Surveillance Subcontractor Usage

Author: Ethan Ace, Published on Feb 22, 2012

Whether or not to subcontract all or part of a security deployment is often a polarizing subject. Some integrators refuse to subcontract work, preferring to have their staff do all work and maintain complete control of a project. Others say they could never do all the work they do without subcontracting. To find out what is really going on in the industry, we asked integrators how often they use subcontractors.

The Results

****** *** ***********, ************* ***** *** *****. *******, *** ****** the **********'* ******* *** **** ***, *** ****** ************** ***** rose. *** ********, *******, * ****** ******** ** *********** **** subcontractors ************.

*******, *********** ************ ** ***** **** ************** (**** **** */****) infrequently **** **************. *** ******* **** *** ******** *** *********** specializing ** ***** ******** **** **** **** */**** ********* ***** subcontractors.

****, ********* ***** ***** ******** **** **** ***** ************** **** than **% ** *** ****. ** ******* **** ***** *** two ******* ** ****:

  • *********: ***** ********* ****** ****** ***** ***** * ****** ************ footprint. **** ******* ** ****** ****** *** ******* ***** ** internal ********* *** ****, ****** ********** * **** ********** ******.
  • ***** *********: ****** ******* *** ***** **** ******* **** ***** deployments, ********* **** ******** *** ***********. ***** ********* ******* ** this **** *** **** ****** ** **** * "******" ** lower-level ***** ** **** ****** *** ******* *******, *** **** likely ** *** ******-******* ***** *** ***** *****, ****** ************** more ******.

Quality *******

*** **** ****** ***** *** ********** *** ** *** ************** was *** ***** ** ******* *******. ************** *** *** ** managed ** **** ** ** **********'* ******** *****. ***** **** do *** ****** ******** ** *** **********'* ******* **********, *** do **** **** * ****** ************ **** *** ********, ****'** often ****** ** ****** **** ** ***** ** ********, *** thus **** **** ******* *** ******* ** ********.

  • "** **** **** ****** **** ** ******* ******* ******* ***** in *****, ** **** ** ******* * ******* **** ** our *********, ** ****** *** ********** ** ****** ******* **** customers ******, *** *****, ** ************."
  • "*** ******* ** ***** ** *** *********** ** **** ******** with **** ********** ** *** *******, *** ******** ** *** take * '******' ** *** * *** *** ** ***** out **'* * **** *** ** ******** **** *****. **'* kind ** * **** ****** ** *** *** ** ************ big ** ******** ********* ******* **** ** ***'* ** *********. That ***** **** **** ** *** ********* ************* *** ***** of ***** ** **** **** * **** **** ***!"
  • "********* ** **, *** ** ******** *** ****** *** *** jobs. **** ** ***** ************ ****** ********** **** *** ** the ****."
  • "****** ** ****** **** ** ** *** *** *********. ** never *** ************** *** ************ ****** ** ******** ********* ******* like ** ***********. ** **** *** ************** *** *******, **** infrequently, *** ****** ****** **** '**** **** **** **** **** port.' ********* **'** ***** **'* ****** ** ** ** *********."
  • "**** ****** ** **** ******* *** ** ********** *** ********. Sure * *** **** *** *** ** *** * **** for ** ** * *** ***, *** ****** ** *** a **** ** *** **** ** **** * ******* **** one ** *** ***** ** ********* *** ******* **** **** shortcuts **** ******* ***** ****** ** **** ****** ** ***** down ***** *** ******* ** *** **** **. *** *** what *** *** ***."
  • "* ***** ** * ***** ****** ****** ** ******* ** do *** ****** *** **** *** * **** *** **** correctly. ** ********** ** ***** *** **** ** **** *** work ** *******."

Subcontractor *********

*** **** ****** ****** ***** *** ******* *** ******** *** that **************, ********** ************, **** ***** ****** ** ****** ** certain *****, **** ** ******* *** ***** ************. ** ** often *********** ** *** *********** *** *** ******* *** ********* in *** *******, ********, **********, *** ***** ******-***** ********* *** installing *****. ****** ************** *** ***** ***** *** ***** ***** overall, ******** ******* ***** ** ** **** ******-***** ****.

  • "*** ******* ** *** * ******* ******* ** ** ********* sub *** * *** ** *** ********** ******* *** ******** network ***********. **'** **** ***** **** ************ **** ***** ****** and **** ********* **** *** ***********.:
  • "******** ******** ** ** *** **** ********* ** ******** ******* consistency. **** ***** ****, ** ** *** **** ********* *** to ** ************, ********, **********, ********, **********, ** ******** *** are **** **** ******* ** ***** **** ******* **** ** others."
  • "******* ******* ** ********* ********** ** * ********** ******* *******. It ** **** ******** *** *** ******* ** *** ***** skills ****** **** **** *** ***** ******* ********."
  • "*'* ********* **** *** ******** ***** *** ** ********** **** not ***** *** ******* ** ******* *** ** *** ****** in ***** ** **** *** ***** ** *** ******** ********* and ******** *** ************ ********. **'* **** ********* ** **** a *******/******* **** ** ***** **** *** *** ******* ********. We **** **** ******** ************** **** ** **** ****, *** focusing *** ** ***** ***** ** **** *** ************ *** service/support."
  • "** *** ****** ***** **** ** ******* ***** **** ****** a *********"
  • "*** ****** **** *** ************** ** ***** ** ** *** to ******* ******* ********** ************. *** **** ** * ********-******** technical ****** **** *** ********* ******* **** ******* *****, ********** hardware, ** ******* ****."

Assists ** ****** ********

**** *********** ** *** **** **** **** * ******* ** technicians ** *****. ****** ************** *** ******* *** ******* ***** may ***** ******* *********** ** **** ** ******** ***** **** would ********* ** ****** ** ******.

  • "**'* ***** ******* *** ****** ** **** ** ********** ******* all *** *****, *******, **** *****, ***. ******** **** ** do ** ** *****. ****'** ******* *** ********* *** *** techs **** ********* , *** ** *** **** ***, ** the ***********, *** ** *** *******. ** *** *** * lot ** ***** ******** **** **** *** ***** **** ***."
  • "** **** **** * ********** ** *** *******; *** *** bigger **** ** **** ** ** ** *** ***** ****** we ********* **** ****."
  • "*****'* *** ****** ** **** **** ********** *** ************ **** to ** **** ** ****** **** ****** **** *** ******* so **** ** *** * *** *** **** *** ******* it ** *** ***."
  • "****** ** ** **** ** ****** **** ******* ****** ** keep **** ** ********* ** *****."
Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Remote Video Monitoring Providers Directory on May 21, 2017
Remote video monitoring can help integrators generate RMR plus end users lower their security costs and/or improve response to critical...
Amazon Techs Installing IP Cameras Tested on May 18, 2017
In 2015, Amazon started offering video surveillance installation. Now, Amazon has made it a lot easier, with automatic add-on options and...
FLIR Is Giving Away $3,000 Demo Kits on May 17, 2017
Everybody likes free stuff, and FLIR is using that concept to attract dealers by giving them $3,000 worth of demo gear for attending a...
Selling and Valuing Security Integrators on May 12, 2017
This ia a tutorial in how to (1) determine your security integrator's value and (2) to sell your security integrator. If you own an integrator,...
Technician Personal Protective Equipment (PPE) Guide on May 12, 2017
Technicians encounter multiple hazards when running wires and installing security devices. Wearing personal protective equipment, or PPE, helps...
Alarm Circuits Guide on May 09, 2017
Alarm circuits are a fundamental element of wired burglar systems. Designing the alarm circuit greatly affects its performance. In particular,...
Panoramic Camera Usage Rising 2017 on May 08, 2017
Panoramic camera usage (including fisheye and multi-imagers) continue to rise rapidly. However, the race to the bottom is hindering even stronger...
Code Blue Emergency Communications Profile on May 05, 2017
Code Blue is a US-based manufacturer of emergency call stations, call boxes, and incident management software. Over time, the company has shifted...
Smartphone Controlled Kevo Lock Tested on May 04, 2017
Smartlocks are a growing market, with millions sold. Kwikset's Kevo is one of the most common choices, using the Unikey smart phone access control...
Varifocal Vs Fixed Lens Statistics 2017 on May 04, 2017
Varifocal camera lenses provide more flexibility at installation time, but come at a higher cost. Fixed lens cameras reduce hardware costs, but can...

Most Recent Industry Reports

Axis Criticizes OEMs: "When You Buy An Axis Camera, An Axis Camera Is What You Get!" on May 19, 2017
When you buy a Honeywell camera, you likely get a Hikvision, Dahua or some other company's product. The same goes for easily 100 different...
Hackable 125kHz Access Control Migration Guide on May 19, 2017
Despite being one of the most popular credentials, 125 kHz credentials are easily copied and insecure as we showed in our test results, video...
Forget The Backdoor, "ALL HIKVISION PRODUCTS" On Sale on May 18, 2017
Less than 2 weeks after the Hikvision Backdoor was confirmed, Hikvision has launched a sale "ON ALL HIKVISION PRODUCTS". In this note, we examine...
Amazon Techs Installing IP Cameras Tested on May 18, 2017
In 2015, Amazon started offering video surveillance installation. Now, Amazon has made it a lot easier, with automatic add-on options and...
Hanwha Recorder Vulnerability Analyzed on May 18, 2017
ICS-CERT has released a vulnerability notice for Hanwha SRN-4000 recorders.  Hanwha provided additional information to IPVM about this issue,...
ShotSpotter To IPO, Facing Low Revenue and Losses on May 17, 2017
A rare event for North American security manufacturers is upcoming. ShotSpotter is planning to IPO on the NASDAQ, aiming to raise $34.5...
DMP Video Doorbell / Access Reader Examined on May 17, 2017
Consumers increasingly demand video doorbells, with "doorbells selling like hotcakes, everyone wants a doorbell", according to ADT's CEO. At ISC...
FLIR Is Giving Away $3,000 Demo Kits on May 17, 2017
Everybody likes free stuff, and FLIR is using that concept to attract dealers by giving them $3,000 worth of demo gear for attending a...
Shark Tank Startup Guard Llama Mobile Panic Tested on May 16, 2017
A Shark Tank TV show appearance has attracted big attention for Guard Llama, a security startup touting a 'panic button' paired with mobile app...
Axis Beats Avigilon Growth Rate (AVO Q1 2017) on May 16, 2017
In what is likely the first time ever, Axis beat Avigilon's revenue growth for Q1 2017. Inside this note, we examine Avigilon's Q1 2017 financial...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact