'Confidential' Security Product Pricing Revealed

Author: John Honovich, Published on Nov 25, 2012

When preparing a security project, one of the first questions is: "How much will this cost?" Tighter budgets restrict organizations all the time. Cost is often,for better or for worse, a prime factor in decisions. For this reason, price lists are often desired to ensure the lowest costs are achieved.

Industry manufacturers, however, generally do not make pricing publicly available. If the public has no idea what an item should cost, based on MSRP pricing, their dealers may mark up hardware and software to whatever level they choose. One way end users across all segments can get a better idea of pricing is to utilize publicly available pricing from purchasing agreements, such as the US government's General Services Administration (more commonly referred to as the GSA).

*** ******** ************* ** ******* ** ******** ******* ** ***** to **** **** ** *** ***. **** ********* ***** ******* to **** ******* ** "**% *** ** ****", ***** ***** their ***** ******, *** ****** ******* *** ****** ** ****** their ****** **** *** ******, ** ** ***** ***********. **** does *** ****, *******, **** ******** ******* ****** ***** *** same ******* ** ********* ******. **** *** *** **** ****** on ****** *********, **** ***, ** ** **** ***********.

* ****** ** ****** ********* ************** **** *** ***** ************ *** *** ***** **, *** example:

  • ********* ************ ********: ****'* ********* ****** *** ~$*,****** ****'* ******** ** *** ********* ******** ********, ********* *******, ******** *** ***.
  • **** ********************************* **** ** *****. *** ***** ********* *** ***** *** price *** ** **** ******** **, **** **** ** ********** interesting. *** *******, * ****** ****** **** ********** ***** ~$*,****** * ****** ******** **** ******* *****~$*,***.******** *********** ****** ********, ** *** ***** ****, ****** **** ***** $*,*** ** nearly $**,***, *** ********* *** ************.
  • * ****** *** ****** ******* *** ******** ********** ******* ***** shows *** *********** ** **** ** *** **** *** *** for *** **** ******* **** ********* *******. ********* *** "***-*****" ******** ******* **** *** ********* ******* ******** *** **** license, **** ****** ******* **** $*,*** ** $*,***. **** ** a **% **********, ***** ***** ****** ** ************ ******* ***** GSA. ** ***** ***** ****** ****** *** *********, *******, ********* these *** ** ****** * ****** ****** *** **** ******** costs.
  • ******** ***** ************ ************* *** ** ***** *** *** ** well. ********* **** ********,****,*****,*****, ***** *** ***** *******, *** ** ***** *** *********.

****** ****** ****** ** ***** *** ******* ** ****'** *** eligible *** ********** **** *** *** ********. ******* ** *** GSA ******** ** ********* **** ***** (** *** ***** ** 20-40%) ** ****. ****** *** ******* ********* ** *** ******* will **** ** *********** *******. ************, ******* ** *** *********** kept **-**-****. **** ******* *** ** ****** ** ********, *** new ******** *** *** ** ******. *** ****** **********, *** may ** * ******** **** **** ********* **** *********, *** should *** ** **** ** * **** ****** ** ******* information.

[**** **** **** *** ********** ****** ** **** *, **** but *** ******* *** ******* ** ******** ****.]

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Classic

Vulnerability Directory For Access Control Cards on Aug 14, 2017
Knowing which access credentials are insecure can be unclear, especially because most look and feel the same. Even the most insecure 125 kHz types...
Hack Your Access Control With This $30 HID 125kHz Card Copier on May 01, 2017
You might have heard the stories or seen the YouTube videos of random people hacking electronic access control systems. The tools that claim to do...
Dahua Backdoor Uncovered on Mar 06, 2017
A major cyber security vulnerability across many Dahua products has been discovered by an independent researcher, reported on IPVM, verified by...
20 Manufacturer Favorability Ranked on Feb 28, 2017
20 security industry organizations' favorability was ranked based on direct feedback from over 100 integrators. In-depth comments revealed insights...
'Dirty': Hikvision Attacks Genetec on Feb 20, 2017
Hikvision is angry at the growing public awareness that Hikvision is owned by the Chinese government. They took aim at Genetec,...
Hikvision Removed From US Embassy on Nov 22, 2016
Hikvision cameras have been removed from the US Embassy Afghanistan and a procurement for more Hikvision cameras has been cancelled, after IPVM's...
Genetec Expels Hikvision on Nov 08, 2016
Genetec has removed support for Hikvision devices, deeming them 'untrustworthy', citing customer concerns about Chinese government ownership /...
Axis Releases Access Credentials - Insecure But Convenient on Nov 02, 2016
Axis continues to build out their own end-to-end 'solution'. The company recently announced a series of credential cards, but instead of a...
Hikvision CEO Admits Hikvision China State-Owned Company on Oct 06, 2016
Hikvision's CEO admitted that Hikvision is a China state-owned company, during a 2015 visit to Hikvision from Xi Jinping, the General Secretary of...
How To Become an 'Expert' In An Hour on Sep 02, 2016
If you want to be perceived as an expert in your market, speak at every event possible... the math is simple: when someone stands in front of an...

Most Recent Industry Reports

Camera Multi-Streaming Usage on Nov 22, 2017
IP cameras typically support multiple streams, allowing a single camera to transmit multiple streams at different resolutions, frame rates and even...
Law Breaking Longse Enters USA on Nov 22, 2017
Longse has established itself as world class, at least in spamming the industry, ripping off Milestone and Video Insight as well as Hikvision. But...
Amazon Key In-Home Package Delivery Examined on Nov 21, 2017
Interesting idea or invitation for criminals to rob you? Amazon's recent announcement of Key, a service that will help manage visitors, welcoming...
Top Maglock Provider Warns Against Using Maglocks on Nov 21, 2017
Do not buy my company's product. It sounds strange indeed, but a senior Allegion consultant stated that maglocks should not be used in common...
CBR vs VBR vs MBR - Surveillance Streaming on Nov 21, 2017
How you stream video has a major impact on quality and bandwidth. And it is not simply CODEC choice (e.g., H.264 vs H.265). Regardless of the...
Hikvision Chinese Government Owner CETHIK Exposed on Nov 20, 2017
Hikvision deceives about its Chinese government ownership. Contrary to their claims about 'independence' and simply having 'shareholders' that are...
Dahua Hard-Coded Credentials Vulnerability on Nov 20, 2017
A newly discovered Dahua backdoor is described by the researcher discovering it as: not the result of an accidental logic error or poor...
Panasonic Unified Surveillance Strategy Analyzed on Nov 17, 2017
Panasonic is now a "Unified Surveillance" offering, as their ASIS 2017 booth proclaimed: Looking to make a comeback in the security industry,...
Amazon Cloud Cam Is Poor (Tested) on Nov 17, 2017
Retail behemoth Amazon has entered the surveillance market with the Amazon Cloud Cam, the eyes of its just-announced Amazon Key delivery...
Nest Secure Alarm System Tested on Nov 16, 2017
Google's expansion continues, this time into home security with their Nest subsidiary's move into alarm systems. They paid more than a...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact