Cybersecurity Insurance For Security Integrators

By: Dan Gelinas, Published on Nov 29, 2018

Most security industry professionals carry insurance to cover themselves in the event of a general loss. However, most are not carrying cyber insurance.

Insurers and industry groups IPVM spoke to say it is a 'no-brainer,' however, for integrators that are concerned about the bottom line and may feel that they will not have an issue, this may look like a poor investment.

cybersecurity insurance

In this note, based on our research and interviews we look at:

  • Why have it
  • What are the different types
  • Who offers it
  • How much does it cost
  • Who is endorsing it
  • What reasons against it

**** ******** ******** ************* carry ********* ** ***** themselves ** *** ***** of * ******* ****. However, **** *** *** carrying ***** *********.

******** *** ******** ****** IPVM ***** ** *** it ** * '**-*******,' however, *** *********** **** are ********* ***** *** bottom **** *** *** feel **** **** **** not **** ** *****, this *** **** **** a **** **********.

cybersecurity insurance

** **** ****, ***** on *** ******** *** interviews ** **** **:

  • *** **** **
  • **** *** *** ********* types
  • *** ****** **
  • *** **** **** ** cost
  • *** ** ********* **
  • **** ******* ******* **

[***************]

Why **** ** - ******** **** ***** ****

**** ******** ************* **** to ***** ** ***** general ********* (**) ******** to ******* ***** ******** in *** ***** ** a **** ** ** the ***** **** **** a ******* ** * system *******. *** *******, it ** ****** ** commercial **** ** ******* proof ** *********.

*******, ***** ********* ** not ******* ********* **** security *********** ***** **, though********* *********, ***., *** ** *** insurers **** ***** ****, said **** "***** ** one ** *** ******* growth ***** *** *** of *** ******* ****** areas *** *** ********* industry, *******."

********* ******** **********, ************ ***** ****** at***********, * ********* ****** of ***** ******** ** insurance *********, *** ******** a ***** ****** *** get ********* **** *******:

*** ******* ****** **** for ********* ** *** $25-$50 ******* ******* ***** without * ****** ** $650,000. *** ******* **** for * ******* ******** is $***/****. *** ******* cost *** * ******** forensics ****** ** *********** your ****** ** $***/****.

********* ********* ******* ** ************** ***** **** ****** respondents **** * ***** breach ** **** ***** was **********, **** **** not ******** *** *** eventuality.

*******, *********** **** ***** coverage ************ *** ******** to ****** ** ********* of ****** *********:

** ***** *********** **** bigger *******, ***** ******* are ***** ** **** bigger ***** ***** *** they'll ** ******* ***** coverages **** ***** ************.

***** ************* ************* **** **** **** with *** **** ** department *** *** **** stringent ************* **** ********* adherence, *** ******** ******** clicking ** * **** in ** ***** *** undermine * ******* *** open **** ** * breach.

What *** *** ********* *****

*********** **** **** ** is ****** * ******** to ***** ** *** different ***** ** ******** as ****** "*****":

***** ** * *** name *** **. ** matter ***** *** **** is—on ***** ** ** the *****—***’** ***** ****** for **. ********’* ******* on *** ******, *** we **** ****** ****** coming ** **** ****’* about ********.

***** *** ******** * types ** ******** **** fall ***** *** ******* catch-all ******* "*****," ********* to ***********

  • *******
  • *****
  • *******

********** ****:

*** ******* ******* ** media *** **** * teacher ****** * ***** guide ****** *** ** was ** $**,*** ***** because ****** **** *** an ******** ******* *** people ********** ******* *******. A ***** ** ****** had ********** **** ***** guide, ** *** ******* grew.

********* ** *** ******** IPVM ***** **** * good ***** ****** ****** also ***** ****** **** slander, *****, *****************, ********* infringement, *** ****** **** infringement.

Who ****** **

*** ********* ***** ******, INSUREtrust, **** ***** **** probably ***** **** * dozen ******** *** **** offering ***** ******** *** doing ** ****:

**** * *****-***** ***********, there *** ******** **-** and ****** **** *****’* probably * ** * who *** ***** * real **** *** ** writing ******** *** **********-***** companies.

***** ******** **** *** confirmed ***** ******** ********** ********,******* ******,********* ********,********* *********, ***., *** ******. **** is *** ** ********** list. **** **** ******* out ** *** *********, State ****, ********, *** Farmers' ********* *** *** not ***** **** ***.

*********** **** *** *** insurance ********* *** ****** integrators *** ******** ** the *****/******** ***** ************* ***,******,***, *********.

**** *******, *********, *** *** of*** ******** ********** * *******, *******, stating **** **** *********** will ** ** ***** existing ******* ********* ***** who **** **** ****, probably ***********, **** *** provide *** ***** ********:

** ********* ********* ***** contacting **** ******** *****. Because *** **** ******** of **** ******** ****** are ***** ** *** that **** **** **** type ** ******** **** in **** **** ** not *** ****.

How **** **** ** ****

*** ******** ** ***** with **** *** **** will **** ********* ** a ****** ** *******, including *** ******** ** the ******* ** ********, the ***** ** ************ they **** ****, *** values ** ***** ********* and *** ********* **** want ***** ******** ** be. ** *********** **** cyber **** ********, ******** will ** **** **** a **** ****** ******** privacy, *****, *** *******. For ******** ** *** three ***** *** * $10 ******* ** ******** company:

  • $* ******* ** ******** is ~$*,***/****
  • $* ******* ** ******** is ~$*,*** - $*,***/****
  • $* ******* ** ******** is ~$**,***/****

********** **** *** **** for * $** ******* in ******** ******* *** $1 ******* ** ******** for ***** **** ** ~$600/year.

*********** ******** **** ***** are **** ** ******** out ***** *** **** create ** *********** ***** that ****** *****'* ******* proper **********:

*** *** ** ****, they **** **** *** offer ***** $** ***-*** and ****’** **** ***** from ** ******* **** risk. * **** ****** will ******* **** ******* these ****** ***-*** ***'* provide.

Who ** ********* **

***'* *******, ** ***** above, **** **** ********* their ******* *********** ******* coverage **** ** ******* who *** ***** ******* on ***** ** ****** the ******. ** **** that ** *****'* ***** it *** *** **** sense ** *** **** the ******** ***** ** believed ** *** ********** and *** ******* *** not ***** ** ****:

******** *********** ******* **** it’s ***** ** ** really *********, *** ** isn’t. ** ****************. **’** *** * number ** ******, ***** 20 ** *** *** the ****** *** ** the ******** ****.

********, ******* **** ** felt **** ******** *** becoming **** *** **** than *** *********, **** more **** **** ** PSA ******* ******** ***** coverage:

** ******** **** ******* of **% ** *** members **** * **** cyber ******** ****** ** effect ***. ****’** *** that *********. ****’* ****** no ****** *** ** have *** ***** ****.

*** ********** ******** *************** ******** ***** ********* coverage ******* ************* ******* **** ********** Group [*****]:

** ****** ********* ***** coverage ** *** ******** and *******. *** ******** is **** *** **** a ***** *******, *** need ******* ** **** you ******* **. *** program ** ***************.

*** ******** ******** ***********(***) **** ********** *********** research ********* *** ******* themselves ** ******:

*** ********** ***** ** research ***** ********* ******** providers *** ** ********* if * ***** ********* policy ***** ***** *****. All ******** ****** ** closely ********, *** *******, SIA ******** ***** ********* can ** * ****** tool.

What *** *** ******* ******* **

**** *********** ****** ******* that * ****** ** unlikely ** ****** ****. And, *************, ***** *** low ***** ******* ** insurers, **** ******* **** they *** ***** (*.*., if * $* ******* policy ***** $***, **** implies *** ******* ****** the **** ** ** occurrence ** * **** are **** **** * in *,***).

**** *********** **** ****** they *** **** ** their *** *** **** not **** *** ***** of ******** **** **** to **** ********. *** example, **** **** ***** the ****** ************* ***** to ******* ****, **** down ******, ****** ******** and ******* *** ****** from *********.

**** **** ******** **** at *** **** ********** with ****** ******** *** weigh **** ******* *** chance **** **** **** suffer * ****** *** say *** **** ** not ********* ** *** risk. ***** *********** **** rightly ****** **** ********* companies ***** *** ***** if ***** ******** *** actually ****** *** **** often. ********* ********* ******** to ****** *** **** because **** ******* **** in ****** ******** **** they *** *** ** claims.

**** ** ***** ** evolving **** ** ********* with *** ******* **** spoke **** ******* ** the "****, **** ****." The ***** ** ********* available ***** ****** ** might ** **********. * wait *** *** ******** may ** **** ** this ****.

Vote / ****

Comments (16)

** * **********, *** ** ** ******** *** ******* * minimum ** $** ** ***** ********* *********.

****** *** *** ******** *#*. *** ** *** ***,*** ***** ******** ***** ** ***** *** **** *** *** cyber ******?

**** ** *** ******* ******** *** *** ******* *******:

***** ********* *********: ******* *** ******* ******** (“*****”) ********* ******** loss ******* *** ** ** ** ********** **** **** ** disclosure ** ******** ***********, ***, ** ************ ***********, ** * minimum ****** ** $*,***,*** *** ********** *** ** *** ****** aggregate.

*** ********** ** ******* ** ****** ***** *********** ** ********* with ***** ***.

*** *** ***** *** ********** **** *** ***** ******** ***********, PHI, ** ************ ***********? ** ** **** **** *** ***** contracts ** **** * **** ** ** **. *** *** do *** ****** ** *** $*,***,*** ******? *** *** ******** your ****** **** ******* ** ******** ** * ***** ** that *****?

*** *** ***** *** ********** **** *** ***** ******** ***********, PHI, ** ************ ***********?

** ** *** ** ** ********** ** *******. *** ***** policy ******** *** ***** ********* ********** ****** ** ***** *****. The $** ****** ** * ******** ***** *** * ******** would **** * **** **** ******* * ******* *** ***** write ** *** ****. ** ***** ******** **** ****** *** larger ** **** ********* ******* *** *** ****** ***** ** determined ** ******* **** *** ******* ********* *******.

*** *** ******** **** ****** **** ******* ** ******** ** a ***** ** **** *****?

**** ** *** ** **********. ** * *********** ******* ** breached *** ******* * ******* *********** ***** ********* ******* ********** will ** ********* ********* ************ ** *** ******.

*** **** **** ** * *** ***** *** * ** sure **** ********* ****** **** **** ** ****** * ******* by ******* **** *** ********** *** ********. *** **** **** NOW *******!!!!

******* *** ********* ***** ****** ** ******** ** ************ ****. Compare ********* ** * ******* ****** * ********** *****. ** course * ** **** ******, ******* ******* ********* *** *** lack ** ********* ********* ** ************. ******, *** **** ** know *** ** ****** *** ******** **** ********* *************** ** a ******* **** ***** *** *** **** ******* **** ** your ******** ** ***** *** *** ********* *****.

** *** *** ******* ******* **** *** ** **** ** the ********* ******** *** ******** ******* ******** ** *** ********. Systems *** ** ********** ***** ** *** ** *** **** data ****** ** ** **** ****** ********* ***** *** ********* for **** *********** ** **** *******. **** ***** **** *** the *** ** *** ******* **** ************ ******** ******* *** letting *** ** *** ******** **** * ****** ***** ******** on *** ******. ******* ******* *** **** ***** ** **-** bot ******* **** ********* *** ** **** ****** *********** *** lifespan *** * ***-*** ******* ************. (*****).

** ** *** *** ******* ******, **** ***** *** **** comet **** ** ******! *** *** *** *** *** ******* 1 *****? **** **** ***, **** *** **** **** ***** we **** *** ******* ******! (******* *** **** *** ********).

* ** **** **** ********* ****** **** **** ** ****** a *******

** **** ** * ********** ********* ***** *** ***** **** cyber ******** * ***. ***** ******** *** ********* ***-*** ** the ******* ********* ******** *** *** **** ******. *** *******, an ******* ***** ********** (********* ** ***) **** *** ***** $1,000 * **** *** * $** ****** ******. *** ****** will **** **% *** *** ***** **** *** ********* ******* 35%-50% ** **** ** *** *** ******* $**-$**. ******** ** say *** *** *** **** ** **** *** *** * am ***** ******** ** ** ** **** ********.

****** *** *** **** **#*, *** ***** ** **** *****. Perhaps * ****** **** ******** *** "*******" ******* *** ******** themselves, **% **** *** * *** ****** ******** *****, **** leaks ** ***** ********* ************ ******* ** *** ****** **.

********** * **** **** **** **** *********, ** **** ** flip **** ****** * ***'* **** ** *** ** *** grocery ***** ** *** * *** **** *** $* ****** while **** ***** ******* ** ***** ******* $** ******* ** other ****. ******** ** ****** ** "********* *** ***** **** buy ***** *****".

***** ** ******** ** ********* ******* *** **** ****** *****'* of ******. **** **** ********* ****** ********... *** * *****.

*********** *** ********* ******** ** ***** ** ****-*********, *'** ******** this **** *********.

********** ** ** *********** **** ****.

** * ******* ****... **** ***** ** ******** ******* ** your *'* *** *'* ** *** **** ***** ** **** quotes. ** * ********** **** ** * ******* **** ** much. ** **** **, *** **'* ********* ** ********* ***'* have ** *** ******* ** ***** *** ***** * ****** cyber ******** **** ******* ** **** ******* *** ********* **** irresponsible ***********.

**** ***** ** ********** *** ***** *******.

***'* ** ******** ** ******* ********* ** **********'* ********** ******* vs ******* ********* * ****** ** ****** ** ********** ********. One ** ******* ** ***** ******** *********, *** ** ***.

*** **** ****** ** ***-**** ****** ******* ***** ******** ********* of ** ********** ** ** *** ********** **** ***** ***-**** confidential **** ** ***** ********. **** ** ****** ***** ****** platforms *** ********** ********** ** *********** ****** *****. *******, *** end-user *** ********** ****** **** ** ***** ** *** ******** that ** ** ***** ***** *** ********** ***** ***-**** ************ data ** ***** ********** *******.

*** ** ***-**** **** ** ****** ******* ****** *** *** months ***** ************ ******* ***** *** *** ********** ****, ********* SSNs, **** *** ******. **** ** *** ********* ** ***** security *********. ** ** ****** *** ******* ** ******** ****** perhaps ************ ********* ********* (****** *** *********) ** *** ****** was * ****** ** **********.

****** ****: **'* **** ******** ** **** ***** ******** ********* to *************** - *** **** *** ******* *** ** ***** ******* else ** ****************.

**** *******, ******. * ****** ** ***** *** *** *** information. *'** ******* **** *** ** ** ******* *** *** story ** **** ** * *** ******* ** *** ********* Information ********* ** *** ** * *** **** **** **** information. *'** ****** ** **** **** *********** ** ** ******* available.

***** ******. * ***** **** **** ****** ** *********** *** also **** ***** ** *** ********* *********** *********. **** ** what ****** *** ** *** *** *****'* ******** ******:

*’* *** **** ***** **** ********** *** **** *********** *** it ** **********. **** ***** **** * **** **** “***-**” cyber-extension ** ***** ** **** *** ***** *** ********** **** coverage ** **** *******. **** ***** **** *** **** ********** that *** *********** * ***** ** *** ***** ** ******* both *** ***** *** **** *&* ********* ** * ******** basis. ***** *** *** ******** ** *** ******* *** ************ on ****** ********** **********.

“*** ** ***-**** **** ** ****** ******* ****** *** *** months ***** ************ ******* ***** *** *** ********** ****, ********* SSNs, **** *** ******. **** ** *** ********* ** ***** security *********.”

  • ** **** ****** ******* ********* **** *****’* ***** **** ********, they *** *****-******* *** ***** ******** *** ********* *** ****** much *** ***** ********. **** ******** ** ***% ********* ** a **** *****/**** ******. **** ** **** *** ******* ******** to ********** *** **** ** **** * **** *&*/***** ****** on * ******** ****. *** ******** * ********* * **** most ***** *** ***** ********-**** ******** **** ******’* ***** * gap **** **** ** *** ********. * **** ******* ******** you ****** ******** ** *** *****-***** **** ** *** ****** to **** *** ******* – *** **** ***’* *** **** thing ** *********** ****** ***** ** ***** ** **** *** whole ****-**** ****** **.
  • **’** *** * ***** ***** ** *****/****** **** ********** ****’* catch ********* **** **** *** ** **** ** *** ********/******** that *** ***** ********* *** ** * ****** ** ***** services, ******** ******* ***** *** ***** ****** ** ***** ******* that ******** *-** ****** ***** *** ******** **** *********. ***** is **** **** ** ** ******* ** *** *** **** E&O ** *** ***** ****** ******* ** **** ** ***** scenarios, ***** *** ******* ** ******* **** ** * ********, sophisticated **** **** ***** ******** **** ******* ******* *** ******. You ***** **** ** ***** ******* **** ******* ** *** have * *****-** *&* *** ** ** **** ** *** a *****-** ***** *********, ***** ** ********* *** ** ********* against **** ******** . ** **** ****, ** *** *** it ******* *** * ******** **** *&*/***** ****. ** *** both ******* ******** ********** ******* **** ** *** *** ********* code ***** *** *** ******* ** ***** ******* ** *** first ***** – *** **** *****-************ ********** ** ** ** part ** ***** ******** ** **** ** ****** ***** ******** won’t ****** ** *********** ****. *** **** *** *** **** on * *************, ******** **** ** *****, ***** ***** **** been **** ****** ******** ******* ******** *** **** ****** ****** handling. **** ***** **** ******* ** **** ********** *** ****** payment **** ***** ********.
  • ****, *** ********** ** * ***** ** **** ******** ****** should ******* * ******* *** ****** ** ********. **** ****** cover *** ****** ** ********** ******** ** *** *************** ** client **** *** *** ****** **** ******* *** *** ************* breach ** ******** ******** ** **** ************/**** ********. ********** ******** any ***** ********* **** ***** *****-**** **** ***** *** *&*, but **** ********* ***** ******** ***** **** ** ******** ******** exclude ****** ** ******** **** **** **** ** *** *** throw ** ***** *** **** *&*.
  • **** ********* ** ** **********/********* *****’* ********* **** *** ************ is ******** – ** ******* ****** **** ********. ** ********* activity *** ***** ** * ******’* ****** ** ****** ** your ********** ** **** ******/**** *** *** ****** **** ******* as * ******, *** *** ****** *** ******** ** ********* for ****. **** *****/**** ****** ** ****** ******** ***** *** service *** *******. ** * *** ** *****, *** ******* could **** **** **** ** ********** ********** ** ********** ** remote-in *** ******* *******/*********** ** ******* *** *******. ** * privacy/security ***** *** ****** ** *********** **** **** *** ********** from *** ********** ** *** ********* ******* (** *** ***** during *** ****** ******) **** ****** **** ********. ************, **** of ***** ****** ****** ****** ******* ***** ************* (***** ********** transfer ** ***** ********/******** ********/*********** ** *******, ***.)

“*** **** ****** ** ***-**** ****** ******* ***** ******** ********* of ** ********** ** ** *** ********** **** ***** ***-**** confidential **** ** ***** ********.”

  • **** ********* ***** **** *** *********** * ********* ** ******** functions *** ********** ********. *** ******** ***** ***** ******* ************. What ** *** ********** ***’* ******* *** ********* ****** **** on ***** *** ******* *** ****** *********** **** ** * cloud ******** ***** **** ***** ** ***? **** ** ***** legally ***** ************** ** *******, ********** ** * ****** ******* from *** ***** ********. **** ***** ** *** *********’* *** to ******/********* ** *** *********** ****** ** *** ****-***. *** integrator ***** ***** **** ** ****** ** ***** ******* ** the ***** *** – **** *** ******* ***** ****** ** privacy **********. **** ** *** ***** ***** ***** ******** ** important.
  • *** ********** *** ******** **** *** **** ********** ***** ********* and ******** ** ******* **** ********* **** * “*******-****” ********. This ** **** **** *********** ** **** ******** ****, ** nature, ***** **** ************* ******** *** *****-********* **** ********/*********. ** many *********** *** ********/***** ********* *** **** *** ******-******* ** continuously ******* ******* ** ***** ** ******* ******* *** ********** services, *** *** **** ********** **** *** ********-********* **** ********* to **** ***** ******** **** **** ********** ** ***-*****. **’* not ** ****** ** “*** *** ******* ****** **** ** not” ** * ******** **** *****. **** ***** ** * lot ** ******** *** *** ******** *** ******* ***** ********* cyber *** ********** *****. **** *** * ***** ** ******* and ********* ** *** ** *******/************ ** ********/********* ** **** data ** *** ***** ** ****, ***** ***** ** **** parties *********** ****** ** *** *********. ***** **** ********* ****** to ***** *** ********** *** (**** ******** ****** *** **** bodily ******, ******** ***** *********** *** ***** ****, ***.) **** we **** ** ** ********** *** **** ******** **** ** coverage. ** *********, **** ** *** **** **** ******* ******** a ******** ******** ******. ** ** ******** **** **** **** of ************* *********, ** ********** ************ ****** **** *******, *** as *** *** ******** ****** ************* *** ******* **** ******* out ** ******** *** **** – ** **** ** **** sure *** ********** *** ******** *** *** ******** ***** *** expenses ** ***** ********.

*** **** ** **** ***** ** *** ********* *********** ********* had ** ***:

** *** **** ******* **** ******** **** ****, *** **** be **** **** ****** ******** ***** **** ****** *** **** breaches – *** **** **** **** ***** *********.

***, *’* ***** **** **** ********* *****. ***, *** **** must *********** ****** *** ******* ** **** ****** ********* ** see **** **** ****** ****** *********.

***** ********* **** ***** **** ********. ** ******:

  • ***** **** *** ********
  • ********* ********* ***** * **** ******
  • ********* ******** ********** ** ******** *********
  • ********** *********** ****
  • ********* ******* ******** *******

****** *** *** ****** **, **** ****** **** ********.

******'* ********* ***** ** * ******** *****/*&* ****** ***** ****** isn't ********** ***** ****** ****** ****. ** * ****** ****** the ***** ** *** ****** ** *** ***** **** ******, your ***** ******* ** ** ****** "**** *** **** ******** **** ** *** ****** *** **** be ******* ** *** *****." ** **** *** *** ******** ******** **** **** ***** different ****** *****? * ***** ********* **** ******* *** ******* on **** **** ***** *** ********* ********.

******** * ** ***** **** ***** ** ** **** ***** Insurance ****** *** * **** ******.

  • ***** **** *** ********
  • ********* ********* ***** * **** ******
  • ********* ******** ********** ** ******** *********
  • ********** *********** ****
  • ********* ******* ******** *******

**** * ** *********** ** **** *** **********'* ********* ******* would ******* ****** $*,***,*** ** *** ***-**** ** **** **** of ******** ******* *****. **** ***** **** ***** *** ***** of *** ***** ****** ******** *** **** ** ********* **** was ******** ** **** ** *** ******. **** *** **** of **** ***** ******** ******* ***** ** ** ******** **** bill ***** *** ******* ** $**.

****, *** ****** *** *** *** ******* ** ** *** have *** ********** ***** *** ********* ******* *********** ** *** systems **** ****** ***** *** ********* ** *** ****** ** transferred ** *** *** ****. ****** **** **** ** **** contracts! ** **#*, ** ****, ** ****, ** ********* ********, etc. *** **** ***** *** ** ***** ** **** ** which ***** *** ***-***** ***** ********* ****** ***** **** ******** moving ******* ** ** **** ** **** ** ***** ********** IT *********** *** *******. (************* *** ** **** ******* **** hosted ****.)

***** ******,

*****, ****** *** ******** **** ******* *********** ** ******** ** your **** *******:

“******'* ********* ***** ** * ******** *****/*&* ****** ***** ****** isn't ********** ***** ****** ****** ****.

  • **** ** ******* ** *****. ***** ** *** * ***** line ******* ***** ******** ***** **** **** **** *** ********* separately – ***** ** **** **** *** ** **** ** there ** **** **** **** **** **** ****** ** *********** circumstances *** *** ******* **** * ***** **** ** ****, like *** ******* * **** ** ** ******** ********. ********* the ********* ** *********** ******* ** *** **** *** *********** the ******-******** **** **** *** ***** *******.

“**** ***** ******* ** ** ****** "**** *** **** ******** **** ** *** ****** *** **** be ******* ** *** *****." ** **** *** *** ******** ******** **** **** ***** different ****** *****?”

  • **** ** *** *******. * ** ************ **** ******** *** policy **** ** * ******** ****** **** **** ******** *** both *** ***** *** **** *&* ******** ** ***. ** these ******** ** *** **** ** ***** **** **** ***** coverage ***** *** **** ********** ******* *******, ****** ** ********, errors ** ******** ************/******, ** **** ** ****** **** ***** monitoring ********. * ** ***************************** *** ******** ******** *** *** ***** *** *&*. ** they *** ********, ********* *** ******* ** ******* ******* ******** and ********* ** * **** ********* ****. ************, **** ***** policies ******** **** ** “***** ********* ******” ***** ** *** I ********** *** ******* ******* ******* ****** *** ** ***** clauses. ******* ***** ** *** ***. ****, **** ***** *** separate ******** ** ******* *** **** **** ***** *** *&* on ***** ******* ****** (***** ** **** ******* ******** ******** to * ******** *****/*&* **** */ * ********* ****** **’* recommend) *** **** **** * ***** ***** ***-** ** **** cyber ********** ******* **** *****’* **** **** **** **** **** and ***** **** *** *********** **** ** *** ***** ** error ** ***** ******** ** ******* **** *** ** ** with ******* ** ******* ******** **********, ***** ** ******** * more *** **** ****** **********. *** *************, **** ****** ** believe **** ***** *** ***** ***** ****** *** ** ******** cyber ******** **** **** ****** ********* *** ******* ** **** a ****-******* ***** ******** ****** **** ****.

****, *** ** *** ***** *** **** ***** ***** ********* but ***** ** * *** ******* ****.

  • ***** **** *** ********
  • ********* ********* ***** * **** ******
  • ********* ******** ********** ** ******** *********
  • ********** *********** ****
  • ********* ******* ******** *******

***** ********* **** **** ** ** ********* *** ****** ** thoroughly **** ******** ************ ***** (***** *** ** **** ***** losses), **** ** ****** ********* *** ** *** ******* *****, public ********* ******** ** **** ********** *********** ****** ****** ***********, cyber ***** ******** *** ** ********** ****** ****** *** ******* invoices ** **** *********, ******** ****** ******** ** ********* *** scope ** ******** ****** **********/********* ****, ******** *** ***** *********/********** demands *** ********, ***.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

ADT Eliminating Acquired Brands, Unifying Under 'Commercial' Brand on Jun 14, 2019
ADT is eliminating the brands of the many integrators it has acquired over the past few years, including Red Hawk, Aronson Security Group (ASG),...
Farpointe Data Conekt Mobile Access Reader Tested on Jun 13, 2019
California based Farpointe Data has been a significant OEM supplier of conventional access readers for years to companies including DMP, RS2, DSX,...
Favorite Wireless Manufacturers 2019 on Jun 12, 2019
Many wireless options exist for video surveillance but how are integrator's overall favorites? 170 integrators answered the question: What is...
Axis Will Not Block Resellers on Jun 10, 2019
While Axis generally has strong favorability amongst integrators, the biggest complaint is their channel model, which results in smaller integrator...
Dumber Techs, Bad Box Movers, Says Australian Distributor on Jun 10, 2019
Techs today are "dumber" than they used to be, despite better education and training and that makes a typical day "frustrating" for one...
Hikvision DeepinMind 2019 Test on Jun 06, 2019
In 2018, Hikvision's DeepinMind AI NVR performed terribly, recognizing vehicles, animals, and other objects as humans, misclassifying demographics,...
OpenALPR Doubles Prices on Jun 06, 2019
There is no 'race to the bottom' in cloud / AI video surveillance. In May, Verkada increased their prices. Now, OpenALPR is doing the same with a...
"New" Arecont Fixes Failures "Without A Fight" on Jun 05, 2019
The "old" Arecont was infamous not only for its camera failures but for making their "partners" fight to get them fixed. IPVM drew the ire of...
Startup Rhombus Systems Says Twice the Features, Half the Price of Verkada on Jun 04, 2019
Closed cloud systems may be the fastest growing segment of video surveillance with Meraki and Verkada. Now another California company is joining...
OSDP Access Control Guide on Jun 04, 2019
Access control readers and controllers need to communicate. While Wiegand has been the de facto standard for decades, OSDP aims to solve major...

Most Recent Industry Reports

Sighthound Transforms Into Enterprise AI Provider on Jun 14, 2019
Sighthound is now rapidly expanding its R&D team, building an enterprise AI service. This may come as a surprise given their origins 6 years...
ADT Eliminating Acquired Brands, Unifying Under 'Commercial' Brand on Jun 14, 2019
ADT is eliminating the brands of the many integrators it has acquired over the past few years, including Red Hawk, Aronson Security Group (ASG),...
NSA Director Keynoting Dahua and Hikvision Sponsored Cybersecurity Conference on Jun 13, 2019
The technical director for the NSA’s Cybersecurity Threat Operations Center will be keynoting a physical security cybersecurity conference that is...
Farpointe Data Conekt Mobile Access Reader Tested on Jun 13, 2019
California based Farpointe Data has been a significant OEM supplier of conventional access readers for years to companies including DMP, RS2, DSX,...
Embattled $400 Million China Funded Philippines Surveillance System Proceeds on Jun 13, 2019
An embattled 12,000 camera surveillance system project that will cost ~$400 million will proceed.  The project contract was awarded, had its...
False Verkada 'Unrivaled' Low Light Performance Claim Removed on Jun 12, 2019
Verkada falsely claimed that it delivered 'UNRIVALED LOW LIGHT PERFORMANCE' until IPVM questioned. In fact, Verkada's low light performance is...
Manufacturer Favorability Guide 2019 on Jun 12, 2019
The 259 page PDF guide may be downloaded inside by all IPVM members. It includes our manufacturer favorability rankings and individual...
Camera Course Summer 2019 - Register Now on Jun 12, 2019
Register for the Summer 2019 Camera Course.  This is the only independent surveillance camera course, based on in-depth product and technology...
Favorite Wireless Manufacturers 2019 on Jun 12, 2019
Many wireless options exist for video surveillance but how are integrator's overall favorites? 170 integrators answered the question: What is...
Carnegie Mellon AI Startup Zensors Profile on Jun 11, 2019
Zensors is a startup formed by Carnegie Mellon graduates from a Carnegie Mellon research project, offering customized models per camera that they...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact