ****
  • ******* ******* ****** ********* ** *% 
  • ******* ******* ******** / ********* ******** *** **%
  • [****: ******** ***** **** ********** ** ******** ********** **** *** ********** *** ********** ****** ** *** ********* *******]
  • ***** *** *** ** *** *** **** ****** ******* ** ******** ******** **** ********** *******

********** ******** ******* *** *** * ******** *** **** ****** ** ***** *** ******* - ********** **** ********* *** ******** *** **** *** ******. ******** **** *** **** * ****** ***** ****** ***-********. ** *** *** ** **** ****, *** ******** **** ** ***** *** ******** ** ****-******** *******. **** ** * **** ****** ** ** ******** **** **** ***** ** ***** *** *** ********.

Security Convergence Survey

** **** ****, ******** ********** ******** *********** ****** ******* **** ***** ***** ******** ***********. ** ** * **** *** ******** ****** ***** ******* ** ****. **** *** **** *********** *******:

  • ***** */**** ** ***** ************ ******* *** *** ******** ** ******** (****** **** *** ****** *** *** ***** **********). *******, * *********** ****** ** ***** ************ ******* *** ********** ********* **** *** ** *******. *** ******** ** ******** ********** ** ****** ************ ** *** *** ********** ****** *** ***** ************ ****** (****** **** **** * ******* **** *** *** ******** ******** ***).
  • **% ** ** ******** ****** ** *** ***** ********** ***** **** **% ** ******** ******** **. **** ********* ********* **** ** ** ********** **** '*********' **** ********.
  • **** **% ** ******** ***** **** *** ***** ** *** ***** **% **** *** ***** ** ******** *** **% *** "*******". ******* *** ******** **** ** ******** ****** ***** *** **** *** *** ********** ** ****, *** ***** ** ***** ***** **** ** *** ********* *****. 
  • **% ** ******** *********** **** **** **** *********** ******** ********** *******. * ** *** **** **** **** ***** ******* ********* ***** ******** ****** ** *********** ** *** *********** ***** (************* *** **** '****' **** *** **** *** *** *********** *************** **** ** ********* ** ****** ****************).
  • **% ******** **** ***** ******** ********** ****** *** ********** **** ***** ******** ******. **** ****** **** *** *** ******* ******* ***** ** *** *********** *** $* ******* *** ** **** ****** ******** *** ******** ** **** ***** ********* ****** **** ********* ** *******. 
  • **** **% **** ***** ************ **** ** *** *********. **% **** ** *** *********** ** ****** **********.
  • **** **% ** ******** *********** **** **** **** *** * ****** **** **** ** ** ***** *********. **** ** *** **********. ** *** ***** ****, * ***** ***** ************ ********* ******* **** **** ******** **** ** ****, *********, **** ******** ******** *********. (*** *** ****** ***** ** ** ******** ********).

Security 500 Large End User Survey

******** ******** *** * ****** ** ******* **** ******* **********/****** ******. ***** ******** *** ****** ******** ****** ********** *** ******** ******** ****** **** ** ****** ********.

  • *** ****** ****** **** *******/*****/***** ********** ****** $*,*** *** *** ******** ***** *********: *-** ****** **** $*** *** *** ********.
  • *** **** ******** **** ***** ******** ******** **** **** **** **% ** **** *** "******** ********" *** "******/*********."
  • ** ***** ****** ********, **** ***** **** ******** **** ****** **** ********* *** ************. *******, *****'* ** ******/*********** ******** ****** *** **** **** ******** *** ** *** **** ** *********. ******, **'* ******** **** ****** **** ***** *** *********, ******** ********** *** ********* ********* ** ******* *** ***.

*** ******** *** *** **** ******** *** * ********* ** *** *** ***** *** ***** ****** ** *******. *** ********* ** ******* **** **** * ***** ******** ********* *********, ******, **********, ****** ****, **********, ***.

**** ** **** ** *** ******** *** ****** ********** **** ****** ** ********.

CSO Survey

* **** **** ****** ** **** *** ********. *** ******** *******:

  • **** **** **% ** ******** ******** ***** **** *** ******** ******'* **** ** ****** ** ********* *** *********. **** ** ** **** **% ** ****. *******, *** ******* **** *** ******* *** ****** *** **** ********.
  • **% ** ************* *** ** ****** ********* *********** *** ******** *********. * ** *** ********* *** ******* **** ****** ** **** ****** ** *********** *** **** ** **** ** ****** **** ****** ******. ****, **** ******** *** ******* ** ******** ****** ** *** ******** ** ************.
    **% ** ************* ** *** *** * ****** ********** ********** **** *******. ****'* * **** ****** *** *** **** * ** *** ********* **. **** ** ******** **** ****** *** ******* *************.

IT Role in Security from IMS

*** ******** ******** * ******/****** ** ** ******** ****** ** *** ******** ********. *** *** ****** ** **** ** ** ******* * ******* **** **** **** ****** (**** **** **% ** ** ******** *** ******** ** *********). *** *** ** ******* ****** ** ******* **** ********* ** **** *****. ********* ******** *** **** *** ** ****** *** ****** ** ***** **** **** ******* ** **'* ********.

**** ******* ******* ** ***** *********** ** *** ***** **** ** ***. *** ********* ******* ** **** ** * ** '****' ***** ** *** ***** * *******. **** ** ******* ** ********** ***** ********** ****** * ******* (** * **********) ******* * ******** ****** ******** *** *** ** *****, ******** ** ******** ** ******** ********. [** * **** ****, ******* *** **** ***** ** * **** ****** ******* *** ***** ************ ********]

Convenience Store Security Manager Survey

** ******* ****, ************ ******* ******** ******* **** * ****** ** *********** ***** ********.

** *** *** ***********, ***% *** ***** ************ *** **** *** *** ** *** **** ********** - ** ** ********. *******, **% ** *********** *** ***** ******* *** *** ********* ** *** *******. **** *** ** ******** ********** *** ** ******** *** ******* ** **** ****** ***** ** ****** ********* *** ****** **** ******* ************ - ***** **** ****-** **** ** ****. ** *** ***** ****, **** ******* *** **** ********* *** ***** *** **** ******** ** ******.

**** **% *** ***** ********* ** *** ******* *** *% *** ** *******.

******* *** **** *********** ***** ** **** **** ** *** *** *********** ****** *** ***** ***** *********. * ***'* **** **** **********. ********** ****** ** *** **** * *** ** ***** ** ***** ** **** ********* *** *** ***** ** ********* **** ***** ******* ***** ** ***** *********** *** **** ***** **** *******.



Comments Only PRO Members can view and submit comments for this article.



Most Recent Industry Reports

$100 True WDR Camera Tested (FLIR CVI) on Jul 31, 2015
True WDR has traditionally been quite expensive. And HD analog has so far been mostly low-end models. Now, FLIR has released a ~$100 1080p CVI camera with true WDR and integrated smart IR. We bo...

First Integrator Face Off Opened on Jul 29, 2015
IPVM is starting a new series. A scenario will be presented and selected integrators can respond with their proposals / designs. Then those responses will be shared with the IPVM communi...

Hospital Video Surveillance Guide on Jul 28, 2015
This 16-page guide explains the key uses, design factors, and players in the Hospital Surveillance market.   A global group of 50 integrators and consultants with hospital project ...

Axis Camera Companion VMS Tested on Jul 27, 2015
Axis is focusing more on their own 'end to end solutions'. Camera Companion is Axis' 'VMS killer', which is free and eliminates using traditional VMS software. It jumped off to a great start, then...

Testing Zwipe Fingerprint Card on Jul 23, 2015
By embedding a fingerprint reader into an access control card, Zwipe claims it can increase security without requiring facilities to new / expensive fingerprint readers.   In this test, we p...

ADI's Disruptive W Box Tested on Jul 22, 2015
ADI moves hundreds of millions of dollars worth video surveillance equipment each year. And now, they are disrupting the channel, cutting out manufacturers. We bought an IP camera and NVR from AD...

Camera Calculation Presentations Released on Jul 21, 2015
Wow your customers with beautiful presentations of your video surveillance designs.  Now you can generate PowerPoint presentations, PDFs, Word Docs and Zip files of your Google Map ...

Smart CODEC Guide on Jul 21, 2015
Smart codecs are a next 'big thing'. With cameras having more and more processing power available, it is enabling them to make 'smarter' decisions about how they compress video. The marketin...

ACTi 10MP IR Camera Tested on Jul 20, 2015
10MP, Integrated IR, Motorized Zoom lens. All for just over $300 promotional pricing. An incredible deal, on paper, from ACTi's "Catch All The Details" marketing campaign We bought an ACTi E617 ...

Ethernet over Coax (EoC) Shootout on Jul 16, 2015
Reusing existing coax for IP cameras can cut installation costs dramatically. However, there are endless numbers of Ethernet over coax adapters available, all with differing price points and f...