VLAN For Video Surveillance Usage Statistics

Author: IPVM Team, Published on Aug 21, 2017

VLANs (see our tutorial) are an option for networks using video surveillance, but how often are they actually used?

125+ integrators told us how and when they use VLANs for surveillance products.

Integrators who use VLANs as a matter of course were quite vocal about the importance of doing so. As one integrator said:

I continue to be amazed at how "security" integrators simply install plug and play network switches and ignore the security of the network. They install alarm & access control systems with supervisory circuits in order to detect efforts to defeat it, yet at the same time feel that IP based security endpoints shouldn't? makes no sense to refuse to become qualified on a critical component of the systems they sell.

Integrators who do not regularly use VLANs either do not see the value in it, or worry that their end users may not have the ability or manpower to set up and maintain a VLAN. As one integrator told us:

We do not get into managing networks as a matter of support, unless it is our own.

***** (*** *** ********)*** ** ****** *** ******** ***** ***** ************, *** *** often *** **** ******** ****?

***+ *********** **** ** *** *** **** **** *** ***** for ************ ********.

*********** *** *** ***** ** * ****** ** ****** **** quite ***** ***** *** ********** ** ***** **. ** *** integrator ****:

* ******** ** ** ****** ** *** "********" *********** ****** install **** *** **** ******* ******** *** ****** *** ******** of *** *******. **** ******* ***** & ****** ******* ******* with *********** ******** ** ***** ** ****** ******* ** ****** it, *** ** *** **** **** **** **** ** ***** security ********* *******'*? ***** ** ***** ** ****** ** ****** qualified ** * ******** ********* ** *** ******* **** ****.

*********** *** ** *** ********* *** ***** ****** ** *** see *** ***** ** **, ** ***** **** ***** *** users *** *** **** *** ******* ** ******** ** *** up *** ******** * ****. ** *** ********** **** **:

** ** *** *** **** ******** ******** ** * ****** of *******, ****** ** ** *** ***.

[***************]

Segregating ************ ********* ********** ********** *** ***************

*********** **** ********* *** ***** ** ** ******* ** ***** it ****** ** ************ ********.

  • "*** *** ****. ***** ******* ******** *** *** ****, ***! No **** ** ********* **** **** ** ***** *******. **'* preferred ** **** * ********** ******** *******. ****** ** ******. Less ******. ** **** *** ****. *** **** **** **** security ** ****. *** *** **** *** *** ********* ** customer ********."
  • "***** **** *** ******** ***** *** ********* ******* ******** *** other ************ **** *** ******."
  • "****** *** ** *** ******* *** ** *****. ** *** them ****** ** ********* *** ******* *** **** ***** ********."
  • "** **** ***** ** ***** *************** ****** *** ** **** less ****** ******** ** ** ********."
  • "******. ******* * ****** *** ******** *** *** ******* *** design *******. ******* *** *** **** ***** ******** ******* ******** rules. ** ** *** ****** ****** ****** ** ******* **** unauthenticated *****."
  • "** ****** ***** *** ******* ** *** ******* ********. **'** either ********** *** *** ******* ** ********* **** ** ***** a **** *** ** ** ***. **** **** *** **** layer ** ******** *** ***** *** ** **** **** ******** fingers ** *** ******* ** ****'** *** * ********* *******. I ********** **** ** **** ** *** **** **** *** IT **** ******** ** * ***. ********* **'* ***********."
  • "** *** ***** ** ******** ****** **** ***** **********. * VLAN ***** ***** ************ ****** ** *** ******* *** ***** create * "*********** *****" *** *** ******* **** **** ******** with * ********'* *******. ** ********** *** ********** ** *** system *** ******** ******* *** ** ****** ** *** ********'* side ** **** **** ***'* ************* **** ** *** ****** by ****** ******* ** *** *******."
  • "***** *** ** ******* *** ********** ** ** *********** ******* consideration ** *** ******** ********* ***** ** ** *** **** way ** **** ***** ****** ******** **** ****** ** ***** are ****."
  • "** ** **** ****** ** ** ******* ***** ***** ** if **** *** *** ** *** **** ****, **** ** know ** ** *** ********* ** ** *** ** *** devices."

Some ***** *** ******** ******

**** *********** **** *** * **** **** * ******** ******** it.

  • "** *** ********* ******* **** ** *********** ** ****** *************. We ***** **** ** ** **** ** ******. * ***** say **** ***** **** ***, **** ** ******* *** ***** on ** * ****."
  • "******** **** ** * ******** **** ** **** ** ** our *********. ***'* **** ****** * ********** ** ***** ** either ***."
  • "********* ** *** ********* ** **********'* *********, ** *** ***** when *********."
  • "****.** ******** *** ** ** *** *** ** * **** and ******** **."
  • "*** *****. ********* *** **** ********* ** ********** *** *** properly."
  • "** ***'* *** ***** ****** **** *** ******** ******."
  • "*** ******* **** ** ** ******. **** ** *** ******** and ***-******** ** *** *** ******** ** *** ****** ** their *******, *** ** ***'* *** *** ****** ** ****. We **** ** ********* ** ***** *************, *** **** ***** don't **** *** ******* **** *** *** ********* **** ****."
  • "******. ** ** ***** ** ****** ***, *** ********** **'* the ********'* **** ** *** **** *** ***** *******. ** always **** ** ******* *** ******** ** ** *** **'* important ** ******* *** ******* *** ***** ******** ******* ** a ******** **** **** *** ******** ********** *******. **** ********* understand *** **** ***'* ** *****."
  • "***** *****, *** **** ** ******* ******** ** *** ******** when ******* ****** ** ***** *******."

Some ********* ****** ******* *****

**** *********** *** ******** ** *** * ****, ******* **** do *** ***** ******* ********** ******** *** *** *** ********* that ***** ********* *** ****** * **** ** ***** ***. This ** ********** **** *** ******* *******, ***** ********* ** not ******* **** ***** ** *** ****.

  • "******* ******* (up ***** ******* - *** ***** *** ***** ** ****** network **** ***."
  • "** ********** ********* *** *** ** ****'* ******* - ** do *** ********* ****** ******* ********* ******* *** ********* ** at ***** *** ****'*."
  • "**** ** *** **** ********** *** ******* ************* * ***'* use *****."
  • "** ********** ******* ** ** ******** ********** ***** ******* **** cameras *** ****** ** * ****** ****** ****** *** ****. Not *********** *********** ******* *** ******** *** **'* *** ***** user *******. ** ** ** **** ****** **** * "***********" customer **** ** ***'* *** ****."
  • "** ****** ********* ***** *** **** ****** ****** **** ** determining *** *** *** ************ (**********) ** ****** **. ** we ** *** ***** *** ******** *** ********* **** ** push **** *** * ******** ******* **** *** ********."
  • "******. ** ***'* **** **** **** ******* *** ******* ** deploy ***."
  • "** ***** ******* ** *** ***** ***** ** *** ******** and ***/** **** ****** ***** ** ***********."
  • "** ****** ******* *** ********* ** ** * **** ** possible ** ******** *** *******. ********* ****** *** ******** *****'* have *** ********* ** *** ** ***** * ****.
  • "****** *****, ***** ** ***'* **** *** ******* **** ***** at ***. *****'* *** ******** ***** **** *** *** ** person ** **** ***** ** *** ************ *** **'* ******* the ********* ******** *** ** *** ***."

Many *********** *** ********* ******** ***** ********

**** *********** ********* ********** ********** ******** *** ************ *********, *** use ***** **** **** * ******** ************ ******* ** *** possible.

  • "** *** ** *** *** *** ******** *** ********* ******* whenever ********."
  • "****** *****. ** ******* ***** ** ******** *** *** ****."
  • "*** **** ** *** ************* (~**%) ** ********* ***** *** a ********** ******** *******, ******** **** *********** **** **** ** the **** ****** ** *****. ** *** ******** *** ********* to *** ************ ******* *** ** ****'* *** ********."
  • "** *** ******** ******* ** ********, **** ***** ** ******* no **** *** *****."
  • "******** ********, ** ********* *** *** ** * ********** ************* network (******** ******* *** ***) **** ***** ******* ****/********/******** *******."
  • "** ****** ** ******** * ********* ******** *******."
  • "** **** ** *** ********** ********** ******** *** ** *******. Simplicity ******."
  • "***** *** ******* *** ** ***** *** ******* *******, ** this **** ** *****."
  • "******, ** ****** ********** *** *** ******** ******* **** ********* switches ***... *** ****** *** ******** ****** *** ******* ******* a ********* ******* **** ** *** ****** ** **."
  • "** ********* ** ********** ******** *** *** **** ** ********** and ********* ********."

**** ***** ** ******** ****** ** *** **** ********** ** video ************ ******** *** ** ********* ** ********* ****.

Comments (0)

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Last Chance - Security Sales Course Summer 2018 on Jul 19, 2018
Today is the last day to register. Based on member's interest, IPVM is offering a security sales course this summer. Register Now - IPVM Security...
Directory of Video Surveillance Startups on Jul 18, 2018
This directory provides a list of video surveillance startups to help you see and research what companies are new or not yet broadly known entity...
July 2018 IP Networking Course on Jul 12, 2018
Registration is closed. This is the only networking course designed specifically for video surveillance professionals.  Lots of network training...
4 Most Difficult Camera Installs (Statistics) on Jul 12, 2018
Heavy housings, cumbersome brackets, heavy ladders required, and tricky field of view requirements will cause difficulties no matter the camera...
Most Wanted Improvements In Manufacturer Technical Support (Statistics) on Jun 21, 2018
5 key areas of improvement and 1 clear wanted support feature were voiced by 140+ integrator responses to: What improvement in manufacturer...
Axis Guardian - Cloud VMS And Alarm Monitoring - Released on Jun 19, 2018
Axis has struggled to deliver a cloud-based managed service video platform. Video service providers have utilized AVHS for over a decade, and have...
Powerline Networking For Video Surveillance Advocated By Comtrend on Jun 08, 2018
Powerline networking, using existing electrical wiring, has been around for many years. Indeed, over the years, some video surveillance providers...
Worst Features for Camera Installation (Statistics) on Jun 07, 2018
4 clear worst features for installing were identified by 140+ integrator respondents to: What feature(s) make a camera hard to install? The...
Top Features For Easy Camera Installation (Statistics) on Jun 05, 2018
Camera installation is the most fundamental and common task for video security technicians. Because of this, camera manufacturers market their...
Stats: IP Camera Dead On Arrival (DOA) Decline, Near Zero on Jun 01, 2018
New IPVM integrator statistics show that IP camera DoA rates have declined with zero dead on arrival units for many integrators and effectively...

Most Recent Industry Reports

AI Startup Anyvision Raises $28 Million Led By Bosch on Jul 20, 2018
Anyvision is the most ambitious heavy-spending video surveillance startup in many years. And, now, the startup has raised $28 million led by...
Fail: Dahua "Didn't Check The Lux Levels but It Was Dark" on Jul 20, 2018
Dahua UK has been promoting their camera quality on LinkedIn: I, and others, asked what the lux level of the scene was. (background: Lux Rating...
Free 100+ Manufacturer-Customized Camera Calculator Released on Jul 19, 2018
Now, any manufacturer has a customized IPVM Camera Calculator, free. The goal is to make it easier for companies to help their customers better...
Improved Security And Surveillance Bidding - 2018 MasterFormat Divisions Examined) on Jul 19, 2018
Navigating the world of system specifications and bidding work can be complex and confusing, but a standard format exists, and understanding it...
Last Chance - Security Sales Course Summer 2018 on Jul 19, 2018
Today is the last day to register. Based on member's interest, IPVM is offering a security sales course this summer. Register Now - IPVM Security...
Directory of Video Surveillance Startups on Jul 18, 2018
This directory provides a list of video surveillance startups to help you see and research what companies are new or not yet broadly known entity...
Ladder Lockdown and Ladder Levelizer Tested on Jul 18, 2018
Ladders are a daily necessity for surveillance and security installers, but working on an unstable surface can be extremely dangerous. In addition...
FST Fails on Jul 17, 2018
FST was one of the hottest startups of the decade, selected as the best new product at ISC West 2011 and backed with tens of millions in...
Axis ~$100 Camera Tested on Jul 17, 2018
Axis has released their lowest cost camera ever, the Companion Eye Mini L, setting their sights on a market dominated by Hikvision and Dahua. Can...
Amazon Ring Alarm System Tested on Jul 16, 2018
Amazon Ring is going to hurt traditional dealers, and especially ADT, new IPVM test results of Ring's Alarm system underscore. IPVM found that...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact