Canon Network / IP Cameras(7)
Best in class opticsCanon's first megapixel network camera offers 20x zoom and a 55.4° horizontal viewing angle within the smallest, most discreet body in its class. VB-M40 draws together Canon's DIGIC NET and lens technology assets to deliver its most advanced network camera. Canon's DIGIC NET allows VB-M40 to stream video at 1280x960 resolution at 30 frames per second in H.264, a compression format combining high quality and high compression rates. Its industry-leading 20x zoom Auto Focus lens, combined with the 340° pan and 100° tilt mechanism, delivers precise, high-resolution images. The VB-M40 excels in low light conditions with a low-light performance in colour at 0.4 lux and B/W at 0.01 lux. In addition the IR cut filter Day/Night Function and Smart Shade Control ensure best image quality is delivered in any situation.Intelligent monitoring applicationsVB-M40 is suitable to be deployed in mid-to-high end surveillance markets such as: traffic management, city surveillance, retail, transportation, logistics and manufacturing. Its four embedded video content analytic functions are able to detect camera tampering, identify moved objects, removed objects and abandoned objects. Sound detection allows the camera to detect changes in volume. Detection functions can be set to activate recording and uploading to a server or email notification. Advanced connectivityOnboard two-way (full-duplex) audio allows easy hook up of a microphone and active speaker. So, live audio can be received from the camera site and a warning message can be relayed to potential intruders. ONVIF CompatibilityThe device supports the communication protocol ONVIF and is compatible with a range of 3rd party ONVIF-compliant equipment. Versatile installation optionsThe VB-M40B is easy to install, on a ceiling or upright and is very efficient in terms of power usage. The camera supports power over Ethernet and conventional power. VB-M40 can be mounted in any indoor and outdoor optional protective dome housings can be selected: a smoked dome for discreet disguising of camera angle; a clear dome for maximum performance in low light conditions. Admin Tools are in-built, requiring no installation, and a built-in SD Memory Card saves back-up security logs, improving reliability.Add to Compare
Canon’s XU-80 is a Pan Tilt Zoom camera offering exceptional picture quality from long distances The XU-80 produces high quality Full HD (1920×1080) video, using a single 1/3 inch CMOS imaging sensor with 2.1 Megapixels. Together with a wide pan and tilt range and a Canon 20x optical HD zoom, the IP55-rated camera will help security teams to closely monitor large areas, even in challenging environments.Benefiting from Canon’s 70-year heritage at the forefront of lens design, the XU-80 includes 20x optical HD zoom, helping security teams to closely monitor large areas. It has a wide pan and tilt range (180 degrees to the left and right, 220 degrees up and 40 degrees downwards) and produces high quality Full HD (1920×1080) video, using a single 1/3 inch single-CMOS image sensor with 2.1 Megapixels. Its compact size, precision control and waterproof and dustproof design make it a versatile indoor/outdoor camera system.The Canon XU-80’s waterproof and dustproof design has an IP55 enclosure rating. It can be installed in challenging locations without any additional housing and is not affected by environmental conditions. The XU-80W version of the camera is for permanent outdoor locations and comes with a servo ND filter and wiper unit. This version can also be equipped with a washer as an option.Add to Compare
Canon Europe, world leader in imaging solutions has added four new Full HD resolution cameras to its product range; the VB-H41, VB-H610VE, VB-H610D and VB-H710F. The cameras Incorporate Canon’s high-end lens design and image processing technology. The new cameras benefit from Canon’s 70 year heritage in lens design; all incorporate specially designed lenses with multiple double-sided aspherical elements to produce maximum optical performance. All the new cameras deliver outstanding zoom and wide angle performance as the lenses use glass with a high refractive index. Low light performance is enhanced with the use of an original Canon lens coating which reduces image ‘ghosting’ in IR light situations, so users can be confident that security can be maintained whatever the circumstances. The four new HD network cameras also deliver the high image quality expected from Canon as they incorporate the same DIGIC DV III image processors used in Canon’s state of the art Cinema EOS C300 broadcast system and XF300/XF305 professional camcorders. Canon’s DIGIC NET II network processor chip delivers multiple HD video streams so that sites with multiple viewing locations can be monitored effectively. Julian Rutland, Visual Communication Products and Solutions Director, Canon Europe said: “Our new Full HD range of network cameras combines Canon’s high quality image processing technology and heritage in lens design with our expertise in networking. The addition of these products is a significant step forward as we look to grow our business in the network camera space.” The VB-H41 camera delivers 20x optical zoom while the VB-H610VE, VB-H610D and VB-H710F offer 3x optical zoom. A 112 degree angle-of-view across the VB-H610VE, VB-H610D and VB-H710F means that operators are able to take in a wide field of view for maximum coverage. The four new cameras offer best in class HD performance even in low-light conditions so can be used to clearly monitor even the darkest environments. The VB-H41 offers low light performance down to 0.4lux for colour and 0.2 lux for black-and-white while the VB-H610VE, VB-H610D and VB-H710F provide detail in conditions down to 0.3lux in colour and 0.15lux in black and white. Similarly, Canon’s Smart Shade Control function delivers visible images in difficult lighting conditions by compensating for dark image areas while keeping bright sections, so internal areas can be clearly and effectively monitored even when the image is impacted by external bright light from windows. As well as high image quality, Canon is dedicated to helping system integrators maintain security with easy to use, high performance analytics built into all of the new devices. A suite of advanced analytics means that system integrators can set their chosen camera to detect sound, objects being removed (or left behind), areas of motion or camera tampering. Also, Passing Detection can be configured to detect when someone passes a defined line across the image in a specific direction. Combining multiple lines enables the camera to monitor for people entering a secure site without detecting when staff leave the same area. All of the new devices save system integrators time and money as they can be remotely configured by a single operator. As a result, tasks that would usually take an hour can now take five minutes of one engineer’s time. The VB-H610VE, VB-H610D include Canon’s PRTZ function, so that individual engineers can remotely configure the camera’s angle, zoom and focus for easy adjustment during commissioning or system re-configuration, thereby reducing staff costs, time and any special arrangements that would need to be make re-configuration possible.Add to Compare
The VB-C60 PTZ network camera boasts an industry-leading 40x zoom lens and Image Stabilizer. Progressive scan, advanced motion detection and two-way audio make it ideal for premium surveillance uses. Industry-leading optics The VB-C60 utilizes the most advanced Canon lens ever fitted to a network camera. Its industry-leading 40x zoom with Auto Focus and Image Stabilizer deliver steady, sharp images, and combined with the 340° pan and 115° tilt mechanism make the VB-C60 suitable for surveillance in both open and confined spaces. The camera excels in low-light conditions, with Auto Day/Night switching making it possible to capture full colour images as low as 0.7 lux - or 0.2 lux in monochrome Night Mode. Progressive scan video also helps cut back on noise, so even fast-moving subjects are captured smoothly. High-quality MPEG4 and Motion JPEG video Supporting both MPEG4 and Motion JPEG formats, the camera is capable of delivering high-quality video up to 30 fps at VGA resolution (640 x 480). Transmitted footage can be distributed to a wide audience of up to 30 simultaneous clients (or up to 10 clients using MPEG4). It's also possible to install a small-scale video surveillance system using the bundled VK-Lite software, enabling users to control the recording and playback of up to four cameras from their computer. Advanced connectivity Onboard two-way (full-duplex) audio means you can easily hook up a microphone and active speaker, so live audio can be received from the camera site and a warning message relayed to potential intruders. It's also simple to integrate the camera into your existing security setup, with built-in terminals for connecting external devices like sensors and alarms. Onboard intelligence The VB-C60 uses advanced motion detection and auto tracking to support event-based notification. Once the camera has detected a moving subject - or a connected alarm has been triggered - it can be set to send a recorded image of the event or an email notification to users so they know as soon as there is any potential threat. Versatile installation options The VB-C60 is easy to install either on the ceiling or in an upright position, and Power over Ethernet (PoE) support means a single LAN cable can both power the camera while also transferring data from it. Two optional dome housings are available for added protection and more discreet monitoring: a smoked dome for disguising the camera angle, and a clear dome for when maximum performance in low-light conditions is required.Add to Compare
1/4 inch, Colour / Monochrome, 320 resolution, Network, 0.0 lux, Auto Iris, 100 - 240 VAC, 13 VDC, PoE, 3.5 ~ 91, 768 x 576, 25 fps, 1/50 ~ 1/120, PAL, M-JPEG, JPEG, RJ-45 Ethernet, 10/100TX, TCP/IP, HTTP, DHCP, FTP, WebView (Canon), 12.95 W, 66 x 97 x 134, 480, 0 ~ +40, 20 ~ 85Add to Compare
Canon Europe is a subsidiary of Canon Inc of Japan, a world-leading provider of Imaging Technology Solutions. Looking for excellence in Network Video Solutions? You've come to the right source. From the incomparable Canon lens to Canon's high-accuracy colour management system, Canon optics are best-of-breed. The image of perfection. Choose Canon Network Video Solutions and witness the difference yourself. Canon Europe joins IFSEC 2010 with the Canon Network Camera Solutions range designed to address key market requirements for video surveillance or business intelligence. Canon Network Camera solutions provide best in class network video surveillance. At the heart of each Canon Network Video Solution lies a powerful Canon camera. These models represent technology's finest for commercial and industrial applications. And with world-class Canon engineering and design, form and function come together to achieve unparalleled results. Highlights of the Canon stand at IFSEC include: Sharing Canon Video Surveillance Vision and Strategy Live product demonstrations Canon Retail Intelligence and Video Surveillance Solutions combined with industry leading analytics from ObjectVideo Opportunity to discuss your business needs with the Canon EMEA video surveillance team Please join us to experience a live demonstration of the exceptional image quality of Canon network cameras. You can arrange a meeting or demonstration by contacting the Canon IFSEC team at email@example.comAdd to Compare
Browse Network / IP Cameras
IP camera products updated recently
Back in the 1960s a lead engineer working in conjunction with the United States Navy for Lockheed’s Skunk Works team coined the acronym KISS, which translated to the design principle ‘keep it simple stupid’. The KISS principle embraces the concept of simplicity, stating that most systems work best if they are kept simple rather than geared up to be more complicated. When it comes to physical security systems, this concept can also play a key element in its overall success. Secure work environments For years the tug of war in the security industry has pitted the need for a secure environment against the desire for technology that is convenient for users. However, finding a happy medium between the two has often seemed elusive. I believe you can design and have operational convenience at the same time as achieving high security" Jeff Spivey, a security consultant and the CEO of Security Risk Management, has this to say about it, “If there is an understanding of the security-related risks and their separate and/or collective impact on the organization’s bottom line business goals, a resolution can be reached.” Jeff also does not think that convenience and high security have to be opposing each other. He says, “I believe you can design and have operational convenience at the same time as achieving high security.” Importance of secure access control The premise is that for organizations and spaces to be truly secure, they must be difficult to access. So, by its very nature, access control is designed to be restrictive, allowing only authorized staff and visitors to access a facility or other secured areas inside. This immediately puts convenience at odds with security. Most people will tolerate the restrictive nature of a controlled entrance using badge, card or biometric because they understand the need for security. When that technology gets in the way of staff traversing freely throughout the facility during the course of a business day, or hindering potential visitors or vendors from a positive experience entering the building, they become less tolerant, which often leads to negative feedback to the security staff. Enhancing corporate security Security consultants like Spivey and security directors all stress that understanding the threats and risk levels of an organization will most likely dictate its physical security infrastructure and approach. All the technology in the world is useless if it is not embraced by those who are expected to use it and it doesn’t fit the culture of the organization. Once employees and customers are educated about what security really is, they understand that they're not losing convenience, they're gaining freedom to move safely from point A to point B. Converged data and information shape new access options Migration of physical access control systems to a more network-centric platform is a game-changer for security technologies The migration of physical access control systems to a more network-centric platform has been a game-changer for emerging security technology options. The expansion of the Internet of Things (IoT), Near-Field Communication devices powered by Bluetooth technology, and the explosion of converged information systems and identity management tools that are now driving access control are making it easier than ever before for employees and visitors to apply for clearance, permissions and credentials. Wireless and proximity readers Advancements in high-performance wireless and proximity readers have enhanced the user’s access experience when presenting credentials at an entry and expediting movement throughout a facility. A user is now able to access a secured office from street-level without ever touching a key or card. Using a Bluetooth-enabled smartphone or triggering a facial recognition technology, they enter the building through a security revolving door or turnstile. A total building automation approach adds extra convenience, as well as seamless security, when access technology is integrated into other systems like elevator controls. A total building automation approach adds extra convenience and seamless security How to Meet Security Concerns at the Entry While security managers are charged with providing their facilities the maximum level of security possible, there is always the human element to consider. But does the effort to make people comfortable with their security system ecosystem come at a cost? Does all this convenience and the drive to deliver a positive security experience reduce an organization’s overall levels of security? And if so, how can we continue to deliver the same positive experience including speed of entry – while improving risk mitigation and threat prevention? Door entrances, barriers Users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through Let’s examine some of the various types of entrances being used at most facilities and the security properties of each. With some entrance types, there is the possibility for security to fall short of its intended goals in a way that can’t be addressed by access control technology alone. In particular, with many types of doors and barriers, tailgating is possible: users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through. To address this, many organizations hire security officers to supervise the entry. While this can help to reduce tailgating, it has been demonstrated that officers are not immune to social engineering and can often be “talked into” letting an unauthorized person into a facility. Deploying video cameras, sensors Some organizations have deployed video surveillance cameras or sensors to help identify tailgaters after the fact or a door left open for longer than rules allow. This approach is not uncommon where facilities have attempted to optimize throughput and maintain a positive experience for staff and visitors. Security staff monitoring the video feeds can alert management so that action can be taken – but this is at best a reactive solution. It does not keep the unauthorized persons from entering, and so is not a totally secure solution. Optical turnstiles, speedgates Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself. Not all security entrances work the same way. And, there will always be a balance between security and convenience – the more secure the entry, the less convenient it is for your personnel and visitors to enter your facility. For example, it takes more time to provide 2-factor authentication and enter through a mantrap portal than to provide only one credential and enter through an optical turnstile or speedgate. Perimeter protection So, it is an important first step to determine what is right at every entrance point within and around the perimeter. Remember that convenience does not equate to throughput. Convenience is the ease and speed of entry experienced by each individual crossing that threshold, while throughput relates to the speed at which many individuals can gain access to the facility. A more convenient entry makes a better first impression on visitors and is good for overall employee morale. Throughput is more functional; employees need to get logged in to begin their workday (and often to clock in to get paid), and they quickly become frustrated and dissatisfied when waiting in a long line to enter or exit the premises. Considering form and function when designing a security entrance can ensure that those requiring both high-security and convenience are appeased.
Imagine a home surveillance camera monitoring an elderly parent and anticipating potential concerns while respecting their privacy. Imagine another camera predicting a home burglary based on suspicious behaviors, allowing time to notify the homeowner who can in turn notify the police before the event occurs—or an entire network of cameras working together to keep an eye on neighborhood safety. Artificial Intelligence vision chips A new gen of AI vision chips are pushing advanced capabilities such as behavior analysis and higher-level security There's a new generation of artificial intelligence (AI) vision chips that are pushing advanced capabilities such as behavior analysis and higher-level security to the edge (directly on devices) for a customizable user experience—one that rivals the abilities of the consumer electronics devices we use every day. Once considered nothing more than “the eyes” of a security system, home monitoring cameras of 2020 will leverage AI-vision processors for high-performance computer vision at low power consumption and affordable cost—at the edge—for greater privacy and ease of use as well as to enable behavior analysis for predictive and preemptive monitoring. Advanced home monitoring cameras With this shift, camera makers and home monitoring service providers alike will be able to develop new edge-based use cases for home monitoring and enable consumers to customize devices to meet their individual needs. The result will be increased user engagement with home monitoring devices—mirroring that of cellphones and smart watches and creating an overlap between the home monitoring and consumer electronics markets. A quick step back reminds us that accomplishing these goals would have been cost prohibitive just a couple of years ago. Face recognition, behavior analysis, intelligent analytics, and decision-making at this level were extremely expensive to perform in the cloud. Additionally, the lag time associated with sending data to faraway servers for decoding and then processing made it impossible to achieve real-time results. Cloud-based home security devices The constraints of cloud processing certainly have not held the industry back, however. Home monitoring, a market just seven years young, has become a ubiquitous category of home security and home monitoring devices. Consumers can choose to install a single camera or doorbell that sends alerts to their phone, a family of devices and a monthly manufacturer’s plan, or a high-end professional monitoring solution. While the majority of these devices do indeed rely on the cloud for processing, camera makers have been pushing for edge-based processing since around 2016. For them, the benefit has always been clear: the opportunity to perform intelligent analytics processing in real-time on the device. But until now, the balance between computer vision performance and power consumption was lacking and camera companies weren’t able to make the leap. So instead, they have focused on improving designs and the cloud-centric model has prevailed. Hybrid security systems Even with improvements, false alerts result in unnecessary notifications and video recording Even with improvements, false alerts (like tree branches swaying in the wind or cats walking past a front door) result in unnecessary notifications and video recording— cameras remain active which, in the case of battery powered cameras, means using up valuable battery life. Hybrid models do exist. Typically, they provide rudimentary motion detection on the camera itself and then send video to the cloud for decoding and analysis to suppress false alerts. Hybrids provide higher-level results for things like people and cars, but their approach comes at a cost for both the consumer and the manufacturer. Advanced cloud analytics Advanced cloud analytics are more expensive than newly possible edge-based alternatives, and consumers have to pay for subscriptions. In addition, because of processing delays and other issues, things like rain or lighting changes (or even bugs on the camera) can still trigger unnecessary alerts. And the more alerts a user receives, the more they tend to ignore them—there are simply too many. In fact, it is estimated that users only pay attention to 5% of their notifications. This means that when a package is stolen or a car is burglarized, users often miss the real-time notification—only to find out about the incident after the fact. All of this will soon change with AI-based behavior analysis, predictive security, and real-time meaningful alerts. Predictive monitoring while safeguarding user privacy These days, consumers are putting more emphasis on privacy and have legitimate concerns about being recorded while in their homes. Soon, with AI advancements at the chip level, families will be able to select user apps that provide monitoring without the need to stream video to a company server, or they’ll have access to apps that record activity but obscure faces. Devices will have the ability to only send alerts according to specific criteria. If, for example, an elderly parent being monitored seems particularly unsteady one day or seems especially inactive, an application could alert the responsible family member and suggest that they check in. By analyzing the elderly parent’s behavior, the application could also predict a potential fall and trigger an audio alert for the person and also the family. AI-based behavior analysis Ability to analyze massive amounts of data locally and identify trends is a key advantage of AI at the edge The ability to analyze massive amounts of data locally and identify trends or perform searches is a key advantage of AI at the edge, for both individuals and neighborhoods. For example, an individual might be curious as to what animal is wreaking havoc in their backyard every night. In this case, they could download a “small animal detector” app to their camera which would trigger an alert when a critter enters their yard. The animal could be scared off via an alarm and—armed with video proof—animal control would have useful data for setting a trap. Edge cameras A newly emerging category of “neighborhood watch” applications is already connecting neighbors for significantly improved monitoring and safety. As edge cameras become more commonplace, this category will become increasingly effective. The idea is that if, for example, one neighbor captures a package thief, and then the entire network of neighbors will receive a notification and a synopsis video showing the theft. Or if, say, there is a rash of car break-ins and one neighbor captures video of a red sedan casing their home around the time of a recent incident, an AI vision-based camera could be queried for helpful information: Residential monitoring and security The camera could be asked for a summary of the dates and times that it has recorded that particular red car. A case could be made if incident times match those of the vehicle’s recent appearances in the neighborhood. Even better, if that particular red car was to reappear and seems (by AI behavior analysis) to be suspicious, alerts could be sent proactively to networked residents and police could be notified immediately. Home monitoring in 2020 will bring positive change for users when it comes to monitoring and security, but it will also bring some fun. Consumers will, for example, be able to download apps that do things like monitor pet activity. They might query their device for a summary of their pet’s “unusual activity” and then use those clips to create cute, shareable videos. Who doesn’t love a video of a dog dragging a toilet paper roll around the house? AI at the Edge for home access control Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring, and it’s an application that is expected to take off soon. With smart biometrics, cameras will be able to recognize residents and then unlock their smart front door locks automatically if desired, eliminating the need for keys. And if, for example, an unauthorized person tries to trick the system by presenting a photograph of a registered family member’s face, the camera could use “3D liveness detection” to spot the fake and deny access. With these and other advances, professional monitoring service providers will have the opportunity to bring a new generation of access control panels to market. Leveraging computer vision and deep neural networks Ultimately, what camera makers strive for is customer engagement and customer loyalty. These new use cases—thanks to AI at the edge—will make home monitoring devices more useful and more engaging to consumers. Leveraging computer vision and deep neural networks, new cameras will be able to filter out and block false alerts, predict incidents, and send real-time notifications only when there is something that the consumer is truly interested in seeing. AI and computer vision at the edge will enable a new generation of cameras that provide not only a higher level of security but that will fundamentally change the way consumers rely on and interact with their home monitoring devices.
Protecting against fire and security risks is an essential aspect of life for people and across all sectors. However, there is an increasing expectation and demand on fire and security providers, in areas such as education. The securitisation of our world paired with the rapid speed of communication and news updates means that young people especially have the potential to be more aware of potential dangers and threats to their own safety and the safety of those around them. Education institutions are large and sometimes sprawling sites that present considerable fire and security challenges. From Kindergartens to Colleges Each education site brings distinct challenges, with differing facilities and specialties, as well as the need to maintain the capacity of students, teachers and lecturers to study, learn and teach at the high level expected.Each education site brings distinct challenges, with differing facilities and specialties While some schools and universities are based in urban areas with a mix of heritage and high rise buildings, others are sprawled across green open spaces. Some of these sites have specialised sporting facilities, while others may be focused on engineering or scientific study, with costly technical equipment. Kindergartens and primary schools have their own unique requirements. Parents expect the highest safety standards, while schools require safety in addition to efficient facilities management. The demographic of these institutions is predominantly young children, who are often unaware of or only just learning about fire safety and personal safety. This creates a huge vulnerability and an added onus on teachers to keep their students safe. Facial recognition at West Academy of Beijing In response to this need, Chubb China upgraded the closed-circuit television (CCTV) system for Western Academy of Beijing (WAB) focusing on elevating video content analytic features, including maximised CCTV monitoring, automatic police calling, and a smart search solution. Complementing this, a facial recognition system capable of finding the exact location of a student on campus within 30 seconds was added, aided by real-time remote gate operation. This integrated and advanced system resulted won the "High Quality Educational Technology Suppliers for School" award for the WAB project at the 2019 BEED Asia Future Oriented Construction of Universities and Schools Seminar. This award recognizes outstanding solution design and project execution. Parents expect the highest safety standards, while schools require safety in addition to efficient facilities management Awareness remains important at university As students graduate from kindergarten, primary school, junior and senior school, they become more aware of fire safety, relevant dangers and how to protect themselves. Unfortunately, external dangers remain. There are particularly high stakes for university campus facilities managers The safety of students in a university environment is also critical. It is often the first time young people live away from their family home and have the independence of adulthood. For this reason, there are particularly high stakes for university campus facilities managers. In the eventuality of a fire, students could be at great risk and, beyond the immediacy of physical harm, this can have serious ramifications for the reputation of an educational institution. Integrated solutions Integrated solutions must be nimble and adapted to a range of site types including campus residences, recreational areas, open spaces and lecture theatres. Chubb Sicli recently identified and overcame these challenges through the installation of a full suite of fire safety and security equipment and services at Webster University Geneva. Established in Switzerland in 1978, Webster University Geneva is an accredited American university campus that offers programs in English to students interested in undergraduate or graduate-level education. Located in the Commune of Bellevue, just a few kilometres from Geneva's central station, the campus of Webster University Geneva includes five buildings in a park-style atmosphere. Full fire and security audit Chubb Sicli provided Webster’s fire extinguisher maintenance for over 25 years. This business relationship led to a full fire and security audit that identified the need for updates to the university’s security installation. The initial audit showed several improvements to the university’s security profile were needed.The challenge was to create and provide an effective and interconnected fire and security solution The challenge was to create and provide an effective and interconnected fire and security solution, enhancing the security of the student population and its ever-evolving needs. This included complete fire detection and intruder alarms for all five buildings, upgrades to existing CCTV systems, new video surveillance equipment and an automated fire extinguishing system in the kitchen areas. In addition to this integrated system solution, Webster University required access control for all main entrances, with the requirement that all documentation to be made available in English, because Webster is an American company. Customized solution Chubb Sicli’s quality, capability, and security expertise provided a customized solution for the unique educational establishment. Not only was the solution both tailored and integrated, the approach and planning were based on audit, fire extinguisher and emergency light maintenance, fire detection, intrusion detection, access control, video surveillance and Fire Detection. Through dedicated and integrated fire safety support, Chubb provides students and families peace of mind and security. From the moment a young child enters the education system, Chubb’s diligent and effective surveillance and fire safety systems work to prevent and protect, offering a new kind of ‘end-to-end’ service for education systems around the world.
Canon Solutions America, a wholly owned subsidiary of Canon U.S.A., Inc., hosted a special event at MetLife Stadium in New York on August 22 as an extension of its Security Roadshow program. Linking business leaders to subject matter experts in all facets of security, this event set out to provide insight into a comprehensive process – one that comprises strategies and technologies to help businesses develop a more proactive, in-depth approach to the many types of security risks they face. Multi-Dimensional approach This layered security approach encompasses device security, print security, and document security Experts from Canon Solutions America and several of its vendor partners took attendees on a journey through real world demonstrations of Canon Solutions America’s Five Pillars of Security. This layered security approach encompasses device security, print security, document security, information security, and cybersecurity, outlining a business model that can be easily and efficiently implemented. "There is no simple solution to cybersecurity. It takes the multi-dimensional approach that Canon Solutions America has set out in its 5 Pillars of Security and security professionals coming together as a community—as we have done today—to share ideas, knowledge, and experience," said Rob Sloan, Research Director at The Wall Street Journal's WSJ Pro. Improving network security Security solutions from Canon Solutions America partners Therefore, Barracuda, Vera, and Agile Cybersecurity Solutions (ACS) were showcased in presentations. A lively question-and-answer session followed, with speakers providing an open, interactive forum that allowed for a deeper dive into the topics of the day. “It was great to meet with peers and learn more about what other businesses are facing,” said Adam Rabe, IT Support for Langan. “I gained new insight into how to improve network security and ensure against threats. Thanks, Canon Solutions America, for bringing to light these opportunities.” In addition to the engaging presentations and opportunities to interact face-to-face with security experts, guests enjoyed a guided tour of MetLife Stadium and had the opportunity to meet Wayne Chrebet, former wide receiver who played 11 seasons for the New York Jets. Employing nimble strategies Canon Solutions America’s parent company, recently announced a new collaboration with McAfee With a long career avoiding, outmaneuvring, or simply outrunning obstacles, Chrebet was a perfect fit to show how being aware of potential threats in your environment, and employing nimble strategies along with teamwork, will help you come out a winner. Further illustrating the company’s commitment to security, Canon U.S.A., Inc., Canon Solutions America’s parent company, recently announced a new collaboration with McAfee, the device-to-cloud cybersecurity company. The companies have joined forces to provide enhanced embedded protection against malware execution and tampering of firmware and applications for a sometimes-overlooked endpoint—multifunction printers (MFPs). Standard security feature Through the partnership, Canon customers will now receive McAfee® Embedded Control as an additional standard security feature on third generation imageRUNNER ADVANCE 3rd edition MFPs once enabled. Peter Kowalczuk, President of Canon Solutions America, said, “Security is a serious concern in today’s connected world, and it affects us all. We at Canon Solutions America are committed to working closely with our customers to help them protect their businesses, their intellectual property, and the data of their employees and customers. Technology advances quickly and cyberattacks are becoming increasingly sophisticated. We are here to help guide organizations through these challenges.”
Consolidation persisted in the physical security industry in 2018, and big companies such as Motorola, Canon and UTC continued to make moves. Also among the mergers and acquisitions (M&A) news in 2018 was a high-profile bankruptcy (that ended well), continuing consolidation in the integrator market, and the creation of a new entity called “LenelS2.” Here’s a look at the Top 10 M&A stories in 2018: 1. Motorola Acquires Avigilon Motorola Solutions announced in February that it had entered into a definitive agreement to acquire video surveillance provider Avigilon in an all-cash transaction that enhances Motorola Solutions’ portfolio of mission-critical communications technologies. Avigilon products are used by a range of commercial and government customers including critical infrastructure, airports, government facilities, public venues, healthcare centers and retail. The company holds more than 750 U.S. and international patents. 2. UTC Climate, Control & Security Buys S2 Security UTC Climate, Controls & Security agreed in September to acquire S2 Security, a developer of unified security and video management solutions. UTC subsequently combined S2 with its Lenel brand to create LenelS2, “a global leader in advanced access control systems and services” with “complementary strengths.” 3. Costar Technologies Acquires Arecont Vision After Bankruptcy Arecont Vision, the provider of IP-based megapixel camera and video surveillance solutions, announced in July that the acquisition by Costar Technologies, Inc. of its assets had been approved by the bankruptcy court. After the closing of the sale, the company began operating as Arecont Vision Costar, LLC and is part of Costar, a U.S. corporation that designs, develops, manufactures, and distributes a range of products for the video surveillance and machine vision markets. 4. Allegion Acquires Access Control Company ISONAS Allegion plc, a security products and solutions provider, agreed in June to acquire ISONAS through one of its subsidiaries. ISONAS’ edge-computing technology provides access control solutions for non-residential markets. ISONAS' devices – like its integrated reader-controllers – utilize power over ethernet, making them easy to install and cost effective as they utilize existing customer infrastructures. The company is based in Boulder, Colo. 5. HID Buys Crossmatch for Biometrics HID Global announced that it had acquired Crossmatch, a provider of biometric identity management and secure authentication solutions, from Francisco Partners. Crossmatch’s portfolio of products includes biometric identity management hardware and software that complement HID’s broad portfolio of trusted identity products and services. 6. BriefCam Announces Acquisition by Canon BriefCam, a global provider of video synopsis and deep learning solutions, announced its acquisition in May by Canon Inc., a global digital imaging solutions company. The addition of BriefCam to Canon’s network video solutions products portfolio complements the Canon Group’s previous acquisitions of Axis Communications and Milestone Systems. 7. Allied Universal Acquires U.S. Security Associates Allied Universal, a security and facility services company, finalized its acquisition of U.S. Security Associates (USSA) in October, further building on its position in the security services industry. This acquisition includes Andrews International (including its Government Services Division and Consulting and Investigations and International Division) and Staff Pro. 8. Johnson Controls Acquires Smartvue Corp. Johnson Controls announced in April that it had acquired Smartvue, a global IoT and video provider that empowers cloud video surveillance and IoT video services. The addition of the Smartvue cloud-based video platform will enhance Johnson Controls’ offering of an end-to-end, smart cloud-based solution that can provide superior business data and intelligence to customers and added value to partners. 9. ADT Acquires Red Hawk Fire & Security (and Others) ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., was the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so. 10. Convergint Technologies Continues to Acquire Convergint Technologies announced in August the acquisition of New Jersey-based Access Control Technologies (ACT), bringing further electronic security systems experience to Convergint's service capabilities. Convergint has strategically grown its service footprint across the United States, Canada, Europe and Asia Pacific through strong organic growth and the completion of 18 acquisitions since early 2016. And it continues: Convergint announced acquisition of SI Technologies, Albany, N.Y., in November and Firstline Security Integration (FSI), Anaheim, Calif., in December. (And Convergint itself was acquired in February by private equity group Ares Management.)
PSA, a systems integrator cooperative, is excited to announce a new vendor partnership with Canon Financial Services, Inc., (CFS) a wholly owned subsidiary of Canon U.S.A., Inc. CFS supports PSA systems integrators with innovative B2B lease financing solutions and programs designed to sell products and services in the network video surveillance market. “We are excited to formally join PSA as a Business Solutions Provider,” says Larry Brittingham, senior manager, sales support, from CFS. “Our partnership with PSA will provide its systems integrators and customers with security project financing, managed services, and reseller programs as we set the course to reach more security integrators.” CFS is a true financing partner that delivers competitive lease pricing, efficient processes, and special promotionsFinancing For Security Systems Projects Canon Financial Services offers end-user financing through term leases and financing arrangements for security systems projects including hardware, software, and professional services such as installation and training. With a successful track record of offering financing services through its dealer network, CFS is a true financing partner that delivers competitive lease pricing, efficient processes, and special promotions. Now, through PSA’s partnership with CFS, members can take advantage of these offerings in an effort to help expand their businesses. Reducing Operating Costs “We are extremely happy for the opportunity to add Canon Financial Services to our Business Solutions Provider program” said Anthony Berticelli, PSA director of education. “We’re excited to introduce another security equipment financing tool to our solution set, particularly one that is backed by one of the world’s most admired companies – Canon.” The PSA Business Solutions Provider program is a suite of value-added resources and services to help enhance integrators’ business models, reduce operating costs and keep them competitive in the marketplace.
The Security Behind Financial SecurityDownload
Nine Ways To Make Your Retail Security System Work HarderDownload
Financial Institutions Require Future-Ready Physical Security TechnologiesDownload
Dahua Technology’s Safe City Solution Chosen By The Local Government To Make Brienon-sur-Armançon Safer
- Dahua Technology’s Safe City Solution Chosen By The Local Government To Make Brienon-sur-Armançon Safer
- Prescott Valley’s Ocean Blue Car Wash Installs 3xLOGIC Video Surveillance System For Enhanced Security
- Matrix Comsec Provides Central Monitoring Solutions And Secures Nashik Railway Station During Kumbh Mela
- Hanwha Secures Kirkland’s Stores With Its Wisenet X Series HD Dome Cameras