What a truly irresponsible response to credible security threats. Their devices are no longer in a world of Analog Delivery. They are devices that sit at the edge on IT's network and they need to understand that THEY very well may be the reason someone gets access to not only video, but the back end-systems of the network through DDOS attacks. I would never assume that the user will "change" the password or have the savvy to understand that putting a security asset on (even a secured vlan) is a good idea without appropriate authentication.
BOSCH and Arecont - get a brain. It's not that hard to change your build process and software to ensure tight security on your devices. Think of your customers, not your VARS. If they don't have the skills or wherewithal to change the password the moment it sits on the bench for burn-in, then you shouldn't be selling to them in the first place.
What's the year? 2015 going into 2016 - you'd think that Vendors would understand the risk. How did Target get hacked a few years back - an HVAC DDC that wasn't secured and open to an outside vendor. How many VARS request VPN or other access to the customer networks?
I strongly recommend that anyone remotely interested in working with IP stack devices use either Information Assurance to ensure their devices are compliant or use the SANS Institute's CISSP certification to ensure that their operating platforms will fit into their end customers network.
I've said this before, the Physical Security industry has GOT to get with the program, fully. Some vendors truly get it, but they are often started out of IT operations - many of the old-guard are still running the show in the development and operations departments of both end-customers, VARS and suppliers. We need to grow to meet the expectations of a widely different organization.
Scott McNeely said it perfectly when he said the network is the machine. The network is a living machine that needs care and feeding. Let's start living up to our name, Security and help the IT folks secure their networks by minimizing our impact with fewer holes and more restrictions.