'Confidential' Security Product Pricing Revealed

Author: John Honovich, Published on Nov 25, 2012

When preparing a security project, one of the first questions is: "How much will this cost?" Tighter budgets restrict organizations all the time. Cost is often,for better or for worse, a prime factor in decisions. For this reason, price lists are often desired to ensure the lowest costs are achieved.

Industry manufacturers, however, generally do not make pricing publicly available. If the public has no idea what an item should cost, based on MSRP pricing, their dealers may mark up hardware and software to whatever level they choose. One way end users across all segments can get a better idea of pricing is to utilize publicly available pricing from purchasing agreements, such as the US government's General Services Administration (more commonly referred to as the GSA).

*** ******** ************* ** ******* ** ******** ******* ** ***** to **** **** ** *** ***. **** ********* ***** ******* to **** ******* ** "**% *** ** ****", ***** ***** their ***** ******, *** ****** ******* *** ****** ** ****** their ****** **** *** ******, ** ** ***** ***********. **** does *** ****, *******, **** ******** ******* ****** ***** *** same ******* ** ********* ******. **** *** *** **** ****** on ****** *********, **** ***, ** ** **** ***********.

* ****** ** ****** ********* ************** **** *** ***** ************ *** *** ***** **, *** example:

  • ********* ************ ********: ****'* ********* ****** *** ~$*,****** ****'* ******** ** *** ********* ******** ********, ********* *******, ******** *** ***.
  • **** ********************************* **** ** *****. *** ***** ********* *** ***** *** price *** ** **** ******** **, **** **** ** ********** interesting. *** *******, * ****** ****** **** ********** ***** ~$*,****** * ****** ******** **** ******* *****~$*,***.******** *********** ****** ********, ** *** ***** ****, ****** **** ***** $*,*** ** nearly $**,***, *** ********* *** ************.
  • * ****** *** ****** ******* *** ******** ********** ******* ***** shows *** *********** ** **** ** *** **** *** *** for *** **** ******* **** ********* *******. ********* *** "***-*****" ******** ******* **** *** ********* ******* ******** *** **** license, **** ****** ******* **** $*,*** ** $*,***. **** ** a **% **********, ***** ***** ****** ** ************ ******* ***** GSA. ** ***** ***** ****** ****** *** *********, *******, ********* these *** ** ****** * ****** ****** *** **** ******** costs.
  • ******** ***** ************ ************* *** ** ***** *** *** ** well. ********* **** ********,****,*****,*****, ***** *** ***** *******, *** ** ***** *** *********.

****** ****** ****** ** ***** *** ******* ** ****'** *** eligible *** ********** **** *** *** ********. ******* ** *** GSA ******** ** ********* **** ***** (** *** ***** ** 20-40%) ** ****. ****** *** ******* ********* ** *** ******* will **** ** *********** *******. ************, ******* ** *** *********** kept **-**-****. **** ******* *** ** ****** ** ********, *** new ******** *** *** ** ******. *** ****** **********, *** may ** * ******** **** **** ********* **** *********, *** should *** ** **** ** * **** ****** ** ******* information.

[**** **** **** *** ********** ****** ** **** *, **** but *** ******* *** ******* ** ******** ****.]

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Classic

Testing DMP XTLPlus / Virtual Keypad Vs Alarm.com & Honeywell on Dec 13, 2017
DMP has a strong presence in commercial intrusion alarms, but not in residential. However, the company's XTLPLus wireless combo panel and Virtual...
The Race To The Bottom Is Over on Nov 28, 2017
The race to the bottom in video surveillance is over. After 3 years of aggressive price cuts and heavy sales and marketing expenditures, the...
Vulnerability Directory For Access Control Cards on Aug 14, 2017
Knowing which access credentials are insecure can be unclear, especially because most look and feel the same. Even the most insecure 125 kHz types...
Hack Your Access Control With This $30 HID 125kHz Card Copier on May 01, 2017
You might have heard the stories or seen the YouTube videos of random people hacking electronic access control systems. The tools that claim to do...
Dahua Backdoor Uncovered on Mar 06, 2017
A major cyber security vulnerability across many Dahua products has been discovered by an independent researcher, reported on IPVM, verified by...
20 Manufacturer Favorability Ranked on Feb 28, 2017
20 security industry organizations' favorability was ranked based on direct feedback from over 100 integrators. In-depth comments revealed insights...
'Dirty': Hikvision Attacks Genetec on Feb 20, 2017
Hikvision is angry at the growing public awareness that Hikvision is owned by the Chinese government. They took aim at Genetec,...
Hikvision Removed From US Embassy on Nov 22, 2016
Hikvision cameras have been removed from the US Embassy Afghanistan and a procurement for more Hikvision cameras has been cancelled, after IPVM's...
Genetec Expels Hikvision on Nov 08, 2016
Genetec has removed support for Hikvision devices, deeming them 'untrustworthy', citing customer concerns about Chinese government ownership /...
Axis Releases Access Credentials - Insecure But Convenient on Nov 02, 2016
Axis continues to build out their own end-to-end 'solution'. The company recently announced a series of credential cards, but instead of a...

Most Recent Industry Reports

Chinese Government Hikvision Surveillance System On US Government Network on Jan 18, 2018
Hikvision, the Chinese government-owned manufacturer, has publicly claimed that their products are running on a US government network. Moreover,...
Camera Course - Last Day - Save $50 on Jan 18, 2018
Today is the last day to save $50 - register now. Learn video surveillance and get certified. Save $50 on the course, ending this Thursday the...
VSaaS Usage Statistics 2018 on Jan 18, 2018
VSaaS has been a 'next big thing' for more than a decade. The prospect of managing, storing and streaming video from the cloud rather than...
Vivint Streety Video Strengthens Door Knocking on Jan 17, 2018
Vivint is famous (or infamous depending on your perspective) for mastering large scale door to door selling. The company has skyrocketed from a...
Axis: "It’s A Question Of Trust And Who You Want To Be Associated With" on Jan 17, 2018
Who do you trust? Who do you want to be associated with? Axis is raising hard questions to start 2018. In this note, we examine these questions,...
Software House Vulnerability Allows Inside Attacker To Open Doors on Jan 17, 2018
A vulnerability in Software House IP-ACM modules allows an attacker to potentially unlock doors, or perform other actions, on affected systems....
'Defiant' Hikvision 'Strikes Back' At WSJ And US on Jan 16, 2018
The fight is on. Hikvision and their owner, the Chinese government, 'strikes back' against the Wall Street Journal and US politicians raising...
The 2018 Surveillance Industry Guide on Jan 16, 2018
The 300 page, 2018 Video Surveillance Industry Guide, covering the key events and the future of the video surveillance market, is now available,...
Edward Snowden Haven App Tested on Jan 16, 2018
Global coverage followed the December 2017 announcement that Edward Snowden was leading a team developing Haven, an app "that leverages on-device...
This High Schooler Is Excited About His Future Security Career on Jan 15, 2018
A common lament is that smart, young people have little interest in surveillance systems. In fact, discussions like Should Talented Young People...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact