Your membership has expired

The payment for your account couldn't be processed or you've canceled your account with us.

Re-activate
    COMPARE

    Frontpoint The Bunker Home Security System
    The Bunker
    Has a rechargeable battery in base station for when power is out. Can trigger siren remotely using the App. Uses E911 to send responders to your home, but requires additional fee. Can use your location to arm and disarm the alarm. Can use your location to arm and disarm the alarm but requires a higher level subscription or additional fee. Has a keypad for passcodes. Uses cellular connections (requires payment) when WiFi is not available. Can add a panic pendant for non-security emergencies. Can add a water leak sensor to the system.
    Description
    Has a rechargeable battery in base station for when power is out. Can trigger siren remotely using the App. Uses E911 to send responders to your home, but requires additional fee. Can use your location to arm and disarm the alarm. Can use your location to arm and disarm the alarm but requires a higher level subscription or additional fee. Has a keypad for passcodes. Uses cellular connections (requires payment) when WiFi is not available. Can add a panic pendant for non-security emergencies. Can add a water leak sensor to the system.

    Ratings Scorecard

    Test Results

    Security essentials

    Security essentials

    Our evaluation of the available features that an ideal security system should offer.

     /  5
    Security add-ons

    Security add-ons

    Our evaluation of security-related features - such as smoke alarms - that an ideal system should offer for expanded functionality.

     /  5
    Data security

    Data security

    A measure of how well the device and its service provider protect your data with respect to authentication, encryption, software updates, response to known vulnerabilities, etc. based on inspection of device features and analysis of network traffic, penetration testing, and publicly-available documentation.

     /  5
    Data privacy

    Data privacy

    A measure of how the device and its service provider collect, share, and use your data, and the user’s ability to control the flow of their data. Analysis is based on evaluation of user interfaces and publicly-available material.

     /  5
    Smart home add-ons

    Smart home add-ons

    Our evaluation of the extra smart home features, such as the ability to control lights, that an ideal security system should offer for expanded functionality.

     /  5
    Ease of setup

    Ease of setup

    How easy the system was to set up.

     /  5
    Ease of use

    Ease of use

    An analysis of features that are used to interact with the security system.

     /  5
    Motion detection

    Motion detection

    Our evaluation of the system's motion detection ability, including whether a test mode is available.

     /  5
    Jamming resistance

    Jamming resistance

    Jamming is a type of hack where a burglar uses a laptop and a portable radio frequency (RF) transceiver to block the signals from door/window or motion sensors and enter a home without triggering the alarm.

     /  5
    Replay disarm resistance

    Replay disarm resistance

    Replay disarm signal attacks are a more complicated attack where a hacker captures and records the disarm signal from a keyfob and later broadcasts it to disarm the security system using a laptop and an RF transceiver.

     /  5

    About

    The Frontpoint The Bunker is part of the Home Security Systems test program at Consumer Reports. In our lab tests, DIY Home Security Systems models like the The Bunker are rated on multiple criteria, such as those listed below.

    Security essentials Our evaluation of the available features that an ideal security system should offer.

    Security add-ons Our evaluation of security-related features - such as smoke alarms - that an ideal system should offer for expanded functionality.

    Data security A measure of how well the device and its service provider protect your data with respect to authentication, encryption, software updates, response to known vulnerabilities, etc. based on inspection of device features and analysis of network traffic, penetration testing, and publicly-available documentation.

    Price & Shop