Have we entered the age of the security company "open marriage?"
I used that phrase just a few days ago in relation to the Panasonic-Video Insight acquisition. Now the phrase springs immediately back to mind related to the truly shocking news today about Canon buying Axis, which last year bought video management system supplier Milestone.
Is it possible for a video management company and a camera company to be owned by the same company and yet remain "open?"
That was the premise when Canon bought Milestone, but is it likely to remain the core focus, or are these new combined companies looking to chart a different course for the market? Do they reflect suppliers' view that the market's growing preference for end-to-end solutions trumps the need for independent, best-of-breed components from which integrators and users can pick and choose?
Maybe the pendulum is turning back toward the "Avigilon model." Maybe ease of installation is more important than freedom of choice.
It appears that end users could suffer in the end as end-to-end solutions become the path of least resistance and the new unified companies "leverage their synergies."
But surely in a market as fractured as the surveillance industry, there will still be a need to be open; that is, to integrate with a variety of hardware and software solutions. Surely we won't regress into a proprietary market where a few big players dominate everything.
Meanwhile, it's time to get to know Canon, the market's latest really big player -- even as we wonder where these "newlywed" companies will take our industry.
Canon's shocking acquisition of Axis: is security industry turning tide?
- Related companies
- Axis Communications
- Canon Europe Ltd
- Milestone Systems
- Avigilon Corporation
- Related links
- Avigilon CCTV software
- Axis Communications CCTV software
- Milestone CCTV software
- Avigilon IP cameras
- Axis Communications IP cameras
- Avigilon Network video recorders (NVRs)
- Avigilon IP Dome cameras
- Axis Communications IP Dome cameras
- Axis Communications Network video recorders (NVRs)
- Milestone Network video recorders (NVRs)
- Related categories
- CCTV software
- IP cameras
- IP Dome cameras
- Network video recorders (NVRs)
- View all news from
- Axis Communications
- Canon Europe Ltd
- Milestone Systems
- Avigilon Corporation
Articles by Larry Anderson
Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depends on our ability t...
Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open ports on the network ex...
The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of this problem has emerge...
Casinos face multiple security issues caused by potential bad actors, everything from cheating to vandalism, from theft to vagrancy. A new intelligent technology can monitor for specific keywords and...
The Internet of Things (IoT) has revolutionised many industries, including physical security. By connecting physical devices to the internet, IoT technology offers significant enhancements to security...
An attention-grabbing exhibit at GSX 2024 in Orlando involved a robot dog that could open a door. Boston Dynamics robot dog ASSA ABLOY impressed attendees with the robotics demonstration, feat...
A software platform designed to centralise and manage various physical security systems within an organisation used to be called a PSIM (physical security information management) system. Generally spe...
In today's complex security landscape, ensuring the safety of building occupants and assets requires more than just cutting-edge technology. Holistic approach The SHIELD certification, introduced b...
While technology like cameras, alarms, and access control systems are crucial components, they are only as effective as the people who use and manage them and the systems that deploy them. When i...
There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to take proactive steps...
Transportation enables the movement of goods and people, facilitates trade and commerce, and is crucial for businesses to operate and expand. Security technology plays a major role both in protecting...
Security applications for drones have evolved to provide benefits such as bird's-eye views of large areas, easy access to remote locations, and rapid deployment. However, to date, most drone applicati...
The shift from standalone systems to fully integrated solutions is one of the biggest shifts the security industry has experienced in recent years. There is a higher demand for integrated solut...
Inflation, the rise in prices of goods and services over time, can result from a multitude of factors. It happens when there is more money chasing a limited supply of goods. It happens when the cost o...
In an emergency, information is pivotal. More information provides better understanding of an emergency and empowers potentially life-saving decision-making. Emergency response teams depend on informa...
Suddenly, artificial intelligence (AI) is everywhere. The smart technology brings a range of benefits to our lives, from streamlining everyday tasks to making scientific breakthroughs. The advantages...
The design of buildings encompasses many elements, from the practical to the aesthetic. Well-designed buildings should be functional, and they can also be beautiful and inspiring. But can security sys...
Manufacturers make things. That hasn’t changed. Manufacturers today still produce finished goods from raw materials using various tools, equipment, and processes. What is evolving is a greater e...
Migrating to the Cloud can be a cultural shift for some organisations, especially when it comes to physical security systems. Challenges such as concerns about data security and compliance, cost manag...
When it comes to protecting the environment, the security industry has historically been perched on the sidelines. For instance, the amount of electricity that physical security systems use is minimal...
Related videos
In case you missed it
The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...
Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...
Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...
Expert commentary
- Mind the gap: Addressing cybersecurity at every phase of technology management
- When choosing an access solution, make total cost of ownership a key part of the calculation
- How Californian cities are improving surveillance and security - key developments from 2022 to 2024
- Healing through innovation: Securing healthcare in the cloud
Round table discussions
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download