'Confidential' Security Product Pricing Revealed

Author: John Honovich, Published on Nov 25, 2012

When preparing a security project, one of the first questions is: "How much will this cost?" Tighter budgets restrict organizations all the time. Cost is often,for better or for worse, a prime factor in decisions. For this reason, price lists are often desired to ensure the lowest costs are achieved.

Industry manufacturers, however, generally do not make pricing publicly available. If the public has no idea what an item should cost, based on MSRP pricing, their dealers may mark up hardware and software to whatever level they choose. One way end users across all segments can get a better idea of pricing is to utilize publicly available pricing from purchasing agreements, such as the US government's General Services Administration (more commonly referred to as the GSA).

*** ******** ************* ** ******* ** ******** ******* ** ***** to **** **** ** *** ***. **** ********* ***** ******* to **** ******* ** "**% *** ** ****", ***** ***** their ***** ******, *** ****** ******* *** ****** ** ****** their ****** **** *** ******, ** ** ***** ***********. **** does *** ****, *******, **** ******** ******* ****** ***** *** same ******* ** ********* ******. **** *** *** **** ****** on ****** *********, **** ***, ** ** **** ***********.

* ****** ** ****** ********* ************** **** *** ***** ************ *** *** ***** **, *** example:

  • ********* ************ ********: ****'* ********* ****** *** ~$*,****** ****'* ******** ** *** ********* ******** ********, ********* *******, ******** *** ***.
  • **** ********************************* **** ** *****. *** ***** ********* *** ***** *** price *** ** **** ******** **, **** **** ** ********** interesting. *** *******, * ****** ****** **** ********** ***** ~$*,****** * ****** ******** **** ******* *****~$*,***.******** *********** ****** ********, ** *** ***** ****, ****** **** ***** $*,*** ** nearly $**,***, *** ********* *** ************.
  • * ****** *** ****** ******* *** ******** ********** ******* ***** shows *** *********** ** **** ** *** **** *** *** for *** **** ******* **** ********* *******. ********* *** "***-*****" ******** ******* **** *** ********* ******* ******** *** **** license, **** ****** ******* **** $*,*** ** $*,***. **** ** a **% **********, ***** ***** ****** ** ************ ******* ***** GSA. ** ***** ***** ****** ****** *** *********, *******, ********* these *** ** ****** * ****** ****** *** **** ******** costs.
  • ******** ***** ************ ************* *** ** ***** *** *** ** well. ********* **** ********,****,*****,*****, ***** *** ***** *******, *** ** ***** *** *********.

****** ****** ****** ** ***** *** ******* ** ****'** *** eligible *** ********** **** *** *** ********. ******* ** *** GSA ******** ** ********* **** ***** (** *** ***** ** 20-40%) ** ****. ****** *** ******* ********* ** *** ******* will **** ** *********** *******. ************, ******* ** *** *********** kept **-**-****. **** ******* *** ** ****** ** ********, *** new ******** *** *** ** ******. *** ****** **********, *** may ** * ******** **** **** ********* **** *********, *** should *** ** **** ** * **** ****** ** ******* information.

[**** **** **** *** ********** ****** ** **** *, **** but *** ******* *** ******* ** ******** ****.]

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Classic

Vulnerability Directory For Access Control Cards on Aug 14, 2017
Knowing which access credentials are insecure can be unclear, especially because most look and feel the same. Even the most insecure 125 kHz types...
Hack Your Access Control With This $30 HID 125kHz Card Copier on May 01, 2017
You might have heard the stories or seen the YouTube videos of random people hacking electronic access control systems. The tools that claim to do...
Dahua Backdoor Uncovered on Mar 06, 2017
A major cyber security vulnerability across many Dahua products has been discovered by an independent researcher, reported on IPVM, verified by...
20 Manufacturer Favorability Ranked on Feb 28, 2017
20 security industry organizations' favorability was ranked based on direct feedback from over 100 integrators. In-depth comments revealed insights...
'Dirty': Hikvision Attacks Genetec on Feb 20, 2017
Hikvision is angry at the growing public awareness that Hikvision is owned by the Chinese government. They took aim at Genetec,...
Hikvision Removed From US Embassy on Nov 22, 2016
Hikvision cameras have been removed from the US Embassy Afghanistan and a procurement for more Hikvision cameras has been cancelled, after IPVM's...
Genetec Expels Hikvision on Nov 08, 2016
Genetec has removed support for Hikvision devices, deeming them 'untrustworthy', citing customer concerns about Chinese government ownership /...
Axis Releases Access Credentials - Insecure But Convenient on Nov 02, 2016
Axis continues to build out their own end-to-end 'solution'. The company recently announced a series of credential cards, but instead of a...
Hikvision CEO Admits Hikvision China State-Owned Company on Oct 06, 2016
Hikvision's CEO admitted that Hikvision is a China state-owned company, during a 2015 visit to Hikvision from Xi Jinping, the General Secretary of...
How To Become an 'Expert' In An Hour on Sep 02, 2016
If you want to be perceived as an expert in your market, speak at every event possible... the math is simple: when someone stands in front of an...

Most Recent Industry Reports

Avigilon Touting 'Made In America' on Sep 18, 2017
Canadian manufacturer Avigilon, who completed a US manufacturing facility in 2015, is now running a marketing campaign touting 'Made In America',...
Cloud Guy Prints Book, Misses Irony on Sep 15, 2017
On-premise security systems are dead. But $75 print books are alive and well. Such are the lessons from Brivo's CEO new book "The Five...
Forgotten Password Problem Importance on Sep 15, 2017
Forgotten passwords has become a major industry topic. For example, Hikvision has been emailing admin passwords in plain text until IPVM's...
September IP Networking Course on Sep 14, 2017
LAST Chance - Registration is ending. Register now. This is the only networking course designed specifically for video surveillance professionals...
Hikvision Launching Ezviz Pro on Sep 14, 2017
Hikvision is launching Ezviz Pro. In 2015, Hikvision expanded Ezviz, a direct to consumer offering, to North America. Now, Ezviz 'Pro' is...
Genetec Launches Community Connect Examined on Sep 14, 2017
Genetec has done best in large-scale, enterprise systems and relatively worse in smaller systems such as SMB. Now, Genetec is launching...
Master Keying Tutorial on Sep 14, 2017
Mechanical keys are the most fundamental, albeit unsophisticated, form of access control. Like access control, Master Keying allows large scale use...
Startup Turing Video Segway-Based Security Robot Profile on Sep 13, 2017
If security robots can not replace guards, perhaps the next best thing is a robot the guard can actually ride.  Turing Video has raised $5...
Fail Safe vs. Fail Secure Tutorial on Sep 13, 2017
Few terms carry greater importance in access control than 'fail safe' and 'fail secure'. Access control professionals must know how these concepts...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact