Mobile VMS App Usage Statistics Report

By: Brian Karas, Published on Jun 01, 2016

Overall usage of mobile apps has risen significantly from our 2012 report, with the majority of heavy users falling into particular categories.

115 Integrators provided data for this report, which is the most detailed breakdown of mobile app usage in the security industry.

We analyze current app usage statistics and look at the customers that are driving the biggest surge in mobile app usage.

******* ***** ** ****** **** has ***** ************* **** our **** ******, **** the ******** ** ***** users ******* **** ********** categories.

*** *********** ******** **** *** this ******, ***** ** the **** ******** ********* of ****** *** ***** in *** ******** ********.

** ******* ******* *** ***** statistics *** **** ** the ********* **** *** driving *** ******* ***** in ****** *** *****.

[***************]

*******

  • **** ********* ******* ****** apps, *** ** *** actually *** ****
  • ****** **** *** **** popular *** ******* *********
  • *********** ****** ** **** is * ***** ******
  • ***** ************* **** ** have ** ************ **** limit *** *****
  • ********* ********* ****** ************, but *** **** **** mobile

Response ********

*** ****** ***** * single ******** ** ***********: "What ********** ** **** customers *** ****** **** (iPhone, *******, ***.) ** monitor ***** *** ******? Why? **** ****** ****?"

********* **** **** ****** app *** ***** ** be "*** ** *******", with *** ******** ** responses ******* ** *** extreme **** ** *** scale: 

** *** **** ****** *** ***** Statistics ******, **** **% ** responses ********* **** ****** apps **** **** **** than **% ** *** time.  ***, **** ****** has ***** ** **% of *********.


Convenience ** * ***** ******

***********/**** ** ****** *** often ***** ** * reason *** ********* ***** mobile ****.  

  • "***** ** ***% **'* convenient, ***** ***** ** always **** ****. **** customers **** ** **** the ***** *** **** intimidating **** ********* ***** cameras ******* *** ********."
  • "**% ** *** ********* use **** *** *** only **** *** **** for ****** ******* *** alarms ** **'* *****, convenient *** **** ** use ************ **** *** two ** **** ******* are **********. ******* ** going ** **** ******** or ********* ********'* ***** is ******** **** **** and *******; ****** *** are ********* ****** ** our ********* ."
  • "**** **%. ****** ** convenience *** * ***** of *******."
  • "**% * ******* ** is *********** **% ** the **** *** *** rest ** ** **** a ***."
  • "** **** ***** *** customers **** **** ***** it *** ************ *** it ** ******* ***** businesses *** ** **** when **** **** ******* they ****** *** ** use ** *** ****** us ** **** ** them *** *** ** for ****. ***? *********** and ***** ** **** overall. **** ****** ****? Fear ********* *** ********; ensuring *********** *** ***** what **** **** ** do ** *** ***** they *** **********; ******** for ******* ******* ** they *** **** ******* to **** **** ********/*****/*****. It **** **** ** convenience ** *** **** to ***** *** ****** of *** ******** ** opening *** *** *** viewing *** ******* ***** sitting ** *** ***** or ** ***** ** the **."
  • "**% ** ****** ******, or ****** ******** *******. Convenience *** **** *************"
  • "**** **% ** *** clients ******* ****** ******* via ****. **** ** usually * **** ******, convenient *** ** ***** on ***** ***** ***** away."
  • "***% ***********, ****** **** them."
  • "***** **% ** **** not **** *** * think *** ***********."

Smaller ********* *** ****** *****

********* ********** ***** ***** of ****** **** ****** always ********** ** ******* users ** ******* *******:

  • "*** ******* ******* **** mobile ****. *** *********** small ********** **** ****. Most *** ** *** the ***** *** ***** regularly. **** **** ***** off. **** **'* ** a ******** ****** ***** away *****, ***** ** what **** *** ****** good ***."
  • "**% **'* **** ****** for ********* ** ******* their ****** ** ****** phone. **** ** *** systems *** ** ***** business ** ******* ******."
  • "**% *******. **** ** business ******, **** ******, administrators **** ** ** checking ** ** ***** place ** *** **** is ***** **."
  • "***% ** ** *** market. *% ** ** govt ******."
  • "********* ****** **%. **** are *** **** ** small ********** ***** *** level ********** *** ** want ** ******* **** goes ** ***** *****, and **** *** *** big ****** ** **** around *** ***** ********** on *******."
  • "**% *** *** ****** APP **** ** *** customers *** *** *** to **** **** *** home ** ******** ***** away."
  • "***% *********** ****** *** managers ******** ***** **** or **********."
  • "**% - * *** of **********/******** ***** ** not *** **. ******* small ******** ** *********** wants *** *** ****** but ***** ************* ** not."
  • "*** *** ** **** primarily ** *** ******* customers **** *** ****** to ** **** **** less. ** ***** **** the ******* ** ** in *** ****** ** one ****, **. ******* the ******** *** ********** it."

Interest **** *** ********* ** *****

*******, ********* ******* ** require ****** **** *** more **** **** ******** use ****.  ******* ********* indicate ****:

  • "**** ******* *** *** is ********* *** **** don't ***. * ***** say **** **-** ******* actually *** ****."
  • "***** *****. ** ***** to ** * ******* for ********** ** ***** but ****** *****."
  • "******** ***** *** ****** ask *** **. *'* guess **** ** ***** actually *** ** ** an ******* *****, ***** the "***-****" ****** *** worn ***, *** * third ** **** ****** actually *** ** ***********."
  • "********* *** ** *** customers ******* **** ***, either **** * ************* standpoint ** **** *** for ** ** * key ******** *******. ****** priced *** ********* **** multiple *****, * **** know ** *** ** two **** *** ******** using **."
  • "***** **% *** ***** mobile *** ** ****** VMS. ***** **% *** for ****** *** ******* when ********** * *** system."
  • "*** ** ** ********* want **, *** **** do *** *** ** using ** ***** *** novelty ***** ***."

Corporate ********* ******** ** ** ********/************* ********

****** ************ *** ***** ********* **** using ****** **** *** to ** ******** ********:

  • "* ***** ******** **% of *** ********* *** the ***. *** ******** of *** ******* *** larger ************ **** ****** type ************. *** *** security ** *** *******, in ***** *****, *** app ** *** **** a *************."
  • "***** *%. ******** ******** want **, *** ** will *** **** *** network *** ****** ******* to ****** *** ***** system."
  • "**** * *** ****** clients **** ****** ****. The **** **** ** often **** ******* **** network ******** ********."
  • "***** * ** ******* there ** * ****** for ****, **** ** environments ** *** ********** level **** ***** *** adapted ** ******** ************ and ************ *** ******** security."
  • "*% ******, ********, *******, gov, ***** ****, ***... IT ****** **** *** allow **, ** ***** it ********* ** *********."
  • "Network ************ ********* ******* its ***"
  • "**** * *** ****** clients **** ****** ****. The **** **** ** often **** ******* **** network ******** ********."
  • "* **** **** **** in ****** ********* ************ there *** **** ****** to ** ******* ************/******** that **** *** ** mobile **** ********* ** impossible. **** ********* ** depts. **** ******** *********** of **** **** ******* owned ******."

******** ********* ****** ******* Clients, *** **** *** Mobile ******* 

*********** ********* **** ********* who *** ********* ********* at * ******** ****/****** to ***** ******* *** less ****** *** ***** overall.

  • "*-*% ****** ***** ****** to ******* *** ******* on ***. ****** **** are ******* **** ** *********** ***** who **** *** ********** *** ********."
  • "* ***** *** **** than *%. ** ********** in **** *** ******** centres. **-*** ****** ************* where ******* *** ************ monitored."
  • "*** ** **** **** on ***** *******, **** commonly *** ** ******/******** than ********* ** ***** end ***** ***** ******** use ******* **********."
  • "*** ****** ********* **** someone ********* ** ********** the ******* *** **** he/she ** **** ** the *** ** *** day **'* *** ******* at **** *** ****** on * ****** ******. The ******* ******* ***** have *** ***** *** managers **** ** *** everything ** *** ***** on ***** ******."

********* **** ********* ***** who **** ********** ****** used **** ** * way *** *** ****** to ******* ******* ***** on *******.

  • "**** *** ****** ***** enterprise ********* **** ****** security ***** ****** ******** facilities."
  • "****** ********* **** ****** guards **** **** ****** apps."
  • "* ***** *** **% of *** ********* ****** devices ** ****** *** the *** *** ****** control *********. ****** ** not ****** ********* ** always **** ***** ** front ** *** ****** computers ** *** ****** needs ** ** **** to *** *** ****** from ******** ** ******."
  • "******** **%. **** ****** aren't ******* ** * desk *** ********* *** their ***** *****."

Comments (2)

IPVM should do some VMS mobile app tests. I don't think I have seen any reviews yet for the mobile experience.

I'll second that. Some of them are horrendous. Some are pretty good. Some surprisingly so.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Casino Surveillance Pro Interview: James Lathrop on Feb 15, 2019
James Lathrop [link no longer available] has been working in casinos for almost 25 years. During that time, he says he has held "just about every...
Verified Response Discontinued in Silicon Valley San Jose on Feb 28, 2019
Almost all security alarms are false. This has driven some municipalities to require verified response before dispatching police. However, now San...
Casino Security Consultant Carl Lindgren Interview on Mar 26, 2019
For more than 20 years, Carl Lindgren [link no longer available] worked as a casino surveillance pro, while being active (and sometimes outspoken)...
Eagle Eye Favorability Results 2019 on Mar 21, 2019
Eagle Eye has been the biggest spender in the cloud VMS market including (via their owner) acquiring Brivo for $50 million and CameraManager from...
UK Installer CCTV Aware - Flat Pricing, No Salespeople on Apr 10, 2019
This is a different kind of company. They do flat pricing, they do not have any salespeople and 50% of their sales are sold and booked...
Alarm.com Favorability Results 2019 on Apr 15, 2019
The once dot com startup has evolved to become a core provider for home security and is now expanding into commercial. In their first entry in...
Amazon Marketing Pro Installs of Amazon Security Systems on Apr 25, 2019
Is Amazon a threat to conventional providers like ADT, Vivint and Brinks Home Security? Many say no. Now, Amazon is advertising free in-home...
Manufacturer Favorability Guide 2019 on Jun 12, 2019
The 259 page PDF guide may be downloaded inside by all IPVM members. It includes our manufacturer favorability rankings and individual...
Kidnapping Victim Rescued With Video From Ring Doorbell Camera on May 24, 2019
A kidnapping victim was rescued within 24 hours, with the police crediting video from a Ring Doorbell camera as key to solving the case. A girl was...
TMA Apologizes to Amazon / Ring on Aug 23, 2019
Not only is Amazon / Ring making major incursions into the residential security market, the organization representing the biggest incumbents, The...

Most Recent Industry Reports

Latest London Police Facial Recognition Suffers Serious Issues on Feb 24, 2020
On February 20, IPVM visited another live face rec deployment by London police, but this time the system was thwarted by technical problems and...
Masks Cause Major Facial Recognition Problems on Feb 24, 2020
Coronavirus is spurring an increase in the use of medical masks, which new IPVM test results show cause major problems for facial recognition...
Every VMS Will Become a VSaaS on Feb 21, 2020
VMS is ending. Soon every VMS will be a VSaaS. Competitive dynamics will be redrawn. What does this mean? VMS Historically...
Video Surveillance 101 Course - Last Chance on Feb 20, 2020
This is the last chance to join IPVM's first Video Surveillance 101 course, designed to help those new to the industry to quickly understand the...
Vulnerability Directory For Access Credentials on Feb 20, 2020
Knowing which access credentials are insecure can be difficult to see, especially because most look and feel the same. Even insecure 125 kHz...
AI/Smart Camera Tutorial on Feb 20, 2020
Cameras with video analytics, sometimes called 'Smart' camera or 'AI' cameras, etc. are one of the most promising growth areas of video...
China Manufacturer Suffers Coronavirus Scare on Feb 20, 2020
Uniview suffered a significant health scare last week after one of its employees reported a fever and initially tested positive for coronavirus....
Cheap Camera Problems at Night on Feb 19, 2020
Cheap cameras generally have problems at night, despite the common perception that integrated IR makes cameras mostly the same, according to new...
Milestone Launches Multiple Cloud Solutions on Feb 18, 2020
Milestone is going to the cloud, becoming one of the last prominent VMSes to do so. Milestone is clearly late but how competitive do these new...
Video Surveillance Architecture 101 on Feb 18, 2020
Video surveillance can be designed and deployed in a number of ways. This 101 examines the most common options and architectures used in...