Surveillance Operational Handbook

Author: John Honovich, Published on Nov 11, 2012

We are excited to release our Surveillance Operational Handbook, a 50 page guide featuring 40+ charts/tables capturing what is being sold, used and deployed in the real world.

This guide will help you understand the actions of your peers or customers so you can make better decisions.

The key topics included are:

Business

  • Lifespan of Surveillance Systems Average
  • Camera Markup Averages
  • VMS Annual Support / License Fee Preferences
  • Maintenance Purchasing Preferences
  • Leasing Surveillance Preferences
  • Warranty Term Averages
  • Subcontractor Usage Averages
  • RFP Quality Satisfaction Rates

Operations

  • Storage Duration Averages
  • Storage Type Preferences (DAS vs SAN vs NAS)
  • Frame Rate Recording Averages
  • Recording Mode (Motion vs Continuous) Usage
  • Motion Detection: Camera vs Server Side Preferences
  • Camera Model Averages Per Project
  • Hard Drive Failure Rates
  • IP Camera Installation Tool Preferences
  • IP Video Network Deployment Preferences

Products

  • IP and MP Camera Adoption Rates
  • Video Analytic Usage Rates
  • Surveillance Monitor Preferences
  • PoE: Switch vs Midspan Preferences
  • Mobile Application Usage Averages
  • Wireless Surveillance Usage Rates
  • UPS Deployment Statistics
  • PTZ Usage Statistics
  • Video / Access Control Integration Rates
  • Varifocal vs Fixed Lens Preferences
  • IR Illuminator Usage Rates
  • Encoder Usage Rates
  • Hardware Usage Preferences
  • PSIM Deployment Rates

Review the Table of Contents for the Handbook and a sample section.

The total handbook is 50 pages and contains 40 charts/tables. While typical statistical reports cost thousands, this report is free for all IPVM members.

** *** ******* ** ******* *** ************ *********** ********, * 50 **** ***** ********* **+ ******/****** ********* **** ** ***** sold, **** *** ******** ** *** **** *****.

**** ***** **** **** *** ********** *** ******* ** **** peers ** ********* ** *** *** **** ****** *********.

*** *** ****** ******** ***:

********

  • ******** ** ************ ******* *******
  • ****** ****** ********
  • *** ****** ******* / ******* *** ***********
  • *********** ********** ***********
  • ******* ************ ***********
  • ******** **** ********
  • ************* ***** ********
  • *** ******* ************ *****

**********

  • ******* ******** ********
  • ******* **** *********** (*** ** *** ** ***)
  • ***** **** ********* ********
  • ********* **** (****** ** **********) *****
  • ****** *********: ****** ** ****** **** ***********
  • ****** ***** ******** *** *******
  • **** ***** ******* *****
  • ** ****** ************ **** ***********
  • ** ***** ******* ********** ***********

********

  • ** *** ** ****** ******** *****
  • ***** ******** ***** *****
  • ************ ******* ***********
  • ***: ****** ** ******* ***********
  • ****** *********** ***** ********
  • ******** ************ ***** *****
  • *** ********** **********
  • *** ***** **********
  • ***** / ****** ******* *********** *****
  • ********* ** ***** **** ***********
  • ** *********** ***** *****
  • ******* ***** *****
  • ******** ***** ***********
  • **** ********** *****

****** ******** ** ******** *** *** *********** ******* *******.

*** ***** ******** ** ** ***** *** ******** ** ******/******. While ******* *********** ******* **** *********, **** ****** ** **** for *** **** *******.

[***************]

*** ****** ** ********* *** ********* ******** *****:

********: **** ****** ** *** **** *** ******* ****. ***** you.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Alarm Supervision Guide on May 24, 2017
Burglar alarms can constantly monitor the health of attached circuits, sensors, and devices to ensure that they remain operational. This is known...
Hackable 125kHz Access Control Migration Guide on May 19, 2017
Despite being one of the most popular credentials, 125 kHz credentials are easily copied and insecure as we showed in our test results, video...
Technician Personal Protective Equipment (PPE) Guide on May 12, 2017
Technicians encounter multiple hazards when running wires and installing security devices. Wearing personal protective equipment, or PPE, helps...
Burglar Alarm Partitions Guide on May 10, 2017
Many burglar alarm systems have a single designated level of access for users. A user can arm or disarm the entire alarm by entering a single code....
Alarm Circuits Guide on May 09, 2017
Alarm circuits are a fundamental element of wired burglar systems. Designing the alarm circuit greatly affects its performance. In particular,...
Last Day - IP Networking Course May 2017 on Apr 26, 2017
Today is the last day to register for the May IP Networking Course. This is the only networking course designed specifically for video...
Splicing Alarm Circuits Guide on Apr 23, 2017
Alarm installers commonly connect multiple sensors to a single zone. They do this by splicing the wires together. In this report, we will explain...
Burglar Alarm Strobes Guide on Mar 31, 2017
Strobes provide visual notification of alarm incidents, as sirens are used to give audible notification. Using a strobe gives alarm users and alarm...
Burglar Alarm Sirens Guide on Mar 27, 2017
Sirens are used to alert users to an alarm condition. In this note, we examine how to choose, locate, and install alarm sirens, including Siren...
Lock Keyways For Access Control Guide on Mar 23, 2017
Lock keyways can be the difference between a lock working or not. Understanding keyways is important for access control. Indeed, a member recently...

Most Recent Industry Reports

Anti-Hack Access Card Shields Tested on May 26, 2017
Keeping your access control card information secure is becoming a big priority, especially since cheaper copiers can hack details easily. Multiple...
H.265 / HEVC Codec Tutorial 2017 on May 25, 2017
Since 2013, video surveillance professionals have talked about the potential for H.265. Now, in 2017, H.265 is starting to gain mainstream...
Camera Course Summer 2017 on May 25, 2017
Learn video surveillance and get certified. IPVM provides live online classes, recorded videos, personal help, cutting edge education and...
Most Respected Manufacturer Competitors on May 25, 2017
Manufacturers told IPVM what competitor they most respected. In terms of total revenue, Hikvision, Dahua and Axis are certainly tops but would...
CyPhy 'Unlimited' Flight Time Security Drone Examined on May 25, 2017
Drones face several issues as commercial security platforms - legal restrictions (e.g., in the US, the FAA), costs, and limited flight durations...
Milestone Entry Level Mobile Password Vulnerability Disclosed on May 24, 2017
While many manufacturers have only addressed cybersecurity vulnerabilities after public disclosures were made (or threatened), Milestone has...
How Integrators Use IPVM on May 24, 2017
150 integrators explained how they use IPVM and how it helps them stay informed and improve their business.  The 4 main uses integrators cited for...
Alarm Supervision Guide on May 24, 2017
Burglar alarms can constantly monitor the health of attached circuits, sensors, and devices to ensure that they remain operational. This is known...
Arlo Go Cellular Cloud Camera Tested on May 23, 2017
Totally wireless surveillance cameras are growing but almost all typically depend on a hub and local Internet access. However, many outdoor...
Avigilon New COO James Henderson Profile on May 23, 2017
It has been nearly 2 years since the infamous Bryan Schmode 'resigned' as Avigilon COO. Now, Avigilon once again has a COO, promoting James...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact