VLAN For Video Surveillance Usage Statistics

Author: IPVM Team, Published on Aug 21, 2017

VLANs (see our tutorial) are an option for networks using video surveillance, but how often are they actually used?

125+ integrators told us how and when they use VLANs for surveillance products.

Integrators who use VLANs as a matter of course were quite vocal about the importance of doing so. As one integrator said:

I continue to be amazed at how "security" integrators simply install plug and play network switches and ignore the security of the network. They install alarm & access control systems with supervisory circuits in order to detect efforts to defeat it, yet at the same time feel that IP based security endpoints shouldn't? makes no sense to refuse to become qualified on a critical component of the systems they sell.

Integrators who do not regularly use VLANs either do not see the value in it, or worry that their end users may not have the ability or manpower to set up and maintain a VLAN. As one integrator told us:

We do not get into managing networks as a matter of support, unless it is our own.

***** (*** *** ********)*** ** ****** *** ******** ***** ***** ************, *** *** often *** **** ******** ****?

***+ *********** **** ** *** *** **** **** *** ***** for ************ ********.

*********** *** *** ***** ** * ****** ** ****** **** quite ***** ***** *** ********** ** ***** **. ** *** integrator ****:

* ******** ** ** ****** ** *** "********" *********** ****** install **** *** **** ******* ******** *** ****** *** ******** of *** *******. **** ******* ***** & ****** ******* ******* with *********** ******** ** ***** ** ****** ******* ** ****** it, *** ** *** **** **** **** **** ** ***** security ********* *******'*? ***** ** ***** ** ****** ** ****** qualified ** * ******** ********* ** *** ******* **** ****.

*********** *** ** *** ********* *** ***** ****** ** *** see *** ***** ** **, ** ***** **** ***** *** users *** *** **** *** ******* ** ******** ** *** up *** ******** * ****. ** *** ********** **** **:

** ** *** *** **** ******** ******** ** * ****** of *******, ****** ** ** *** ***.

[***************]

Segregating ************ ********* ********** ********** *** ***************

*********** **** ********* *** ***** ** ** ******* ** ***** it ****** ** ************ ********.

  • "*** *** ****. ***** ******* ******** *** *** ****, ***! No **** ** ********* **** **** ** ***** *******. **'* preferred ** **** * ********** ******** *******. ****** ** ******. Less ******. ** **** *** ****. *** **** **** **** security ** ****. *** *** **** *** *** ********* ** customer ********."
  • "***** **** *** ******** ***** *** ********* ******* ******** *** other ************ **** *** ******."
  • "****** *** ** *** ******* *** ** *****. ** *** them ****** ** ********* *** ******* *** **** ***** ********."
  • "** **** ***** ** ***** *************** ****** *** ** **** less ****** ******** ** ** ********."
  • "******. ******* * ****** *** ******** *** *** ******* *** design *******. ******* *** *** **** ***** ******** ******* ******** rules. ** ** *** ****** ****** ****** ** ******* **** unauthenticated *****."
  • "** ****** ***** *** ******* ** *** ******* ********. **'** either ********** *** *** ******* ** ********* **** ** ***** a **** *** ** ** ***. **** **** *** **** layer ** ******** *** ***** *** ** **** **** ******** fingers ** *** ******* ** ****'** *** * ********* *******. I ********** **** ** **** ** *** **** **** *** IT **** ******** ** * ***. ********* **'* ***********."
  • "** *** ***** ** ******** ****** **** ***** **********. * VLAN ***** ***** ************ ****** ** *** ******* *** ***** create * "*********** *****" *** *** ******* **** **** ******** with * ********'* *******. ** ********** *** ********** ** *** system *** ******** ******* *** ** ****** ** *** ********'* side ** **** **** ***'* ************* **** ** *** ****** by ****** ******* ** *** *******."
  • "***** *** ** ******* *** ********** ** ** *********** ******* consideration ** *** ******** ********* ***** ** ** *** **** way ** **** ***** ****** ******** **** ****** ** ***** are ****."
  • "** ** **** ****** ** ** ******* ***** ***** ** if **** *** *** ** *** **** ****, **** ** know ** ** *** ********* ** ** *** ** *** devices."

Some ***** *** ******** ******

**** *********** **** *** * **** **** * ******** ******** it.

  • "** *** ********* ******* **** ** *********** ** ****** *************. We ***** **** ** ** **** ** ******. * ***** say **** ***** **** ***, **** ** ******* *** ***** on ** * ****."
  • "******** **** ** * ******** **** ** **** ** ** our *********. ***'* **** ****** * ********** ** ***** ** either ***."
  • "********* ** *** ********* ** **********'* *********, ** *** ***** when *********."
  • "****.** ******** *** ** ** *** *** ** * **** and ******** **."
  • "*** *****. ********* *** **** ********* ** ********** *** *** properly."
  • "** ***'* *** ***** ****** **** *** ******** ******."
  • "*** ******* **** ** ** ******. **** ** *** ******** and ***-******** ** *** *** ******** ** *** ****** ** their *******, *** ** ***'* *** *** ****** ** ****. We **** ** ********* ** ***** *************, *** **** ***** don't **** *** ******* **** *** *** ********* **** ****."
  • "******. ** ** ***** ** ****** ***, *** ********** **'* the ********'* **** ** *** **** *** ***** *******. ** always **** ** ******* *** ******** ** ** *** **'* important ** ******* *** ******* *** ***** ******** ******* ** a ******** **** **** *** ******** ********** *******. **** ********* understand *** **** ***'* ** *****."
  • "***** *****, *** **** ** ******* ******** ** *** ******** when ******* ****** ** ***** *******."

Some ********* ****** ******* *****

**** *********** *** ******** ** *** * ****, ******* **** do *** ***** ******* ********** ******** *** *** *** ********* that ***** ********* *** ****** * **** ** ***** ***. This ** ********** **** *** ******* *******, ***** ********* ** not ******* **** ***** ** *** ****.

  • "******* ******* (up ***** ******* - *** ***** *** ***** ** ****** network **** ***."
  • "** ********** ********* *** *** ** ****'* ******* - ** do *** ********* ****** ******* ********* ******* *** ********* ** at ***** *** ****'*."
  • "**** ** *** **** ********** *** ******* ************* * ***'* use *****."
  • "** ********** ******* ** ** ******** ********** ***** ******* **** cameras *** ****** ** * ****** ****** ****** *** ****. Not *********** *********** ******* *** ******** *** **'* *** ***** user *******. ** ** ** **** ****** **** * "***********" customer **** ** ***'* *** ****."
  • "** ****** ********* ***** *** **** ****** ****** **** ** determining *** *** *** ************ (**********) ** ****** **. ** we ** *** ***** *** ******** *** ********* **** ** push **** *** * ******** ******* **** *** ********."
  • "******. ** ***'* **** **** **** ******* *** ******* ** deploy ***."
  • "** ***** ******* ** *** ***** ***** ** *** ******** and ***/** **** ****** ***** ** ***********."
  • "** ****** ******* *** ********* ** ** * **** ** possible ** ******** *** *******. ********* ****** *** ******** *****'* have *** ********* ** *** ** ***** * ****.
  • "****** *****, ***** ** ***'* **** *** ******* **** ***** at ***. *****'* *** ******** ***** **** *** *** ** person ** **** ***** ** *** ************ *** **'* ******* the ********* ******** *** ** *** ***."

Many *********** *** ********* ******** ***** ********

**** *********** ********* ********** ********** ******** *** ************ *********, *** use ***** **** **** * ******** ************ ******* ** *** possible.

  • "** *** ** *** *** *** ******** *** ********* ******* whenever ********."
  • "****** *****. ** ******* ***** ** ******** *** *** ****."
  • "*** **** ** *** ************* (~**%) ** ********* ***** *** a ********** ******** *******, ******** **** *********** **** **** ** the **** ****** ** *****. ** *** ******** *** ********* to *** ************ ******* *** ** ****'* *** ********."
  • "** *** ******** ******* ** ********, **** ***** ** ******* no **** *** *****."
  • "******** ********, ** ********* *** *** ** * ********** ************* network (******** ******* *** ***) **** ***** ******* ****/********/******** *******."
  • "** ****** ** ******** * ********* ******** *******."
  • "** **** ** *** ********** ********** ******** *** ** *******. Simplicity ******."
  • "***** *** ******* *** ** ***** *** ******* *******, ** this **** ** *****."
  • "******, ** ****** ********** *** *** ******** ******* **** ********* switches ***... *** ****** *** ******** ****** *** ******* ******* a ********* ******* **** ** *** ****** ** **."
  • "** ********* ** ********** ******** *** *** **** ** ********** and ********* ********."

**** ***** ** ******** ****** ** *** **** ********** ** video ************ ******** *** ** ********* ** ********* ****.

Comments (0)

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Video Surveillance Hard Drive Size Statistics 2018 on Nov 08, 2018
What is the most common hard drive size for video surveillance? 150+ integrators answered: What size hard drive do you most commonly use? What...
Ubiquiti Protect Video Surveillance Profile on Nov 07, 2018
Ubiquiti has now been in the video surveillance market for 7 years (see our first coverage back in 2011). In that time, the company's revenue has...
Favorite Video Surveillance Hard Drive Manufacturer 2018 on Nov 06, 2018
Who is the favorite hard drive for video surveillance use? 150+ integrators answered: What is your preferred brand/model of hard drive for...
Winter 2019 IP Networking Course on Nov 05, 2018
This is the only networking course designed specifically for video surveillance professionals.  Lots of network training exists but none of it...
Worst Products on Nov 03, 2018
Security integrators periodically report on their favorite and worst products to IPVM. These are known integrators who IPVM pays to answer surveys....
Video Surveillance Hard Drive Failure Statistics 2018 on Nov 02, 2018
Hard drive failures can be significant service problems but how common of an issue are they in video surveillance? How long do drives last when...
Cloud Video Storage Usage 2018 on Oct 31, 2018
Storing email and documents in the cloud have long been common, with on-site email or file servers increasingly eliminated. However, what about...
Huawei To Be “Top Three Global Position” in Video Surveillance on Oct 29, 2018
Huawei - China’s biggest networking gear and smartphone maker - plans to become one of the top three global video surveillance manufacturers in...
IP Camera Installation Tool Shootout - Avigilon, Axis, Ideal, Hanwha, Triplett, Veracity on Oct 23, 2018
Setting up IP cameras has historically been challenging, with techs often precariously using a laptop on a ladder or lift. Some options for install...
Best Alternatives to Banned Dahua and Hikvision on Oct 17, 2018
With the US government ban and a growing number of users banning Dahua and Hikvision, one key question is what to use for low cost? While Dahua and...

Most Recent Industry Reports

'Sticker' Surveillance Camera Developed (CSEM Witness) on Nov 16, 2018
The Swiss Center for Electronics and Microtechnology (CSEM) has announced what it calls the: world’s first fully autonomous camera that can be...
ISC East 2018 Mini-Show Final Report on Nov 16, 2018
This is our second (updated) and final show report from ISC East. ISC East, by its own admission, is not a national or international show, billed...
Facial Detection Tested on Nov 16, 2018
Facial detection and recognition are increasingly offered by video surveillance manufacturers. Facial detection detects faces in an image/video...
Throughtek P2P/Cloud Solution Profile on Nov 15, 2018
Many IoT manufacturers either do not have the capabilities or the interest to develop their own cloud management software for their devices....
ASIS Offering Custom Research For Manufacturers on Nov 15, 2018
Manufacturers often want to know what industry people think about trends and, in particular, the segments and product they offer.  ASIS and its...
Hikvision Silent on "Bad Architectural Practices" Cybersecurity Report on Nov 14, 2018
A 'significant vulnerability was found in Hikvision cameras' by VDOO, a startup cybersecurity specialist. Hikvision has fixed the specific...
French Government Threatens School with $1.7M Fine For “Excessive Video Surveillance” on Nov 14, 2018
The French government has notified a high-profile Paris coding academy that it risks a fine of up to 1.5 million euros (about $1.7m) if it...
Integrator Credit Card Alternative Divvy on Nov 13, 2018
Most security integrators are small businesses but large enough that they have various employees that need to be able to expense various charges as...
Directory of Video Intercoms on Nov 13, 2018
Video Intercoms, also known as Video Door-Phones or Video Entry Systems, have been growing in the past decade as more and more IP camera...
Beware Amazon Go Store Hype (Tested) on Nov 13, 2018
IPVM's trip to and testing of Amazon Go's San Francisco store shows a number of significant operational and economic issues that undermine the...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact