Canon Network / IP Cameras(7)
Best in class opticsCanon's first megapixel network camera offers 20x zoom and a 55.4° horizontal viewing angle within the smallest, most discreet body in its class. VB-M40 draws together Canon's DIGIC NET and lens technology assets to deliver its most advanced network camera. Canon's DIGIC NET allows VB-M40 to stream video at 1280x960 resolution at 30 frames per second in H.264, a compression format combining high quality and high compression rates. Its industry-leading 20x zoom Auto Focus lens, combined with the 340° pan and 100° tilt mechanism, delivers precise, high-resolution images. The VB-M40 excels in low light conditions with a low-light performance in colour at 0.4 lux and B/W at 0.01 lux. In addition the IR cut filter Day/Night Function and Smart Shade Control ensure best image quality is delivered in any situation.Intelligent monitoring applicationsVB-M40 is suitable to be deployed in mid-to-high end surveillance markets such as: traffic management, city surveillance, retail, transportation, logistics and manufacturing. Its four embedded video content analytic functions are able to detect camera tampering, identify moved objects, removed objects and abandoned objects. Sound detection allows the camera to detect changes in volume. Detection functions can be set to activate recording and uploading to a server or email notification. Advanced connectivityOnboard two-way (full-duplex) audio allows easy hook up of a microphone and active speaker. So, live audio can be received from the camera site and a warning message can be relayed to potential intruders. ONVIF CompatibilityThe device supports the communication protocol ONVIF and is compatible with a range of 3rd party ONVIF-compliant equipment. Versatile installation optionsThe VB-M40B is easy to install, on a ceiling or upright and is very efficient in terms of power usage. The camera supports power over Ethernet and conventional power. VB-M40 can be mounted in any indoor and outdoor optional protective dome housings can be selected: a smoked dome for discreet disguising of camera angle; a clear dome for maximum performance in low light conditions. Admin Tools are in-built, requiring no installation, and a built-in SD Memory Card saves back-up security logs, improving reliability.Add to Compare
Canon Europe, world leader in imaging solutions has added four new Full HD resolution cameras to its product range; the VB-H41, VB-H610VE, VB-H610D and VB-H710F. The cameras Incorporate Canon’s high-end lens design and image processing technology. The new cameras benefit from Canon’s 70 year heritage in lens design; all incorporate specially designed lenses with multiple double-sided aspherical elements to produce maximum optical performance. All the new cameras deliver outstanding zoom and wide angle performance as the lenses use glass with a high refractive index. Low light performance is enhanced with the use of an original Canon lens coating which reduces image ‘ghosting’ in IR light situations, so users can be confident that security can be maintained whatever the circumstances. The four new HD network cameras also deliver the high image quality expected from Canon as they incorporate the same DIGIC DV III image processors used in Canon’s state of the art Cinema EOS C300 broadcast system and XF300/XF305 professional camcorders. Canon’s DIGIC NET II network processor chip delivers multiple HD video streams so that sites with multiple viewing locations can be monitored effectively. Julian Rutland, Visual Communication Products and Solutions Director, Canon Europe said: “Our new Full HD range of network cameras combines Canon’s high quality image processing technology and heritage in lens design with our expertise in networking. The addition of these products is a significant step forward as we look to grow our business in the network camera space.” The VB-H41 camera delivers 20x optical zoom while the VB-H610VE, VB-H610D and VB-H710F offer 3x optical zoom. A 112 degree angle-of-view across the VB-H610VE, VB-H610D and VB-H710F means that operators are able to take in a wide field of view for maximum coverage. The four new cameras offer best in class HD performance even in low-light conditions so can be used to clearly monitor even the darkest environments. The VB-H41 offers low light performance down to 0.4lux for colour and 0.2 lux for black-and-white while the VB-H610VE, VB-H610D and VB-H710F provide detail in conditions down to 0.3lux in colour and 0.15lux in black and white. Similarly, Canon’s Smart Shade Control function delivers visible images in difficult lighting conditions by compensating for dark image areas while keeping bright sections, so internal areas can be clearly and effectively monitored even when the image is impacted by external bright light from windows. As well as high image quality, Canon is dedicated to helping system integrators maintain security with easy to use, high performance analytics built into all of the new devices. A suite of advanced analytics means that system integrators can set their chosen camera to detect sound, objects being removed (or left behind), areas of motion or camera tampering. Also, Passing Detection can be configured to detect when someone passes a defined line across the image in a specific direction. Combining multiple lines enables the camera to monitor for people entering a secure site without detecting when staff leave the same area. All of the new devices save system integrators time and money as they can be remotely configured by a single operator. As a result, tasks that would usually take an hour can now take five minutes of one engineer’s time. The VB-H610VE, VB-H610D include Canon’s PRTZ function, so that individual engineers can remotely configure the camera’s angle, zoom and focus for easy adjustment during commissioning or system re-configuration, thereby reducing staff costs, time and any special arrangements that would need to be make re-configuration possible.Add to Compare
Canon’s XU-80 is a Pan Tilt Zoom camera offering exceptional picture quality from long distances The XU-80 produces high quality Full HD (1920×1080) video, using a single 1/3 inch CMOS imaging sensor with 2.1 Megapixels. Together with a wide pan and tilt range and a Canon 20x optical HD zoom, the IP55-rated camera will help security teams to closely monitor large areas, even in challenging environments.Benefiting from Canon’s 70-year heritage at the forefront of lens design, the XU-80 includes 20x optical HD zoom, helping security teams to closely monitor large areas. It has a wide pan and tilt range (180 degrees to the left and right, 220 degrees up and 40 degrees downwards) and produces high quality Full HD (1920×1080) video, using a single 1/3 inch single-CMOS image sensor with 2.1 Megapixels. Its compact size, precision control and waterproof and dustproof design make it a versatile indoor/outdoor camera system.The Canon XU-80’s waterproof and dustproof design has an IP55 enclosure rating. It can be installed in challenging locations without any additional housing and is not affected by environmental conditions. The XU-80W version of the camera is for permanent outdoor locations and comes with a servo ND filter and wiper unit. This version can also be equipped with a washer as an option.Add to Compare
The VB-C60 PTZ network camera boasts an industry-leading 40x zoom lens and Image Stabilizer. Progressive scan, advanced motion detection and two-way audio make it ideal for premium surveillance uses. Industry-leading optics The VB-C60 utilizes the most advanced Canon lens ever fitted to a network camera. Its industry-leading 40x zoom with Auto Focus and Image Stabilizer deliver steady, sharp images, and combined with the 340° pan and 115° tilt mechanism make the VB-C60 suitable for surveillance in both open and confined spaces. The camera excels in low-light conditions, with Auto Day/Night switching making it possible to capture full colour images as low as 0.7 lux - or 0.2 lux in monochrome Night Mode. Progressive scan video also helps cut back on noise, so even fast-moving subjects are captured smoothly. High-quality MPEG4 and Motion JPEG video Supporting both MPEG4 and Motion JPEG formats, the camera is capable of delivering high-quality video up to 30 fps at VGA resolution (640 x 480). Transmitted footage can be distributed to a wide audience of up to 30 simultaneous clients (or up to 10 clients using MPEG4). It's also possible to install a small-scale video surveillance system using the bundled VK-Lite software, enabling users to control the recording and playback of up to four cameras from their computer. Advanced connectivity Onboard two-way (full-duplex) audio means you can easily hook up a microphone and active speaker, so live audio can be received from the camera site and a warning message relayed to potential intruders. It's also simple to integrate the camera into your existing security setup, with built-in terminals for connecting external devices like sensors and alarms. Onboard intelligence The VB-C60 uses advanced motion detection and auto tracking to support event-based notification. Once the camera has detected a moving subject - or a connected alarm has been triggered - it can be set to send a recorded image of the event or an email notification to users so they know as soon as there is any potential threat. Versatile installation options The VB-C60 is easy to install either on the ceiling or in an upright position, and Power over Ethernet (PoE) support means a single LAN cable can both power the camera while also transferring data from it. Two optional dome housings are available for added protection and more discreet monitoring: a smoked dome for disguising the camera angle, and a clear dome for when maximum performance in low-light conditions is required.Add to Compare
1/4 inch, Colour / Monochrome, 320 resolution, 0.0 lux, Auto Iris, 100 - 240 VAC, 13 VDC, PoE, Network, 3.5 ~ 91, 768 x 576, 25 fps, 1/50 ~ 1/120, PAL, M-JPEG, JPEG, RJ-45 Ethernet, 10/100TX, TCP/IP, HTTP, DHCP, FTP, WebView (Canon), 12.95 W, 480, 66 x 97 x 134, 0 ~ +40, 20 ~ 85Add to Compare
Canon Europe is a subsidiary of Canon Inc of Japan, a world-leading provider of Imaging Technology Solutions. Looking for excellence in Network Video Solutions? You've come to the right source. From the incomparable Canon lens to Canon's high-accuracy colour management system, Canon optics are best-of-breed. The image of perfection. Choose Canon Network Video Solutions and witness the difference yourself. Canon Europe joins IFSEC 2010 with the Canon Network Camera Solutions range designed to address key market requirements for video surveillance or business intelligence. Canon Network Camera solutions provide best in class network video surveillance. At the heart of each Canon Network Video Solution lies a powerful Canon camera. These models represent technology's finest for commercial and industrial applications. And with world-class Canon engineering and design, form and function come together to achieve unparalleled results. Highlights of the Canon stand at IFSEC include: Sharing Canon Video Surveillance Vision and Strategy Live product demonstrations Canon Retail Intelligence and Video Surveillance Solutions combined with industry leading analytics from ObjectVideo Opportunity to discuss your business needs with the Canon EMEA video surveillance team Please join us to experience a live demonstration of the exceptional image quality of Canon network cameras. You can arrange a meeting or demonstration by contacting the Canon IFSEC team at email@example.comAdd to Compare
Browse Network / IP Cameras
IP camera products updated recently
Rodrigue Zbinden, CEO at Morphean, discusses the business benefits from merging video surveillance and access control technologies as demand for ACaaS grows. The big question facing businesses today is how they will use the data that they possess to unlock new forms of value using emerging technologies such as the cloud, predictive analytics and artificial intelligence. Some data is better utilized than others: financial services were quick to recognize the competitive advantages in exploiting technology to improve customer service, detect fraud and improve risk assessment. In the world of physical security, however, we’re only just beginning to understand the potential of the data that our systems gather as a part of their core function. Benefits of ‘Integrated access control’ The first thing to look for is how multiple sources of data can be used to improve physical security functionsWhat many businesses have yet to realize is that many emerging technologies come into their own when used across multiple sources of data. In physical security, for example, we’re moving from discussions about access control and CCTV as siloed functions, to platforms that combine information for analysis from any source, and applying machine learning algorithms to deliver intelligent insights back to the business. ‘Integrated access control’ then looks not just to images or building management, but to images, building management, HR databases and calendar information, all at the same time. And some of the benefits are only now starting to become clear. The first thing to look for, of course, is how multiple sources of data can be used to improve physical security functions. For example, by combining traditional access control data, such as when a swipe card is used, with a video processing platform capable of facial recognition, a second factor of authentication is provided without the need to install separate biometric sensors. CCTV cameras are already deployed in most sensitive areas, so if a card doesn’t match the user based on HR records, staff can be quickly alerted. Making the tools cost-Effective In a similar vein, if an access card is used by an employee, who is supposed to be on holiday according to the HR record, then video data can be used to ensure the individual’s identity and that the card has not been stolen – all before a human operator becomes involved. This is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business functionThese capabilities are not new. What is, however, is the way in which cloud-based computing platforms for security analytics, which absorb information from IP-connected cameras, make the tools much more cost effective, accessible and easier to manage than traditional on-site server applications. In turn, this is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business function. With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments, greater flexibility to scale up and down, and shifting the onus of cybersecurity and firmware updates to the vendor. Simple installation and removal of endpoints What’s more, because modern video and access control systems transmit data via the IP network, installation and removal of endpoints are simple, requiring nothing more than PoE and Wi-Fi. Of all the advantages of the ‘as a service’ model, it’s the rich data acquired from ACaaS that makes it so valuable, and capable of delivering business benefits beyond physical security. Managers are constantly looking for better quality of information to inform decision making, and integrated access control systems know more about operations than you might think. Integrating lighting systems with video feeds and access control creates the ability to control the lightsRight now, many firms are experimenting with ways to find efficiencies and reduce costs. For example, lights that automatically turn off to save energy are common in offices today, but can be a distraction if employees have to constantly move around to trigger motion detectors. Integrating lighting systems with video feeds and access control creates the ability to control the lights depending on exactly who is in the room and where they are sitting. Tracking the movement of employees Camera data has been used in retail to track the movement of customers in stores, helping managers to optimize displays and position stocks. The same technology can be used to map out how employees move around a workspace, finding out where productivity gains can be made by moving furniture around or how many desks should be provisioned. Other potential uses of the same data could be to look for correlations between staff movement – say to a store room – and sales spikes, to better predict stock ordering. What makes ACaaS truly exciting is it is still a very new field, and we’re only just scratching the surface of the number of ways that it can be used to create new sources of value. As smart buildings and smart city technology evolves, more and more open systems will become available, offering more ways to combine, analyze and draw insights from data. Within a few years, it will become the rule, rather than the exception, and only grow in utility as it does.
With the recent news headlines about store closures and the collapse of well-known chains, alongside clear adjustments in business strategy amongst established high street favorites, there is no denying that the UK retail industry is under huge pressure. A recent report suggests growing issues are leading some retailers to increase risk-taking in the supply chain. But here, Steve Bumphrey, Traka UK Sales Director, looks at ways to help retailers embrace the storm, including paying attention to security, management processes and efficient customer focus. Challenges plaguing retail industry It’s been an awful year to date for UK retail if you believe the cacophony of negative headlines about the health of the UK economy and the confidence levels of the UK consumer. The sector is facing huge challenges in dealing with the evolution in on-line and smart mobile retailing The sector is undoubtedly facing huge challenges in dealing with the evolution in on-line and smart mobile retailing. Further concerns include an unwillingness of policymakers to address the changing retail environment and how business rates and general business taxation and regulation is making a difficult situation worse. Supply Chain Risk Report According to the latest Global Supply Chain Risk Report, published by Cranfield School of Management and Dan & Badstreet, those under pressure, are now facing increased exposure to risk if they are forced to cut costs in their supply chain. The report cites data for the retail sector that shows increased levels of risk-taking since Q4 2018, with retailers reporting high levels of dependency on suppliers and indicating a propensity to off-shore to low-cost, high-risk countries where suppliers are more likely to be financially unstable. In-Store technology revolution The underlying evolution of technology taking hold of the retail industry and consequential changing consumer behavior is what is really forcing the industry to step up and act. This is not only in the shift to online and smart mobile purchases, but also with the increased use of technology in store. Self-scanning and checkouts In a bid to enhance the physical shop experience, especially in supermarket outlets across the UK, retailers are increasingly giving customers autonomy with self-scanners and checkouts and need to be able to trust them to ensure an honest transaction. And for the shoppers, this dependency on technology and not human interaction to complete a shop means scanners must be instantly available and ready for use. Many different underlying competing challenges impact the retail industry Compensators At the recent British Retail Consortium’s ‘Charting the Future’ conference, looking at retail crime and security, Dr Emmeline Taylor, a criminologist at the City University of London identified in self -service shops, several new types of ‘offenders’ such as so-called ‘compensators’ including the atypical ‘frustrated consumer’ who, “fully intended to pay but were unable to scan an item properly”, adding to the security challenge. There are clearly many different underlying competing challenges impacting the retail industry. Arguably, the increase in technology and autonomous shopping, where less staff are present (or staff cuts planned) throws up more vulnerabilities, such as the opportunity for store theft. Use of body cameras Staff needs emerging technology such as body cameras to act as a deterrent to crime and keep employees safe Furthermore, staff may need greater use of emerging technology such as body cameras to act as a deterrent to crime and help keep employees safe. In essence, prevention is better than cure, and it’s certainly cheaper. Whether combating crime physically or online, or looking to find ways to counter the high street trends, working together, sharing information and taking a more holistic approach will help the development of a shared language between retailers. Retail Banking It is also here where common approaches can help to deliver on efficiencies, in time, resource and budget that can serve to operate right through the supply chain, and minimize, or even negate the need to take any risks. It can even serve to enhance the customer experience, increasing confidence in the shopping environment. Of course, when discussing the high street, it is not just the department stores and chains that are feeling the impact. Well known banks are also having to redefine their priorities and role on the high street, with customers (especially younger generations) demanding a more efficient service than ever before. Well known banks are also having to redefine their priorities and role on the high street Asset protection Leading the way is Nationwide, globally renowned building society, which prides itself on being one of the largest savings providers and mortgages provider in the UK, promoting itself as running purely for the benefit of its customers, or ‘members.’ Richard Newland, Director of Branch & Workplace Transformation at Nationwide said, “Even more than getting a good ‘deal’ from a building society, the quality of our welcome, or our renowned level of service, we make sure our members feel safe with us, enough to trust us with their greatest assets. We are doing everything we can to evolve our business and focus our efforts on providing the best and most secure services that people value.” Key management systems Traka has supported Nationwide with the introduction of dedicated key management systems So committed to its branch network, it has pledged to its 15 million members that every town and city with a Nationwide branch, will still have one for at least the next two years. A bold statement in today’s climate. Traka has supported Nationwide with the introduction of dedicated key management systems, moving its branch network into a more digital system. Keys no longer need to leave site and the audit trail capability has helped to remove the manual paper recording, allowing status of keys to be established instantly, at any time. Changes in retail market This example, together with Traka’s portfolio of high street brands and globally renowned department stores that cannot be named for security reasons, demonstrates the need for retailers to embrace the need for change, both from a product offering and operational running perspective to achieve aspirations of resonating with customers. They also prove the opportunities for success, in an unquestionable difficult market environment. If retailers can listen to customers and respond accordingly, taking into consideration staff safety and security, alongside an ability to respond quickly to personalized enquiries and expectations. This way, perhaps, the current environment can be seen as an opportunity to innovate and embrace technology to form the high street of the future.
Critical infrastructure facilities that must secure large areas with extended outer boundary and numerous entry points, present a particularly difficult challenge when it comes to perimeter protection. As such, true end-to-end perimeter protection calls for the utilization of a sophisticated, multi-layered solution that is capable of defending against anticipated threats. Integrated systems that incorporate thermal imaging, visible cameras, radar and strong command and control software are crucial for covering the various potential areas of attacks. Let’s look at these technologies and the five key functions they enable to achieve an end-to-end solution that provides intrusion detection, assessment and defense for the perimeter. 1. Threat Recognition The first step in effectively defending against a threat is recognizing that it’s there. By combining state-of-the-art intrusion detection technologies, facilities can arm themselves with a head start against possible intruders. An exceptionally important aspect of effective perimeter protection is the ability to conduct 24-hour surveillance, regardless of weather conditions, environmental settings, or time of day. Visible cameras do not perform as well in low light scenarios and inclement weather conditions. However, thermal imaging cameras can provide constant protection against potential intruders, regardless of visual limitations, light source or many environmental factors. In fact, facilities such as power stations located near bodies of water can use thermal cameras to create what is known as a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool Critical infrastructure applications require not only continuous video surveillance and monitoring, but also a solution that yields highly reliable intrusion detection, with fewer false alarms. This need makes advanced video analytics a must for any adequate surveillance system. Features like dynamic event detection and simplified data presentation are game changing in supporting accurate intrusion analysis and facilitating a proactive response. Advanced analytics will provide multiple automated alarm notification options, including email, edge image storage, digital outputs or video management software (VMS) alarms. Incorporating high quality, unique and adaptive analytics can virtually eliminate false alarms, allowing security personnel to respond more efficiently and effectively, while also lowering overall cost for the end user. While surveillance technologies such as radar, thermal imaging and visible cameras, or video analytics work well on their own, utilizing all of these options together provides an advanced perimeter detection system. For example, ground surveillance radar can detect possible threats beyond the fence line as they approach and send a signal to pan-tilt-zoom (PTZ) cameras, triggering them to slew to a specific location. From there, embedded analytics and visible cameras can further identify objects, notify authorized staff, and collect additional evidence through facial recognition or high-quality photos. 2. Automatic Response Systems Once an intrusion attempt is discovered, it is important to act fast. Organizing a response system that can initiate actions based on GPS location data, such as the slewing of PTZ cameras, automated intruder tracking or activated lighting sensors, greatly increases staff’s situational awareness while easing their workload. For instance, thermal imagers deployed in conjunction with video analytics can be used to generate an initial alarm event, which can then trigger a sequence of other security equipment and notifications for personnel to eventually respond to. Having all of this in place essentially lays the entire situation out in a way that allows responders to accurately understand and evaluate a scene. Power stations located near bodies of water can use thermal cameras to create a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall 3. Deterring Suspicious Activity After the designated auto-response mechanisms have activated and done their job, it is time for responders to acknowledge and assess the situation. From here, authorized personnel can take the next appropriate step toward defending against and delaying the threat. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool. Often, control room operators can diffuse a situation by speaking over an intercom, telling the trespasser that they are being watched and that the authorities have been notified. This tactic, known as ‘talk down’, also allows officers to view the intruder’s reaction to their commands and evaluate what they feel the best next step is. If individuals do not respond in a desired manner, it may be time to take more serious action and dispatch a patrolman to the area. 4. Delay, Defend, Dispatch And Handle The possible danger has been identified, recognized and evaluated. Now it is time to effectively defend against current attacks and slow down both cyber and physical perpetrators’ prospective efforts. Through the use of a well-designed, open platform VMS, security monitors can manage edge devices and other complementary intrusion detection and response technologies, including acoustic sensors, video analytics, access control and radio dispatch. A robust VMS also enables operators to control functions such as video replay, geographical information systems tracking, email alerts and hand-off to law enforcement. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level The primary purpose of the delay facet of the overall perimeter protection strategy is to stall an attempted intrusion long enough for responders to act. Access control systems play a key role in realizing this objective. When a security officer sees a non-compliant, suspicious individual on the camera feed, the officer can lock all possible exits to trap them in one area all through the VMS. 5. Intelligence: Collect Evidence And Debrief More data and intelligence collected from an event equals more crucial evidence for crime resolution and valuable insight for protecting against future incidents. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level. One innovative resource that has become available is a live streaming application that can be uploaded to smart phones and used for off-site surveillance. This app gives personnel the power to follow intruders with live video anywhere and allows operators to monitor alarm video in real-time. Geographic Information System (GIS) maps are computer systems utilized for capturing, storing, reviewing, and displaying location related data. Capable of displaying various types of data on one map, this system enables users to see, analyze, easily and efficiently. Multi-sensor cameras, possessing both visible and thermal capabilities, provide high-contrast imaging for superb analytic detection (in any light) and High Definition video for evidence such as facial ID or license plate capture. Integrating these two, usually separated, camera types into one helps to fill any gaps that either may normally have. Still, in order to capture and store all of this valuable information and more, a robust, VMS is required. Recorded video, still images and audio clips serve as valuable evidence in the event that a trial must take place to press charges. Control room operators can use data collection tools within their VMS to safely transfer video evidence from the field to the courtroom with just a few clicks of their mouse. More advanced video management systems can go a step further and package this data with other pertinent evidence to create a comprehensive report to help ensure conviction.
Canon Solutions America, a wholly owned subsidiary of Canon U.S.A., Inc., hosted a special event at MetLife Stadium in New York on August 22 as an extension of its Security Roadshow program. Linking business leaders to subject matter experts in all facets of security, this event set out to provide insight into a comprehensive process – one that comprises strategies and technologies to help businesses develop a more proactive, in-depth approach to the many types of security risks they face. Multi-Dimensional approach This layered security approach encompasses device security, print security, and document security Experts from Canon Solutions America and several of its vendor partners took attendees on a journey through real world demonstrations of Canon Solutions America’s Five Pillars of Security. This layered security approach encompasses device security, print security, document security, information security, and cybersecurity, outlining a business model that can be easily and efficiently implemented. "There is no simple solution to cybersecurity. It takes the multi-dimensional approach that Canon Solutions America has set out in its 5 Pillars of Security and security professionals coming together as a community—as we have done today—to share ideas, knowledge, and experience," said Rob Sloan, Research Director at The Wall Street Journal's WSJ Pro. Improving network security Security solutions from Canon Solutions America partners Therefore, Barracuda, Vera, and Agile Cybersecurity Solutions (ACS) were showcased in presentations. A lively question-and-answer session followed, with speakers providing an open, interactive forum that allowed for a deeper dive into the topics of the day. “It was great to meet with peers and learn more about what other businesses are facing,” said Adam Rabe, IT Support for Langan. “I gained new insight into how to improve network security and ensure against threats. Thanks, Canon Solutions America, for bringing to light these opportunities.” In addition to the engaging presentations and opportunities to interact face-to-face with security experts, guests enjoyed a guided tour of MetLife Stadium and had the opportunity to meet Wayne Chrebet, former wide receiver who played 11 seasons for the New York Jets. Employing nimble strategies Canon Solutions America’s parent company, recently announced a new collaboration with McAfee With a long career avoiding, outmaneuvring, or simply outrunning obstacles, Chrebet was a perfect fit to show how being aware of potential threats in your environment, and employing nimble strategies along with teamwork, will help you come out a winner. Further illustrating the company’s commitment to security, Canon U.S.A., Inc., Canon Solutions America’s parent company, recently announced a new collaboration with McAfee, the device-to-cloud cybersecurity company. The companies have joined forces to provide enhanced embedded protection against malware execution and tampering of firmware and applications for a sometimes-overlooked endpoint—multifunction printers (MFPs). Standard security feature Through the partnership, Canon customers will now receive McAfee® Embedded Control as an additional standard security feature on third generation imageRUNNER ADVANCE 3rd edition MFPs once enabled. Peter Kowalczuk, President of Canon Solutions America, said, “Security is a serious concern in today’s connected world, and it affects us all. We at Canon Solutions America are committed to working closely with our customers to help them protect their businesses, their intellectual property, and the data of their employees and customers. Technology advances quickly and cyberattacks are becoming increasingly sophisticated. We are here to help guide organizations through these challenges.”
Consolidation persisted in the physical security industry in 2018, and big companies such as Motorola, Canon and UTC continued to make moves. Also among the mergers and acquisitions (M&A) news in 2018 was a high-profile bankruptcy (that ended well), continuing consolidation in the integrator market, and the creation of a new entity called “LenelS2.” Here’s a look at the Top 10 M&A stories in 2018: 1. Motorola Acquires Avigilon Motorola Solutions announced in February that it had entered into a definitive agreement to acquire video surveillance provider Avigilon in an all-cash transaction that enhances Motorola Solutions’ portfolio of mission-critical communications technologies. Avigilon products are used by a range of commercial and government customers including critical infrastructure, airports, government facilities, public venues, healthcare centers and retail. The company holds more than 750 U.S. and international patents. 2. UTC Climate, Control & Security Buys S2 Security UTC Climate, Controls & Security agreed in September to acquire S2 Security, a developer of unified security and video management solutions. UTC subsequently combined S2 with its Lenel brand to create LenelS2, “a global leader in advanced access control systems and services” with “complementary strengths.” 3. Costar Technologies Acquires Arecont Vision After Bankruptcy Arecont Vision, the provider of IP-based megapixel camera and video surveillance solutions, announced in July that the acquisition by Costar Technologies, Inc. of its assets had been approved by the bankruptcy court. After the closing of the sale, the company began operating as Arecont Vision Costar, LLC and is part of Costar, a U.S. corporation that designs, develops, manufactures, and distributes a range of products for the video surveillance and machine vision markets. 4. Allegion Acquires Access Control Company ISONAS Allegion plc, a security products and solutions provider, agreed in June to acquire ISONAS through one of its subsidiaries. ISONAS’ edge-computing technology provides access control solutions for non-residential markets. ISONAS' devices – like its integrated reader-controllers – utilize power over ethernet, making them easy to install and cost effective as they utilize existing customer infrastructures. The company is based in Boulder, Colo. 5. HID Buys Crossmatch for Biometrics HID Global announced that it had acquired Crossmatch, a provider of biometric identity management and secure authentication solutions, from Francisco Partners. Crossmatch’s portfolio of products includes biometric identity management hardware and software that complement HID’s broad portfolio of trusted identity products and services. 6. BriefCam Announces Acquisition by Canon BriefCam, a global provider of video synopsis and deep learning solutions, announced its acquisition in May by Canon Inc., a global digital imaging solutions company. The addition of BriefCam to Canon’s network video solutions products portfolio complements the Canon Group’s previous acquisitions of Axis Communications and Milestone Systems. 7. Allied Universal Acquires U.S. Security Associates Allied Universal, a security and facility services company, finalized its acquisition of U.S. Security Associates (USSA) in October, further building on its position in the security services industry. This acquisition includes Andrews International (including its Government Services Division and Consulting and Investigations and International Division) and Staff Pro. 8. Johnson Controls Acquires Smartvue Corp. Johnson Controls announced in April that it had acquired Smartvue, a global IoT and video provider that empowers cloud video surveillance and IoT video services. The addition of the Smartvue cloud-based video platform will enhance Johnson Controls’ offering of an end-to-end, smart cloud-based solution that can provide superior business data and intelligence to customers and added value to partners. 9. ADT Acquires Red Hawk Fire & Security (and Others) ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., was the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so. 10. Convergint Technologies Continues to Acquire Convergint Technologies announced in August the acquisition of New Jersey-based Access Control Technologies (ACT), bringing further electronic security systems experience to Convergint's service capabilities. Convergint has strategically grown its service footprint across the United States, Canada, Europe and Asia Pacific through strong organic growth and the completion of 18 acquisitions since early 2016. And it continues: Convergint announced acquisition of SI Technologies, Albany, N.Y., in November and Firstline Security Integration (FSI), Anaheim, Calif., in December. (And Convergint itself was acquired in February by private equity group Ares Management.)
PSA, a systems integrator cooperative, is excited to announce a new vendor partnership with Canon Financial Services, Inc., (CFS) a wholly owned subsidiary of Canon U.S.A., Inc. CFS supports PSA systems integrators with innovative B2B lease financing solutions and programs designed to sell products and services in the network video surveillance market. “We are excited to formally join PSA as a Business Solutions Provider,” says Larry Brittingham, senior manager, sales support, from CFS. “Our partnership with PSA will provide its systems integrators and customers with security project financing, managed services, and reseller programs as we set the course to reach more security integrators.” CFS is a true financing partner that delivers competitive lease pricing, efficient processes, and special promotionsFinancing For Security Systems Projects Canon Financial Services offers end-user financing through term leases and financing arrangements for security systems projects including hardware, software, and professional services such as installation and training. With a successful track record of offering financing services through its dealer network, CFS is a true financing partner that delivers competitive lease pricing, efficient processes, and special promotions. Now, through PSA’s partnership with CFS, members can take advantage of these offerings in an effort to help expand their businesses. Reducing Operating Costs “We are extremely happy for the opportunity to add Canon Financial Services to our Business Solutions Provider program” said Anthony Berticelli, PSA director of education. “We’re excited to introduce another security equipment financing tool to our solution set, particularly one that is backed by one of the world’s most admired companies – Canon.” The PSA Business Solutions Provider program is a suite of value-added resources and services to help enhance integrators’ business models, reduce operating costs and keep them competitive in the marketplace.
Physical Security Supports A Future-Proof Cyber Security StrategyDownload
Combining Systems Intelligence And Human Insight For Superior SecurityDownload
3 Ways To Increase Workplace Safety And Resource EfficiencyDownload
- March Networks Provides Video Surveillance Solutions At Leon Medical Centers
- Dahua Technology’s Surveillance System Secures Yarmouth Harbor From Thefts
- Airbus’ STYRIS, Vessel Traffic Services Upgrades The Port Of Sydney
- 360 Vision Technology’s Invictus Hybrid PTZ Cameras Deployed At Security Centers International’s Mobile Advanced Safety Tower (MAST)