'Confidential' Security Product Pricing Revealed

Author: John Honovich, Published on Nov 25, 2012

When preparing a security project, one of the first questions is: "How much will this cost?" Tighter budgets restrict organizations all the time. Cost is often,for better or for worse, a prime factor in decisions. For this reason, price lists are often desired to ensure the lowest costs are achieved.

Industry manufacturers, however, generally do not make pricing publicly available. If the public has no idea what an item should cost, based on MSRP pricing, their dealers may mark up hardware and software to whatever level they choose. One way end users across all segments can get a better idea of pricing is to utilize publicly available pricing from purchasing agreements, such as the US government's General Services Administration (more commonly referred to as the GSA).

*** ******** ************* ** ******* ** ******** ******* ** ***** to **** **** ** *** ***. **** ********* ***** ******* to **** ******* ** "**% *** ** ****", ***** ***** their ***** ******, *** ****** ******* *** ****** ** ****** their ****** **** *** ******, ** ** ***** ***********. **** does *** ****, *******, **** ******** ******* ****** ***** *** same ******* ** ********* ******. **** *** *** **** ****** on ****** *********, **** ***, ** ** **** ***********.

* ****** ** ****** ********* ************** **** *** ***** ************ *** *** ***** **, *** example:

  • ********* ************ ********: ****'* ********* ****** *** ~$*,****** ****'* ******** ** *** ********* ******** ********, ********* *******, ******** *** ***.
  • **** ********************************* **** ** *****. *** ***** ********* *** ***** *** price *** ** **** ******** **, **** **** ** ********** interesting. *** *******, * ****** ****** **** ********** ***** ~$*,****** * ****** ******** **** ******* *****~$*,***.******** *********** ****** ********, ** *** ***** ****, ****** **** ***** $*,*** ** nearly $**,***, *** ********* *** ************.
  • * ****** *** ****** ******* *** ******** ********** ******* ***** shows *** *********** ** **** ** *** **** *** *** for *** **** ******* **** ********* *******. ********* *** "***-*****" ******** ******* **** *** ********* ******* ******** *** **** license, **** ****** ******* **** $*,*** ** $*,***. **** ** a **% **********, ***** ***** ****** ** ************ ******* ***** GSA. ** ***** ***** ****** ****** *** *********, *******, ********* these *** ** ****** * ****** ****** *** **** ******** costs.
  • ******** ***** ************ ************* *** ** ***** *** *** ** well. ********* **** ********,****,*****,*****, ***** *** ***** *******, *** ** ***** *** *********.

****** ****** ****** ** ***** *** ******* ** ****'** *** eligible *** ********** **** *** *** ********. ******* ** *** GSA ******** ** ********* **** ***** (** *** ***** ** 20-40%) ** ****. ****** *** ******* ********* ** *** ******* will **** ** *********** *******. ************, ******* ** *** *********** kept **-**-****. **** ******* *** ** ****** ** ********, *** new ******** *** *** ** ******. *** ****** **********, *** may ** * ******** **** **** ********* **** *********, *** should *** ** **** ** * **** ****** ** ******* information.

[**** **** **** *** ********** ****** ** **** *, **** but *** ******* *** ******* ** ******** ****.]

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Classic

IPVM Is 10 Years Old on Mar 19, 2018
IPVM turns 10 years old today. 10 years ago, IPVM was an experiment. Today, it is the largest and most read publication in our industry. I wanted...
Testing DMP XTLPlus / Virtual Keypad Vs Alarm.com & Honeywell on Dec 13, 2017
DMP has a strong presence in commercial intrusion alarms, but not in residential. However, the company's XTLPLus wireless combo panel and Virtual...
The Race To The Bottom Is Over on Nov 28, 2017
The race to the bottom in video surveillance is over. After 3 years of aggressive price cuts and heavy sales and marketing expenditures, the...
Vulnerability Directory For Access Control Cards on Aug 14, 2017
Knowing which access credentials are insecure can be unclear, especially because most look and feel the same. Even the most insecure 125 kHz types...
Hack Your Access Control With This $30 HID 125kHz Card Copier on May 01, 2017
You might have heard the stories or seen the YouTube videos of random people hacking electronic access control systems. The tools that claim to do...
Dahua Backdoor Uncovered on Mar 06, 2017
A major cyber security vulnerability across many Dahua products has been discovered by an independent researcher, reported on IPVM, verified by...
20 Manufacturer Favorability Ranked on Feb 28, 2017
20 security industry organizations' favorability was ranked based on direct feedback from over 100 integrators. In-depth comments revealed insights...
'Dirty': Hikvision Attacks Genetec on Feb 20, 2017
Hikvision is angry at the growing public awareness that Hikvision is owned by the Chinese government. They took aim at Genetec,...
Hikvision Removed From US Embassy Afghanistan on Nov 22, 2016
Hikvision cameras have been removed from the US Embassy Afghanistan and a procurement for more Hikvision cameras has been cancelled, after IPVM's...
Genetec Expels Hikvision on Nov 08, 2016
Genetec has removed support for Hikvision devices, deeming them 'untrustworthy', citing customer concerns about Chinese government ownership /...

Most Recent Industry Reports

Buy Arecont: Top Bid $10 Million Cash on May 22, 2018
Last year, Arecont had a deal for a purchase price of $170 million (see Failed Arecont China Acquisition). This year, Arecont has a deal for a...
Installing Box Cameras Indoors Tutorial on May 22, 2018
This tutorial starts our physical installation for video surveillance series, starting with Box Cameras, one of the oldest and most basic types....
The Hikvision Smart Classroom Behavior Management System on May 22, 2018
Hikvision's rapidly growing offering of analytics, which we most recently examined with Hikvision's ethnic minority analytics, is now going into...
Dahua Intrusion Analytics And VMD Tested on May 21, 2018
Dahua ships basic analytics on practically all their cameras, ranging from low cost to high end. To see how these analytics work in real world...
Exacq Improving Technical Support, Responding To Integrator Complaints on May 21, 2018
Exacq had been a long-term favorite of integrators, but since their 2014 Tyco acquisition, Exacq has fallen in IPVM integrator studies (though...
Best Manufacturer Technical Support 2018 on May 21, 2018
While 5 manufacturers made the worst technical support 2018 list, only 3 stood out as providing the best technical support to 190+ integrators in...
Stealth / UCIT - Remote Video Monitoring Provider Profile on May 18, 2018
Can 2 remote video monitoring companies, Stealth Monitoring from the US and UCIT from Canada combine to impact the market and compete in a changing...
Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Forced Entry / Duress Access Tutorial on May 17, 2018
Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for...
ADT Stock Drops 50% Since IPO on May 17, 2018
It has been a brutal 4 months for ADT. They first expected to IPO at ~$18. They IPOed at $14, dropping immediately to $12.39 And now, not even...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact