VLAN For Video Surveillance Usage Statistics

Author: IPVM Team, Published on Aug 21, 2017

VLANs (see our tutorial) are an option for networks using video surveillance, but how often are they actually used?

125+ integrators told us how and when they use VLANs for surveillance products.

Integrators who use VLANs as a matter of course were quite vocal about the importance of doing so. As one integrator said:

I continue to be amazed at how "security" integrators simply install plug and play network switches and ignore the security of the network. They install alarm & access control systems with supervisory circuits in order to detect efforts to defeat it, yet at the same time feel that IP based security endpoints shouldn't? makes no sense to refuse to become qualified on a critical component of the systems they sell.

Integrators who do not regularly use VLANs either do not see the value in it, or worry that their end users may not have the ability or manpower to set up and maintain a VLAN. As one integrator told us:

We do not get into managing networks as a matter of support, unless it is our own.

***** (*** *** ********)*** ** ****** *** ******** ***** ***** ************, *** *** often *** **** ******** ****?

***+ *********** **** ** *** *** **** **** *** ***** for ************ ********.

*********** *** *** ***** ** * ****** ** ****** **** quite ***** ***** *** ********** ** ***** **. ** *** integrator ****:

* ******** ** ** ****** ** *** "********" *********** ****** install **** *** **** ******* ******** *** ****** *** ******** of *** *******. **** ******* ***** & ****** ******* ******* with *********** ******** ** ***** ** ****** ******* ** ****** it, *** ** *** **** **** **** **** ** ***** security ********* *******'*? ***** ** ***** ** ****** ** ****** qualified ** * ******** ********* ** *** ******* **** ****.

*********** *** ** *** ********* *** ***** ****** ** *** see *** ***** ** **, ** ***** **** ***** *** users *** *** **** *** ******* ** ******** ** *** up *** ******** * ****. ** *** ********** **** **:

** ** *** *** **** ******** ******** ** * ****** of *******, ****** ** ** *** ***.

[***************]

Segregating ************ ********* ********** ********** *** ***************

*********** **** ********* *** ***** ** ** ******* ** ***** it ****** ** ************ ********.

  • "*** *** ****. ***** ******* ******** *** *** ****, ***! No **** ** ********* **** **** ** ***** *******. **'* preferred ** **** * ********** ******** *******. ****** ** ******. Less ******. ** **** *** ****. *** **** **** **** security ** ****. *** *** **** *** *** ********* ** customer ********."
  • "***** **** *** ******** ***** *** ********* ******* ******** *** other ************ **** *** ******."
  • "****** *** ** *** ******* *** ** *****. ** *** them ****** ** ********* *** ******* *** **** ***** ********."
  • "** **** ***** ** ***** *************** ****** *** ** **** less ****** ******** ** ** ********."
  • "******. ******* * ****** *** ******** *** *** ******* *** design *******. ******* *** *** **** ***** ******** ******* ******** rules. ** ** *** ****** ****** ****** ** ******* **** unauthenticated *****."
  • "** ****** ***** *** ******* ** *** ******* ********. **'** either ********** *** *** ******* ** ********* **** ** ***** a **** *** ** ** ***. **** **** *** **** layer ** ******** *** ***** *** ** **** **** ******** fingers ** *** ******* ** ****'** *** * ********* *******. I ********** **** ** **** ** *** **** **** *** IT **** ******** ** * ***. ********* **'* ***********."
  • "** *** ***** ** ******** ****** **** ***** **********. * VLAN ***** ***** ************ ****** ** *** ******* *** ***** create * "*********** *****" *** *** ******* **** **** ******** with * ********'* *******. ** ********** *** ********** ** *** system *** ******** ******* *** ** ****** ** *** ********'* side ** **** **** ***'* ************* **** ** *** ****** by ****** ******* ** *** *******."
  • "***** *** ** ******* *** ********** ** ** *********** ******* consideration ** *** ******** ********* ***** ** ** *** **** way ** **** ***** ****** ******** **** ****** ** ***** are ****."
  • "** ** **** ****** ** ** ******* ***** ***** ** if **** *** *** ** *** **** ****, **** ** know ** ** *** ********* ** ** *** ** *** devices."

Some ***** *** ******** ******

**** *********** **** *** * **** **** * ******** ******** it.

  • "** *** ********* ******* **** ** *********** ** ****** *************. We ***** **** ** ** **** ** ******. * ***** say **** ***** **** ***, **** ** ******* *** ***** on ** * ****."
  • "******** **** ** * ******** **** ** **** ** ** our *********. ***'* **** ****** * ********** ** ***** ** either ***."
  • "********* ** *** ********* ** **********'* *********, ** *** ***** when *********."
  • "****.** ******** *** ** ** *** *** ** * **** and ******** **."
  • "*** *****. ********* *** **** ********* ** ********** *** *** properly."
  • "** ***'* *** ***** ****** **** *** ******** ******."
  • "*** ******* **** ** ** ******. **** ** *** ******** and ***-******** ** *** *** ******** ** *** ****** ** their *******, *** ** ***'* *** *** ****** ** ****. We **** ** ********* ** ***** *************, *** **** ***** don't **** *** ******* **** *** *** ********* **** ****."
  • "******. ** ** ***** ** ****** ***, *** ********** **'* the ********'* **** ** *** **** *** ***** *******. ** always **** ** ******* *** ******** ** ** *** **'* important ** ******* *** ******* *** ***** ******** ******* ** a ******** **** **** *** ******** ********** *******. **** ********* understand *** **** ***'* ** *****."
  • "***** *****, *** **** ** ******* ******** ** *** ******** when ******* ****** ** ***** *******."

Some ********* ****** ******* *****

**** *********** *** ******** ** *** * ****, ******* **** do *** ***** ******* ********** ******** *** *** *** ********* that ***** ********* *** ****** * **** ** ***** ***. This ** ********** **** *** ******* *******, ***** ********* ** not ******* **** ***** ** *** ****.

  • "******* ******* (up ***** ******* - *** ***** *** ***** ** ****** network **** ***."
  • "** ********** ********* *** *** ** ****'* ******* - ** do *** ********* ****** ******* ********* ******* *** ********* ** at ***** *** ****'*."
  • "**** ** *** **** ********** *** ******* ************* * ***'* use *****."
  • "** ********** ******* ** ** ******** ********** ***** ******* **** cameras *** ****** ** * ****** ****** ****** *** ****. Not *********** *********** ******* *** ******** *** **'* *** ***** user *******. ** ** ** **** ****** **** * "***********" customer **** ** ***'* *** ****."
  • "** ****** ********* ***** *** **** ****** ****** **** ** determining *** *** *** ************ (**********) ** ****** **. ** we ** *** ***** *** ******** *** ********* **** ** push **** *** * ******** ******* **** *** ********."
  • "******. ** ***'* **** **** **** ******* *** ******* ** deploy ***."
  • "** ***** ******* ** *** ***** ***** ** *** ******** and ***/** **** ****** ***** ** ***********."
  • "** ****** ******* *** ********* ** ** * **** ** possible ** ******** *** *******. ********* ****** *** ******** *****'* have *** ********* ** *** ** ***** * ****.
  • "****** *****, ***** ** ***'* **** *** ******* **** ***** at ***. *****'* *** ******** ***** **** *** *** ** person ** **** ***** ** *** ************ *** **'* ******* the ********* ******** *** ** *** ***."

Many *********** *** ********* ******** ***** ********

**** *********** ********* ********** ********** ******** *** ************ *********, *** use ***** **** **** * ******** ************ ******* ** *** possible.

  • "** *** ** *** *** *** ******** *** ********* ******* whenever ********."
  • "****** *****. ** ******* ***** ** ******** *** *** ****."
  • "*** **** ** *** ************* (~**%) ** ********* ***** *** a ********** ******** *******, ******** **** *********** **** **** ** the **** ****** ** *****. ** *** ******** *** ********* to *** ************ ******* *** ** ****'* *** ********."
  • "** *** ******** ******* ** ********, **** ***** ** ******* no **** *** *****."
  • "******** ********, ** ********* *** *** ** * ********** ************* network (******** ******* *** ***) **** ***** ******* ****/********/******** *******."
  • "** ****** ** ******** * ********* ******** *******."
  • "** **** ** *** ********** ********** ******** *** ** *******. Simplicity ******."
  • "***** *** ******* *** ** ***** *** ******* *******, ** this **** ** *****."
  • "******, ** ****** ********** *** *** ******** ******* **** ********* switches ***... *** ****** *** ******** ****** *** ******* ******* a ********* ******* **** ** *** ****** ** **."
  • "** ********* ** ********** ******** *** *** **** ** ********** and ********* ********."

**** ***** ** ******** ****** ** *** **** ********** ** video ************ ******** *** ** ********* ** ********* ****.

Comments (0)

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Avigilon Favorability Results 2019 on Jan 15, 2019
Since IPVM's 2017 Avigilon favorability results, the company was acquired by Motorola and has shifted from being an aggressive startup to a more...
2019 IP Networking Book Released on Jan 14, 2019
The new IP Networking Book 2019 is a 285 page in-depth guide that teaches you how IT and telecom technologies impact modern security...
Pelco Favorability Results 2019 on Jan 11, 2019
Pelco had a significant favorability problem amongst integrators in our previous study (see 2016 Pelco results). Now, in the first edition of our...
Winter 2019 IP Networking Course on Jan 10, 2019
Today is the last day to register for the Winter 2019 IP Networking course. This is the only networking course designed specifically for video...
Last Chance - Security Sales Course 2019 on Jan 03, 2019
This is last chance to register for the IPVM sales course: This sales course is customized for the needs and challenges specific to...
Cable Strapping For IP Camera Networks on Jan 02, 2019
Many say using zip-ties is asking for problems. And BICSI prohibits them. But many video surveillance integrators use them regularly. What should...
The Battle For The VSaaS Market Begins 2019 - Alarm.com, Arcules, Eagle Eye, OpenEye, Qumulex, Verkada, More on Jan 02, 2019
2019 will be the year that VSaaS finally becomes a real factor for professional video surveillance. While Video Surveillance as a Service (VSaaS)...
US Gov China Ban Rules Process, SIA Lobbies Against 'Blacklisting', For 'Risk-Based Protocol' on Dec 27, 2018
Details have emerged about when the rules implementing the federal ban on Hikvision, Dahua, Huawei and others will be made public for official...
Combating Vaping Epidemic - Halo Smart Sensor Profile on Dec 21, 2018
Youth vaping has become an epidemic, according to the US Surgeon General, while the market leader, Juul, just received a $12.8 billion investment...
Top 2019 Trend - AI Video Analytics on Dec 10, 2018
160+ Integrators answered: What do you think the top industry trend will be in 2019? Why? AI / video analytics was the run-away winner with...

Most Recent Industry Reports

Access Control Records Maintenance Guide on Jan 16, 2019
Weeding out old entries, turning off unused credentials, and updating who carries which credentials is as important as to maintaining security as...
UK Fines Security Firms For Illegal Direct Marketing on Jan 16, 2019
Two UK security firms have paid over $200,000 in fines for illegally making hundreds of thousands of calls to people registered on a government...
Access Control Cabling Tutorial on Jan 15, 2019
Access Control is only as reliable as its cables. While this aspect lacks the sexiness of other components, it remains a vital part of every...
Avigilon Favorability Results 2019 on Jan 15, 2019
Since IPVM's 2017 Avigilon favorability results, the company was acquired by Motorola and has shifted from being an aggressive startup to a more...
Gorilla Technology AI Provider, Raises $15 Million, Profiled on Jan 15, 2019
Gorilla Technology is a Taiwanese video analytics manufacturer that recently announced a $15 million investment from SBI Group, saying this...
2019 IP Networking Book Released on Jan 14, 2019
The new IP Networking Book 2019 is a 285 page in-depth guide that teaches you how IT and telecom technologies impact modern security...
Arecont Costar Layoffs on Jan 14, 2019
Arecont Vision, a Costar Company, has laid off more than 10% of their workforce in a move the company described to IPVM as a result of "important...
The False SCMP Story on Hikvision NYC AI on Jan 14, 2019
In the past week, one of Asia's largest publications, the South China Morning Post (SCMP), posted an article about "Chinese [facial recognition]...
WDR Tutorial on Jan 11, 2019
Understanding wide dynamic range (WDR) is critical to capturing high quality images in demanding conditions. However, with no real standards, any...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact