Johnson Controls has introduced exacqVision Cloud Drive storage, an untethered way for customers to easily store, access and search critical surveillance video in the cloud. As a pioneer in video solutions, Exacq recognizes that many customers are turning to cloud solutions to provide an offsite copy of video that ensures protection against natural disasters, theft and other events while reducing capital expenses and increasing accessibility.

Allocating Storage Across Multiple Cameras

exacqVision Cloud Drive storage helps security and IT teams lower their Total Cost of Ownership by eliminating some of the unnecessary hardware costs and management of storage infrastructure. With exacqVision Cloud Drive storage, users can easily allocate storage across multiple cameras and archive event video and bookmarks to the cloud. Video is natively searchable by the exacqVision Client or Exacq Mobile app, providing powerful benefits over generic cloud storage providers. 

Released with the latest version of exacqVision (9.8), the new exacqVision Cloud Drive storage is available on an annual subscription basis for exacqVision Professional and Enterprise customers.  

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...