Remote Network Access for Video Surveillance Guide

Author: IPVM Team, Published on Feb 21, 2018

Remotely accessing surveillance systems is key in 2018, with more and more users relying on mobile apps as their main way of operating the system. However, remote access brings unique challenges, with system security, ease of access, and configuration difficulty all needing to be weighed against each other.

Five Remote Access Options for Video Surveillance

float: right

In this report, we explain how the five most common remote access options for video surveillance work:

  • Port forwarding
  • Universal Plug and Play (UPnP)
  • Dynamic DNS
  • Cloud / 'Phone Home' (e.g., Hikvision EZVIZ, Axis AVHS, Nest Cam)
  • Virtual Private Networks (VPNs)

(Related: Network Addressing for Video Surveillance Guide and Converged vs. Dedicated Networks For Surveillance).

2018: Cyber Security Is Critical

Before putting any surveillance system on the internet, it is critical that users understand the risks involved. Several major vulnerabilities were reported in major manufacturers' cameras, including:

  • GeoVision's Unprecedented Vulnerabilities: 15 critical security vulnerabilities. This includes root access as well as printing / displaying all credentials in clear text.
  • Hikvision Backdoor Exploit: Hikvision included a magic string that allowed instant access to any camera, regardless of what the admin password was, with the actor only needing to copy and paste.
  • Vivotek Remote Stack Overflow Vulnerability:Very easy to exploit; no special accounts, passwords, or device-specific strings/hashes are required to execute an exploit against an affected camera. Simply sending a long URL with the malicious content.
  • Hikvision Cloud Security Vulnerability: A critical vulnerability in Hikvision's global cloud servers allowed an attacker to remotely take over the server and get access to sensitive customer data.
  • Axis Critical Security Vulnerability: Attackers can gain access to root access however, they need to be highly skilled in Linux and hacking techniques. One needs to probe equipment to see which platform it is, then customize a script for each camera on a one by one basis. This is extremely more difficult to exploit than many camera vulnerabilities.
  • Hacked Dahua Cameras Drive Massive Cyber Attack: As part of the Mirai botnet, hacked Dahua cameras (and others) took down major internet sites and even an entire country.
  • Sony IP Camera Backdoor Uncovered: Attackers can remotely enable telnet on cameras, combined with a hardcoded backdoor account which allows users to take over the device.

See our Directory of Video Surveillance Cybersecurity Vulnerabilities and Exploits for more information on these and other issues, including new ones as they occur.

Because of the severity of these incidents and their increasing frequency, it is critical that users understand the basics of cybersecurity for surveillance systems, and how to protect against simple attacks at the very least.

We strongly recommend reviewing Network Security for IP Video Surveillance before proceeding.

******** ********* ************ ******* ** *** ** ****, ******** *** **** ***** ******* ** ****** ****** ***** **** *** ** ********* *** ******. *******, ****** access ****** ****** **********, **** ****** ********, **** ** ******, and ************* ********** *** ******* ** ** ******* ******* **** other.

Five ****** ****** ******* *** ***** ************

float: right

** **** ******, ** ******* *** *** **** **** ****** remote ****** ******* *** ***** ************ ****:

  • **** **********
  • ********* **** *** **** (****)
  • ******* ***
  • ***** / '***** ****' (*.*., ********* *****, **** ****, **** Cam)
  • ******* ******* ******** (****)

(*******:******* ********** *** ***** ************ ***************** **. ********* ******** *** ************).

2018: ***** ******** ** ********

****** ******* *** ************ ****** ** *** ********, ** ************** *************** *** ***** ********. ******* ***** *************** **** ******** ** ***** *************' *******, including:

  • *********'* ************* ***************: ** ******** ******** ***************. **** ******** **** ****** ** well ** ******** / ********** *** *********** ** ***** ****.
  • ********* ******** *******: ********* ******** * ***** ****** **** ******* ******* ****** to *** ******, ********** ** **** *** ***** ******** ***, with *** ***** **** ******* ** **** *** *****.
  • ******* ****** ***** ******** *************:**** **** ** *******; ** ******* ********, *********, ** ******-******** strings/hashes *** ******** ** ******* ** ******* ******* ** ******** camera. ****** ******* * **** *** **** *** ********* *******.
  • ********* ***** ******** *************: * ******** ************* ** *********'* ****** ***** ******* ******* an ******** ** ******** **** **** *** ****** *** *** access ** ********* ******** ****.
  • **** ******** ******** *************: ********* *** **** ****** ** **** ****** *******, **** need ** ** ****** ******* ** ***** *** ******* **********. One ***** ** ***** ********* ** *** ***** ******** ** is, **** ********* * ****** *** **** ****** ** * one ** *** *****. **** ** ********* **** ********* ** exploit **** **** ****** ***************.
  • ****** ***** ******* ***** ******* ***** ******: ** **** ** *** ***** ******, ****** ***** ******* (and ******) **** **** ***** ******** ***** *** ****** ****** *******.
  • **** ** ****** ******** *********: ********* *** ******** ****** ****** ** *******, ******** **** a ********* ******** ******* ***** ****** ***** ** **** **** the ******.

*** ************ ** ***** ************ ************* *************** *** *********** **** *********** ** ***** *** ***** ******, ********* *** ones ** **** *****.

******* ** *** ******** ** ***** ********* *** ***** ********** frequency, ** ** ******** **** ***** ********** *** ****** ** cybersecurity *** ************ *******, *** *** ** ******* ******* ****** attacks ** *** **** *****.

** ******** ********* **************** ******** *** ** ***** ****************** **********.

[***************]

Remote ****** **** ****** **** ****

********* **** ~*** *************** **** **** */**** ** ******** ************ ******* **** **** form ** ****** ******:

*********** ********* *** **** *** **** / **** ********** **** a ******* ******** ***** ***, ** ********** ***** ****** *****:

Port **********

**** ********** **** *** ******* ** ******* ** *** ******** or ** ****** ** *** ****** ** ******* ** * user's ****** ** **** ** *** ** ******** **********. ***** so ******** ****** ************* ******* *********** ****** **** **** ********** novices **** ******** ** ** ** *********.

** ****** * ****** ** ********, ***** ** (****) *** 554 (**** ***** *********) *** **** ***** **** *** **** often ******. **** ******* ******* ********** ***** ** ** ****** for *************, *******, ** **************, ** ****. *** *******, **** image ***** *** *** ***** ********* ** * ***** *** in * ******** ******:

**** **** ** ******** ******* *** ** ** ****** *** the ********, ********* ******** ***** **** ** ****** ** ***** internal *****, ** ********** *** **** **** ** *** ******* results ** ******.

*** *******, ** *** **** *** ** ** ****** ******** using ** ******* ***.**.***.**, *** **** *** **** **, ******** may **** **** ****:

  • ****: ***.**.***.**:**** ---> ***.***.*.*:**
  • ****: ***.**.***.**:**** ---> ***.***.*.*:**

Universal **** *** ****

********* **** *** **** (****)** * *** ** ********* ***** ******** ****** ********* *** configuration ** * ***** *******. *** ** *** **** ** UPnP ** *********** ****** **** ********** (*****), ******** * **** device ** ************* ****** **** ******** ** * ****** ******* any ************ **** *** ****.

*** *******, *** ***** ***** ***** **** **** ********** ************* triggered ** ***** ******** ********* ** ******* (******** ***** *** camera):

*******, ** ********, **** ** ********** ** **** *****. ** many ******** ********, ***** *** *****, **** ********* *** ****** off, ********* ****** **** **********. ** ******** ***, **** ******** may *** ******** ********, *** ** ***** **** **** ****, may ******** **** ***** *******, ** *** ****** *** ** added ** ***. ****** ****** *****, ***** *********** ** ****** available **** **** **** ******* *****, ******* *** **** ******* any ***** ** ***************. ******* ** ***** *******, ****** **** forwarding *** ****** **** ****** ** ********** ************.

Dynamic ***

*********, **** ** *** ******* ****** ** ********* ** *********** and ***** ******** ******** (******* ** ********** ******), ** **** time, *** ****** ** ******* ******** ** **** *** ******. For *******, *** ****** ** ******* ** **** ***** *** be **.**.**.*** ***** *** ******** ** ***** ** **.**.**.***. ** your ****** ***** ****** ** ********** ** ******* ** **.**.**.***, tomorrow ** ***** ****.

******* *** ******** ******* **** ** ******* ** * ******* hostname, *.*. *****-****.******.*** ******* ** **.***.*.*. *** **** ******* ******* the ** ******* ************* ** **** ******** ************, ** ************* detects ******* *** ******* *********** ** **** *****.

** ************, **** ** **** ******** **** **** ****/****. **** manufacturers **** ***** *** ******* **** ******** **** ** ***** who ******** ***** ********* (****** ********* ** ****** ****), *** ****, ** *** ****, ****** **** ******* * built-in **** ******, **** ** **** *** ******'* ** ******* up ** ****.

**** ** ****** **** ** ******* ********** ******* ** * VMS, ***** *** ****** ******* ** ****** *** ** ******* upon * ****** **** ****** ** ***********, ********* ** **** video *** ********* * **** ***** ** ******.

Public ********** ******* **** - ****, ****, *** **** **********

***** ****, **** ***/** **** ********** ******* ***'* ******* ** the ****** ****** ********, ******* **** ****** *** ******* ** connect *** ****** ***'* ****** ******* (*.*., ****** ** ********). Hackers *** ****** ******** ** ******** ** ******* * *** across *** ****** ********, ****** ****** ** ******** ****** ** addresses ** ** ******* ***** ** *********** ********** ******* (*.*.,****** **** ** ********* ****** ********** - ********* **** ********* devices). *** ***** ********** **** **** ****, ****** ********'* *** ************* ** ***** ******: ** ***** * fake *** *******, *** ** *** *********** ** ** ****. **** ******** ******* ** ***** ************, ********** ***** ********** ************ ** ****** ********** ****** ** ***** ******* ***** ****** **** ********* ****** *******. ** ** *** ********* ****** **** ******* ******** **********.

**** *** *** ********** ******* ********************** **** **** ** ***** *************** *** ** *******. ** **** **** * ******** ********** ** ************* ********** ******** ******** ** **** (*** ****** **********) *******.

Cloud / '***** ****'

** ********* *** ********** *** ********* *** ****** ******** ** manual **** **********, ****, *** ******* ***, ***** *********** **** become **** *********. ***** *********** *** * **** ** *** (sometimes ****** ***********-******** ****) ***** ******** ******* ** ** **** interaction ** *********.

******* ************* ***** ***** *** ***** *********, **** ****** *********,********* (***** / ***-*******), ***** *******, **** *****, *** ****. ********/******** ** ****** cameras *** ********/**** ********** ******* ********* **** *** **** **** of ************, **** ****** ***,******* ********,******, *******.

***** *********** *** ********* **** *** * ********* (********* ***** ********, ** ********** ********)******, *** ** *** ***** ***** ***** (***** ** *** image *****):

  1. ********** ****** ***** * ***** ******* ** ******* * **********.
  2. ****** ***** ***** ***** **** ********* ***********.
  3. * ********* ** ********* *** * ****** ****** ** *** up.
  4. **** *** *** ****** ** ** *****, **** **** ******* it ** *********, **** ******** *** **** ********* ******** (***** only ** "*********** ****" ** *** ******* *****).

***** ** * ********* ***** *** ** **** ****** **** AVHS *******:

****** ***** **** ** "*********** ****" *****, **** *** ****** is *** **, ******* ********* **** ** ****(*), ****,***, ***,***., *** **** *** ****** ******* *** *********.

***** / '***** ****' *********** *** *** ******* *** **** reliable ******* ** ******* ****** ****** ** **** *** ***** business. *******, *** ********* ** ******** *****, ** ************** *** be ********* ***** ******** ***** ******* ** '*** ******' ***** firewalls.

Push ** **** ** *****

***** **** *** **** ********** **** **** ******* *** *****, there *** **** * **** ** **** ** ***** ******** in *** **** ****, ** ***** ** **** *** ** the ******** ********** *** ***** *******.

*** **** ******* ** **** ** *********'**************** ** ***** **** ****** *******, ******* ***** ** **** ** ********-******* ***** ********** * *****-*****, ********* ****, ****. *************, **** ****** *** made **** ****** *******, ************* *************, *** ********** **** *******, leading ** **** ********* ***** **** ******** ***** ** ************ or *** *** ******** ***** ****. *** *** *************** ************ '*********' ********* **** ***********.

**** **** **** ***** ***** ************* **** ****** ** ***** *** ***** **** ** *********** via ****** ******, ******** ** ***** **** *** ******* ** users ** *** ************/********* ********* *** *******, ** **** ** those ********* ******* ********. **** ***** ****, *** *******, ** Hikvision's ***** *******, ***** *******, ** **** *** ********, *** users ** *** ******* *** ****** ** ** ********, ******* of **** ******* ******* ******** ********** **** ******** *****.

Dedicated ******* ******* ********

*** **** ****** ****** ************ *** ****** ************* ** ******* remote ******* *** ***** ** * ********* ***, ********* ***** hardware ********** (**** ** ********* ** ***** *********) ******* ** each ****. **** ********* ******* * ****** ******* *** ******** to *** ****** ********, *********** ******** * ****** ***** *******, despite ***** ** ********* *********.

** ************, ********* **** *** ********* **** **** **** ** larger *****-**** *************. *** ********** **** ************ **** $***-*** *** site, ****** ****** *** ********, ******** ******* ******** ** $*** ** ****.

Recommended - ****

** ********* ****** ******** ****** **** ***** ************ *******. ***** **** ********** (or ****, ****, ***.) *** ** ******* *** ******* ** front, **** ****** **** ******* ** ***** ******** *** ****** as *** *************** *** *****. ***** ***** ******** *** ***** improved, *** *** *** **** ** **** ***** ********* ***/** the ***** ******* ******** ********* ** ******* **** ******.

Test **** *********

**** ***** ******** *******.

[****: **** ******* *** ********** ********* ** ****, ******* ** 2017 *** **** ***** ** ****.]

Comments (27)

Excellent background information. In my customer base, many are reluctant to make ports open in their firewall. 'Phone home' is a good solution, since all communications are http.

You might have noticed that the major remote access software providers have mostly eliminated free service and are charging handsomely for their products. Most charge by the number of computers accessed. A LogMeIn 100 computer remote access license will cost $1200 next year!

I think TeamViewer has a better pricing model for video surveillance applications. They charge $749 for 1 technician, unlimited computers. Multi-seat licenses are $1499/2839 (single session, multi-session). These do not expire, but you have to purchase updates to stay on current software.

Gone are the good old days when remote access was free. I'm interested in what other members are using and how much they pay for it. Does any one use Bomgar? GoToMyPC? RealVNC?

Roger, good feedback, thanks!

There's an excellent discussion about what different integrators are using here: Free LogMeIn Service Killed - What Else To Use?

I've made use of various VNC products (the video refresh rate of RDP is cumbersome). Aside from products like LogMeIn or Teamviewer, VNC is time consuming to deploy. I have made use of TightVNC and UltraVNC. I have not used RealVNC. VNC isn't so bad when you have a VPN to your customer sites though.

GotoMyPC is just like LogMeIn. I have not used it since discovering LogMeIn Free as GotoMyPC was much too expensive. It's $11.95/month per machine. It does have some nice features though.

Hi Roger, I use Remotix which costs about $40 and is available for Mac, Windows, iOS and Android. It has free agents which you can install on the Macs and PCs that you want to control. The initial purchase lasts forever but after a year, any future updates are obtained through an annual fee.

It is very intuitive software and uses a cloud service to help connect to the remote agents. Given the low pricing and intuitive method of connecting, I find it to be excellent.

I've used TeamViewer, LogMeIn and RealVNC. The "problem" with VNC is that you need to open specific port to the computer you want to access. That is the good thing about cloud based services like TeamViewer and LogMeIn, you don't need to open any ports, it just works.

That's also the bad thing. It transfers your sessions over ethereal ports just like any other browser traffic which, by nature, makes it less secure.

Someone will probably beat me to it, but I'll see if I can dig up the VNC solution I used way back when I was doing IT work on the side.

I setup a VNC session listener on my network, and was able to have users connect to me to share their desktop via a simple exe. Since their machine initiated the connection, no port forwarding was required on the customer end. Only on my end.

That does require someone to be present at the remote session, but there may be an open source solution out there to address the need for unattended remote access without port forwarding.

Depending on your business size, it's probably cheaper to just go with an established (and trusted) solution though.

TeamViewer has had its share of security vulnerabilities. I use TeamViewer for user-generated support connections, but I do not maintain any remote connections to client sites. It's just bad security practice. Each site should have their own dedicated VPN so that one compromised machine or software doesn't compromise everyone else.

Regarding the Cloud / 'Phone Home' section:

The narrative written above esclusively describes TLS, essentially the encryption piece, which has little to do with the Cloud/Phone Home's ease of use as a remote connection method. The socket connection must alrready be established before any TLS handshake can begin, and TLS can "ride on" any TCP socket once it's established, "cloud" or otherwise.

The Cloud / 'Phone Home' option's ease of use as a remote conneciton method is not because of TLS, but because firewalls seldom restrict outbound connection requests, and the server to which the device is connecting usually has a name or address that will not change.

This is true. And even when non-standard ports are blocked outbound, HTTP or better yet HTTPS can be used, which are rarely blocked. Essentially, it is very easy for the device behind the firewall to initiate the outbound connection to a HTTP/HTTPS server with a preconfigured domain name. This method is going to be an increasingly common tool in many manufacturer's products.

And now we also have peer-to-peer, for Dahua, Hik and Axis.

I will always use only strong passwords

Just wonder will there be any Cyber attacks on our information being stored in the cloud.

It's much more rare that hackers are after your actual data. They usually only want data if they can leverage it otherwise. Video data probably isn't really that valuable, unless it can be used for blackmail.

I think exploitable devices are far more interesting targets.

I wouldn't say that necessarily. An extremely large number of surveillance devices are being hacked and the number is growing every day. From script kiddies with idle hands, to corporate espionage, and even foreign agencies gaining intelligence, this is a huge problem. And with more and more homes getting off-the-shelve surveillance options from their cell phone providers and big box stores, you can expect this problem to continue to grow.

While talking about cyber security issues and remote access, I stumbled over this blog today with Unauthorized FLIR (Lorex) Cloud Access, pretty interesting reading.

VPN solutions don't have to be expensive. I've used OpenVPN for many years. On everything from a VM on server hardware, an old decommissioned desktop PC, and lately on a <$99 ubiquiti edgerouter. The edgerouter currently handles about a dozen remote users connecting via windows laptops using OpenVPN, as well as a ipsec site to site VPN. No licensing costs or anything.

You might also want to look into SoftEther VPN software. Free software. Even does SSTP VPN which is nice if you want to support connection from windows users without additional software since it is built in.

If you port forward in any capacity expect to be compromised. And certainly limit to https only, with certs, if possible.

I don't think it's fair to say that if you port forward you can expect to be compromised. As with anything, it depends how well you deploy your solution. With proper firewalling, there is nothing wrong with port forwarding.

That's not to say that I disagree about VPNs though.

With proper firewalling, there is nothing wrong with port forwarding.

Rob, how are you 'firewalling' the ports you are 'forwarding'? By definition, the ports that are forwarded are not firewalled and exposed to public attacks. Agree/disagree?

Port forwards don't have to be open to the world. They can be restricted to IP addresses, etc so that they cannot be accessed by attackers.

While one can set restrictions by requesting IP address, this only works in practice if you know the specific limited range or number of IP addresses that will be accessing the system. However, given dynamic IP addressing and the various different networks one might be connecting over (different mobile systems, locations, etc.), it is hard to do that.

Let's say you/we do that. We set it up with a limited number of IP addresses that can access the system. Now, any time the user accesses from a different network or IP, this results in the user being blocked, frustrated and making a service call to the provider.

While I think it would be great if such restrictions could be practically managed, I think that is the exception rather than the rule.

True. Security and convenience are polar opposites. Every increase in security results in a decrease in convenience. We have to find the right balance for each.

I personally have rarely deployed a system that was open to the world. Most people will only access from one or two connections or from one or two devices. Using a combination of IP/MAC filtering is usually not bad to manage and honestly, port forwarding is usually a last resort anyway. (I favor VPNs or proxies whenever possible.)

I would argue that anyone who is port forwarding a security system to the world is just doing it wrong. What I mean is it's the wrong solution. Nothing should ever be publicly accessible that isn't intended for public consumption, and even then nothing that isn't DMZed on the local side.

Anything that must be accessible from lots of people on many different connections should be deployed via VPN or through a cloud proxy with more granular user control. In which case the forwarded port is restricted to the IP address of the proxy.

In my opinion, the rule of thumb is simple. If you can't restrict access to a single IP or manageable device list, then don't port forward at all. I think we all agree that you can't trust your security to the device's firmware.

Certainly port forwarding has it's place, but in the context laid out here (access from users with unknown ip addresses, resulting in wide open access, to data that is critical, and software that is poorly developed) I feel you are tempting fate and there is a greater likelihood you'll be hacked than not.

Just open a port and monitor how many drive by attacks you get. Try SIP port 5060 for instance. Obviously if you can limit to certain IPs, run fail2ban, have a NID (suricata, snort, etc) and HID (OSSEC) feeding a SIEM tool (alienvault, rapid7, Arcsight, etc), and more; your in a position to respond to an attack. Most aren't. I'd still argue it's a needless attack vector that should be removed regardless.

Even doing all that I'd still not recommend punching holes when it is unnecessary, and in this case it really is unnecessary. And certainly not for services not designed to run over the internet (completely unencrypted). Http, snmp (v3 the exception), rtsp (without SSL)... you're making my job easy with that attack surface. It's the same thought process people took about SMB over the internet. It wasn't built for that and no password is going to save you, and we should all know now how that ended.

I get that not everyone is as hard lined on this topic as me. But I've been in IT, with a focus on IT security for the better part of 15 years. I cut my teeth at the largest defense contractor in the US, then the SMB world, and back to a global entity dealing with IT security and strict government regulations. So I tend to be very conservative.

I agree with you completely. I've been saying all along that there is virtually never a need to use port forwarding. The "context laid out here (access from users with unknown ip addresses, resulting in wide open access, to data that is critical, and software that is poorly developed)" rarely, if ever happens in the real world. And if it does, it's the wrong solution.

I only said that I don't think it's fair to say you will get hacked if you port forward. As you mentioned, there are many, many ways to help mitigate that risk.

I think we agree on the topic and are saying the same thing but in two different ways.

I present things how I do because it's been my experience that for most non-IT people (like C levels) it's the one thing that gets their attention. I need to lead them down the right path, and sometimes that means exaggerating a bit if necessary.

Your approach of it's the wrong solution is more diplomatic. When I say that to someone that doesn't have the understand and knowledge about the topic, it seems to translate in their brain into "it's ok to do this, it's completely safe".

It would be an interesting read to see a comparison of the capabilities of the major VMS apps.

Great info.
Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Imperial Capital Security Investor Conference 2018 Review - ADT, Resideo, Alarm.com, Arlo, Eagle Eye, ACRE, More on Dec 14, 2018
Imperial Capital Security Investor Conference is an event matching industry executives with financiers that frequently leads to future funding...
The 2019 Video Surveillance Industry Guide on Dec 10, 2018
The 300 page, 2019 Video Surveillance Industry Guide, covers the key events and the future of the video surveillance market, is now available,...
Multi-Factor Access Control Authentication Guide on Dec 10, 2018
Can a stranger use your credentials? One of the oldest problems facing access control is making credentials as easy to use as keys, but restricting...
ADT Wins Fire Death Suit But Faces Appeal on Dec 05, 2018
ADT/Protection 1 has won a wrongful death court case in which it was sued by the estate of a deceased customer. However, the attorney for the...
HID Product Configurator Examined on Nov 26, 2018
HID is widely used. However, figuring out all the different configurations of features for a final credential or reader part number can be a real...
Axis Bad Marketing - Panoramic Commercial on Nov 23, 2018
Axis is bad at marketing. Recall last month - Axis: "No One Wants To Buy A Camera" and, more generally their 2018 production introductions. But...
No GDPR Penalties For UK Swann 'Spying Hack' on Nov 20, 2018
The UK’s data protection agency has closed its investigation into Infinova-owned Swann Security UK, the ICO confirmed to IPVM, deciding to take “no...
French Government Threatens School with $1.7M Fine For “Excessive Video Surveillance” on Nov 14, 2018
The French government has notified a high-profile Paris coding academy that it risks a fine of up to 1.5 million euros (about $1.7m) if it...
Winter 2019 IP Networking Course on Nov 05, 2018
This is the only networking course designed specifically for video surveillance professionals.  Lots of network training exists but none of it...
HID: Stop Selling Cracked 125 kHz Credentials on Nov 05, 2018
HID should stop selling cracked 125 kHz access control credentials, that have been long cracked and can easily be copied by cheap cloners sold on...

Most Recent Industry Reports

Dahua USA Sales Team Cuts - 'Strategic Right Sizing' on Dec 18, 2018
Dahua USA finishes a tumultuous year in which it acquired the Flir SMB business, was subject to the US government ban, terminated and restructured...
This Brooklyn Storefont Sells Millions In Uniview And Hikvision on Dec 18, 2018
Looking at their Brooklyn headquarters for this "CCTV Manufacturer", it is not much: Inside, it is not better: However, this company is one...
ACRE-Acquired Open Options Access Company Profile on Dec 17, 2018
Who is the company ACRE is acquiring? In this note, we examine Open Options line for best customer fit, key features, pricing, and main...
Open Options Acquired By ACRE on Dec 17, 2018
ACRE is doing deals again. A year after they sold Mercury, they are buying another access control company - Open Options. In this note, we...
8MP / 4K Fixed Lens Camera Shootout - Dahua, Hikvision, TVT, Uniview on Dec 17, 2018
8MP / 4K fixed lens models are now common in lower cost lines, with nearly every Chinese brand and their OEMs now offering multiple options. To...
Network Cable Shootout - Belden, Commscope, Hikvision, Honeywell, NavePoint CCA, Windy City Wire on Dec 17, 2018
Every IP camera install needs UTP cabling. But how much of a difference is there between dirt cheap generic cables found online and the bigger,...
Hikvision Government Parent Holds Communist Party Congress on Dec 17, 2018
The Communist Party committee of Hikvision’s government parent, CETHIK, held a Party Congress earlier this month where senior executives, including...
Imperial Capital Security Investor Conference 2018 Review - ADT, Resideo, Alarm.com, Arlo, Eagle Eye, ACRE, More on Dec 14, 2018
Imperial Capital Security Investor Conference is an event matching industry executives with financiers that frequently leads to future funding...
Cisco Meraki New Cameras and AI Analytics on Dec 14, 2018
Meraki has released their second generation of video surveillance with 3 new cameras, AI-based video analytics, and 2 cloud-based storage...
Foolish Strategy: OEMing Facial Recognition on Dec 13, 2018
Almost as 'hot' as face recognition marketing right now is OEMing facial recognition. Last year, they were a who's who of company's with...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact