SlideShare uma empresa Scribd logo
1 de 29
Cloud-ready Services for Your
Print Environment
Kristen Goldberg, Enterprise Solutions
Mike Betsko, Software Solutions
#MarcoTradeshow18
Kristen Goldberg
Director of Marketing
Enterprise Solutions (MFP/Printer)
Image
Mike Betsko
Director of Sales & Marketing
Software Solutions
CLOUD SECURITY
About Canon #MarcoTradeshow18
* Source: Canon results for the Fourth Quarter and FY ended December 31, 2017. (January 30, 2018)
** Source: IDC U.S. Quarterly Hard Copy Peripherals Tracker, 2017 Q4. (February 8, 2018)
Canon Innovation #MarcoTradeshow18
* This amount is 8.1% of Net Sales. Source: Canon results for the Fourth Quarter and FY ended December 31, 2017. (January 30, 2018)
** Source: IFI CLAIMS® Patent Services, 2017 Top U.S. Patent Recipients. (January 9, 2018)
5
#MarcoTradeshow18
Canon and Marco Partnership
 Top 20 Canon dealer nationwide
 Canon APP “Advanced Partner Status”
 Significant growth via acquisitions and sales
 20% growth for past two years
 Marco is authorized for Canon sales in
Minnesota, Michigan (via a recent
acquisition) and Illinois
Cloud
Technology
#MarcoTradeshow18
Rapid Growth of Cloud Computing #MarcoTradeshow18
* Source: IDC InfoBrief, sponsored by Canon, Digital Transformation & Emerging Technologies: The Canon Office of the Future Survey, Conducted by IDC, December 2017.
** Source: Canon White Paper, “Office Insights 2018” based on primary research commissioned by Canon U.S.A., conducted by Breaking Blue Online survey and in-person
interviews among 381 IT decision-makers, influencers, and users in the U.S.
Why Cloud? #MarcoTradeshow18
Canon’s Role in Cloud #MarcoTradeshow18
Common Business Challenges #MarcoTradeshow18
Common Business Challenges #MarcoTradeshow18
1. Woolworths leaks $1 million of gift cards in massive data
breach debacle. The Sydney Moring Herald, 31 May 2015.
3. G20 world leaders’ personal information leaked in
‘email error.’ The Guardian, 30 March 2015.
Common Business Challenges #MarcoTradeshow18
SOLVED
Strategic Partnerships #MarcoTradeshow18
cloud content management platform that
works for all your content
archives and governs all e-mail &
attachments into Cloud Storage without
end user behavior change.
Access and Control #MarcoTradeshow18
1
4
Transfer to
other company
Control
Governance
Visibility of attached file
URL
URL
URL
・Password
・Timed expiration
・Read-only
・Encrypted delivery
To
CC
CC
Edit /change
the document
Not open
the file
Now
mxHero
+
Box
access controls for attachments
created without sender action
Han Solo
R2-D2
R2-D2
C-3PO
Chewbacca
Han Solo
R2-D2
Chewbacca
Cost Savings #MarcoTradeshow18
Email Server
Storage
URL
URL
URL
110MB
E-mail storage
0.11MB
E-mail storage
[Customer Case]
In the case,
two employees get 10MB e-mail,
the e-mail storage size would be…
Now
mxHero
+
Box
Intelligent Filing of Important Emails #MarcoTradeshow18
INBOX
Mail Filing Emails
Client A
Client B
Matter 1
Matter 2
Matter 3
Email
Security
#MarcoTradeshow18
Security from Start to Finish #MarcoTradeshow18
Document Security
Device Security
 Measures to Help
Protect the HDD
 Digital Certificates
 Security Policies
 Measures to Help Protect
Against Cyber Attack
 Authentication
 Secure Print / Forced Hold
Network Security
Information Security
 Electronic Document
Management
 Access control for Email
Attachments
Security from Start to Finish #MarcoTradeshow18
All-inclusive, standard feature set
Information Management
Consistency across product line
and continuous improvements
Evaluated and proven
ULM
Forced Hold
HDD Data
Encryption
FIPS 140-2
HDD PW Lock
HDD Initialize
Security Policy
Settings
TPM
Ports
Control
* Models evaluated by Keypoint Intelligence/BLI
Pacesetter Award – Document Imaging Security
Security from Start to Finish #MarcoTradeshow18
Document Security
Device Security
 Measures to Help
Protect the HDD
 Digital Certificates
 Security Policies
 Measures to Help Protect
Against Cyber Attack
 Authentication
 Secure Print / Forced Hold
Network Security
Information Security
 Electronic Document
Management
 Access control for Email
Attachments
People & Workflow
Frequency
Securing Technology #MarcoTradeshow18
* Source: Canon White Paper, “Office Insights 2018” based on primary research commissioned by Canon U.S.A., conducted by Breaking Blue Online survey and in-person
interviews among 381 IT decision-makers, influencers, and users in the U.S.
Securing Technology #MarcoTradeshow18
We protect our information by securing our technology…
Why not do the same for our MFPs?
Why Output Management? #MarcoTradeshow18
IMPLEMENT SECURITY
FEATURES
MONITOR USAGE AND
CONTROL COSTS
REDUCE WASTE
uniFLOW Online – Simple, Server-less, Secure
...all without needing to invest in
a server infrastructure!
Cloud-based solution for secure
printing/scanning and cost-tracking, enabling
small and medium-sized businesses
to manage their print and scan environment...
uniFLOW Online Dashboard #MarcoTradeshow18
Reliability
#MarcoTradeshow18
RELIABILITY ADVANCED SIMPLICITYCONSISTENCY
Copier MFP Line of the Year
Total A3 Copier/MFP
Market share (B&W and
Color)*
* Based on Source: IDC U.S. Quarterly
Hardcopy Peripherals Tracker, 2017
(Q4/FY), February 8, 2018
Data refers to laser MFPs
Keypoint Intelligence
PaceSetter Awards for
Ease of Use, Mobile
Printing,
Document Security,
and Vertical Markets
EVOLVING
Outstanding
Reliability
#MarcoTradeshow18
“Canon’s ability to pump out quality copier MFPs with
outstanding reliability, comprehensive usability, and a high
degree of software compatibility one year after the next is
nothing short of astounding. The value that each
machine in the line presents is unbeatable when you
consider things like hearty device management functions,
a sleek design, user-friendly drivers, plus cloud and
mobile-readiness. All-in-all, Canon leaves no room for
disappointment in their Copier MFP portfolio for yet
another year.”
“
“
- George Mikolay, Associate Director of Copiers/Production for
Keypoint Intelligence-Buyer’s Lab
Questions?
Thank you for joining us!

Mais conteúdo relacionado

Mais procurados

Mais procurados (6)

When Technology Turns Tumultuous: 2017 Tech Predictions
When Technology Turns Tumultuous: 2017 Tech PredictionsWhen Technology Turns Tumultuous: 2017 Tech Predictions
When Technology Turns Tumultuous: 2017 Tech Predictions
 
The top 7 technology trends for 2018
The top 7 technology trends for 2018The top 7 technology trends for 2018
The top 7 technology trends for 2018
 
Un caso di studio sui big data - Campus Connestions Summit 2018 - #CCS18
Un caso di studio sui big data - Campus Connestions Summit 2018 - #CCS18Un caso di studio sui big data - Campus Connestions Summit 2018 - #CCS18
Un caso di studio sui big data - Campus Connestions Summit 2018 - #CCS18
 
Fy13 performance final
Fy13 performance finalFy13 performance final
Fy13 performance final
 
Commerce technology of the past stifles marketing organizations of the future
Commerce technology of the past stifles marketing organizations of the futureCommerce technology of the past stifles marketing organizations of the future
Commerce technology of the past stifles marketing organizations of the future
 
SMAC
SMACSMAC
SMAC
 

Semelhante a Cloud-Ready Services for your Print Environment

Semelhante a Cloud-Ready Services for your Print Environment (20)

IBM InterConnect 2013 Cloud General Session: Robert LeBlanc
IBM InterConnect 2013 Cloud General Session: Robert LeBlancIBM InterConnect 2013 Cloud General Session: Robert LeBlanc
IBM InterConnect 2013 Cloud General Session: Robert LeBlanc
 
Presentation cloud as a growth engine for a smarter enterprise
Presentation   cloud as a growth engine for a smarter enterprisePresentation   cloud as a growth engine for a smarter enterprise
Presentation cloud as a growth engine for a smarter enterprise
 
Transformacion del Negocio Financiero por medio de Tecnologias Cloud
Transformacion del Negocio Financiero por medio de Tecnologias CloudTransformacion del Negocio Financiero por medio de Tecnologias Cloud
Transformacion del Negocio Financiero por medio de Tecnologias Cloud
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 
How to secure and manage modern IT - Ondrej Vysek
 How to secure and manage modern IT - Ondrej Vysek How to secure and manage modern IT - Ondrej Vysek
How to secure and manage modern IT - Ondrej Vysek
 
The Future of Information Management
The Future of Information ManagementThe Future of Information Management
The Future of Information Management
 
9.35am robert humphrey
9.35am robert humphrey9.35am robert humphrey
9.35am robert humphrey
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
Transforma Insights
Transforma InsightsTransforma Insights
Transforma Insights
 
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT Expo
 
About Transforma Insights (February 2021)
About Transforma Insights (February 2021)About Transforma Insights (February 2021)
About Transforma Insights (February 2021)
 
Trend Micro 10 Minute Overview
Trend Micro 10 Minute OverviewTrend Micro 10 Minute Overview
Trend Micro 10 Minute Overview
 
Intelligent Things
Intelligent Things Intelligent Things
Intelligent Things
 
AI Foundations: Simpler Technologies, Smarter Business
AI Foundations: Simpler Technologies, Smarter BusinessAI Foundations: Simpler Technologies, Smarter Business
AI Foundations: Simpler Technologies, Smarter Business
 
Ai in Digital Marketing
Ai in Digital MarketingAi in Digital Marketing
Ai in Digital Marketing
 
Achieve cloud visibility, control and automation with IBM Hybrid Cloud Manage...
Achieve cloud visibility, control and automation with IBM Hybrid Cloud Manage...Achieve cloud visibility, control and automation with IBM Hybrid Cloud Manage...
Achieve cloud visibility, control and automation with IBM Hybrid Cloud Manage...
 
Department of Justice IT Sales Opportunities
Department of Justice IT Sales OpportunitiesDepartment of Justice IT Sales Opportunities
Department of Justice IT Sales Opportunities
 
ITCamp 2019 - Andy Cross - Business Outcomes from AI
ITCamp 2019 - Andy Cross - Business Outcomes from AIITCamp 2019 - Andy Cross - Business Outcomes from AI
ITCamp 2019 - Andy Cross - Business Outcomes from AI
 
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
 
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat ThreatsUsing Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
 

Mais de Marco

Mais de Marco (13)

Collaborative Spaces: Audio Visual Trends
Collaborative Spaces: Audio Visual TrendsCollaborative Spaces: Audio Visual Trends
Collaborative Spaces: Audio Visual Trends
 
Digital Revolution in Communications
Digital Revolution in CommunicationsDigital Revolution in Communications
Digital Revolution in Communications
 
Collaborative Spaces: Audio Visual Trends
Collaborative Spaces: Audio Visual TrendsCollaborative Spaces: Audio Visual Trends
Collaborative Spaces: Audio Visual Trends
 
The Next Wave of Collaboration
The Next Wave of CollaborationThe Next Wave of Collaboration
The Next Wave of Collaboration
 
Using Video for More than Just Security
Using Video for More than Just SecurityUsing Video for More than Just Security
Using Video for More than Just Security
 
Hot Trends in Production and Industrial Print
Hot Trends in Production and Industrial PrintHot Trends in Production and Industrial Print
Hot Trends in Production and Industrial Print
 
7 Important Cybersecurity Trends
7 Important Cybersecurity Trends7 Important Cybersecurity Trends
7 Important Cybersecurity Trends
 
Digital Transformation Drives WAN Evolution
Digital Transformation Drives WAN EvolutionDigital Transformation Drives WAN Evolution
Digital Transformation Drives WAN Evolution
 
Protecting your Data…Anywhere and Everywhere
Protecting your Data…Anywhere and Everywhere Protecting your Data…Anywhere and Everywhere
Protecting your Data…Anywhere and Everywhere
 
Hang on - Change is Here
Hang on - Change is HereHang on - Change is Here
Hang on - Change is Here
 
How Sourcewell Contracts Make Finding a Phone System for Your Needs and Budge...
How Sourcewell Contracts Make Finding a Phone System for Your Needs and Budge...How Sourcewell Contracts Make Finding a Phone System for Your Needs and Budge...
How Sourcewell Contracts Make Finding a Phone System for Your Needs and Budge...
 
12 Managed Services Myths
12 Managed Services Myths12 Managed Services Myths
12 Managed Services Myths
 
2016 Forecasts: What's Ahead in Business Technology
2016 Forecasts: What's Ahead in Business Technology2016 Forecasts: What's Ahead in Business Technology
2016 Forecasts: What's Ahead in Business Technology
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Cloud-Ready Services for your Print Environment

  • 1. Cloud-ready Services for Your Print Environment Kristen Goldberg, Enterprise Solutions Mike Betsko, Software Solutions
  • 2. #MarcoTradeshow18 Kristen Goldberg Director of Marketing Enterprise Solutions (MFP/Printer) Image Mike Betsko Director of Sales & Marketing Software Solutions CLOUD SECURITY
  • 3. About Canon #MarcoTradeshow18 * Source: Canon results for the Fourth Quarter and FY ended December 31, 2017. (January 30, 2018) ** Source: IDC U.S. Quarterly Hard Copy Peripherals Tracker, 2017 Q4. (February 8, 2018)
  • 4. Canon Innovation #MarcoTradeshow18 * This amount is 8.1% of Net Sales. Source: Canon results for the Fourth Quarter and FY ended December 31, 2017. (January 30, 2018) ** Source: IFI CLAIMS® Patent Services, 2017 Top U.S. Patent Recipients. (January 9, 2018)
  • 5. 5 #MarcoTradeshow18 Canon and Marco Partnership  Top 20 Canon dealer nationwide  Canon APP “Advanced Partner Status”  Significant growth via acquisitions and sales  20% growth for past two years  Marco is authorized for Canon sales in Minnesota, Michigan (via a recent acquisition) and Illinois
  • 7. Rapid Growth of Cloud Computing #MarcoTradeshow18 * Source: IDC InfoBrief, sponsored by Canon, Digital Transformation & Emerging Technologies: The Canon Office of the Future Survey, Conducted by IDC, December 2017. ** Source: Canon White Paper, “Office Insights 2018” based on primary research commissioned by Canon U.S.A., conducted by Breaking Blue Online survey and in-person interviews among 381 IT decision-makers, influencers, and users in the U.S.
  • 9. Canon’s Role in Cloud #MarcoTradeshow18
  • 10. Common Business Challenges #MarcoTradeshow18
  • 11. Common Business Challenges #MarcoTradeshow18 1. Woolworths leaks $1 million of gift cards in massive data breach debacle. The Sydney Moring Herald, 31 May 2015. 3. G20 world leaders’ personal information leaked in ‘email error.’ The Guardian, 30 March 2015.
  • 12. Common Business Challenges #MarcoTradeshow18 SOLVED
  • 13. Strategic Partnerships #MarcoTradeshow18 cloud content management platform that works for all your content archives and governs all e-mail & attachments into Cloud Storage without end user behavior change.
  • 14. Access and Control #MarcoTradeshow18 1 4 Transfer to other company Control Governance Visibility of attached file URL URL URL ・Password ・Timed expiration ・Read-only ・Encrypted delivery To CC CC Edit /change the document Not open the file Now mxHero + Box access controls for attachments created without sender action Han Solo R2-D2 R2-D2 C-3PO Chewbacca Han Solo R2-D2 Chewbacca
  • 15. Cost Savings #MarcoTradeshow18 Email Server Storage URL URL URL 110MB E-mail storage 0.11MB E-mail storage [Customer Case] In the case, two employees get 10MB e-mail, the e-mail storage size would be… Now mxHero + Box
  • 16. Intelligent Filing of Important Emails #MarcoTradeshow18 INBOX Mail Filing Emails Client A Client B Matter 1 Matter 2 Matter 3 Email
  • 18. Security from Start to Finish #MarcoTradeshow18 Document Security Device Security  Measures to Help Protect the HDD  Digital Certificates  Security Policies  Measures to Help Protect Against Cyber Attack  Authentication  Secure Print / Forced Hold Network Security Information Security  Electronic Document Management  Access control for Email Attachments
  • 19. Security from Start to Finish #MarcoTradeshow18 All-inclusive, standard feature set Information Management Consistency across product line and continuous improvements Evaluated and proven ULM Forced Hold HDD Data Encryption FIPS 140-2 HDD PW Lock HDD Initialize Security Policy Settings TPM Ports Control * Models evaluated by Keypoint Intelligence/BLI Pacesetter Award – Document Imaging Security
  • 20. Security from Start to Finish #MarcoTradeshow18 Document Security Device Security  Measures to Help Protect the HDD  Digital Certificates  Security Policies  Measures to Help Protect Against Cyber Attack  Authentication  Secure Print / Forced Hold Network Security Information Security  Electronic Document Management  Access control for Email Attachments People & Workflow Frequency
  • 21. Securing Technology #MarcoTradeshow18 * Source: Canon White Paper, “Office Insights 2018” based on primary research commissioned by Canon U.S.A., conducted by Breaking Blue Online survey and in-person interviews among 381 IT decision-makers, influencers, and users in the U.S.
  • 22. Securing Technology #MarcoTradeshow18 We protect our information by securing our technology… Why not do the same for our MFPs?
  • 23. Why Output Management? #MarcoTradeshow18 IMPLEMENT SECURITY FEATURES MONITOR USAGE AND CONTROL COSTS REDUCE WASTE
  • 24. uniFLOW Online – Simple, Server-less, Secure ...all without needing to invest in a server infrastructure! Cloud-based solution for secure printing/scanning and cost-tracking, enabling small and medium-sized businesses to manage their print and scan environment...
  • 25. uniFLOW Online Dashboard #MarcoTradeshow18
  • 27. RELIABILITY ADVANCED SIMPLICITYCONSISTENCY Copier MFP Line of the Year Total A3 Copier/MFP Market share (B&W and Color)* * Based on Source: IDC U.S. Quarterly Hardcopy Peripherals Tracker, 2017 (Q4/FY), February 8, 2018 Data refers to laser MFPs Keypoint Intelligence PaceSetter Awards for Ease of Use, Mobile Printing, Document Security, and Vertical Markets EVOLVING
  • 28. Outstanding Reliability #MarcoTradeshow18 “Canon’s ability to pump out quality copier MFPs with outstanding reliability, comprehensive usability, and a high degree of software compatibility one year after the next is nothing short of astounding. The value that each machine in the line presents is unbeatable when you consider things like hearty device management functions, a sleek design, user-friendly drivers, plus cloud and mobile-readiness. All-in-all, Canon leaves no room for disappointment in their Copier MFP portfolio for yet another year.” “ “ - George Mikolay, Associate Director of Copiers/Production for Keypoint Intelligence-Buyer’s Lab

Notas do Editor

  1. Intro’s Key Focus Areas: Cloud technology and how it’s being adopted in today’s office environments Security – which is more important than ever and a significant concern for everyone in both our personal lives and as it relates to our business Reliability – still a top factor when deciding on an office technology provider, one of Canon’s core strengths
  2. MARKET PRESENCE – Canon started our business over 80 years ago in 1937 in Japan, and entered the US Market in 1955. Canon is a leading provider of digital imaging solutions that span across consumer products, office technology and software, and other industries, such as medical imaging equipment. We are noted for our financial stability and steady profitability, and are an industry-leader with $36.1 Billion in net sales for 2017. <Fortune 500 company since 1995> While on the consumer side, many people think of Canon as a “camera company”, our office technology area is on of our larger business units, and we’re a leader in this area, earning #1 MARKET SHARE for our A3 MFP products in color, B&W and total.
  3. RESEARCH AND DEVELOPMENT Canon’s commitment to research and development has resulted in a continuing stream of outstanding, innovative technologies and products. For 32 consecutive years, Canon Inc. has been among the top five companies granted U.S. patents, with the latest number at 3,285.** 2017: 3,285 U.S. Patents* #1 Among Japanese Companies for 13 Consecutive Years #3, Overall, U.S. Patents Among Top 5 U.S. Patent Holders for 32 Consecutive Years Canon invests approximately 8.1% of Net Sales annually into R&D There are a lot of numbers and figures that show the financial strength of Canon. The ones you see here, though, really translate to an easy to understand value for our customers. Last year alone, Canon invested $2.9 billion in Research & Development. That is up over 9% from the previous year. And, Canon’s R&D investment represents over 8% of net sales – an impressive commitment. This investment enables the ongoing development of innovative products and services and shows that Canon is engaged in efforts to discover new technologies that will help create future businesses. This focus on R&D activities has cemented Canon’s high status in the field of intellectual property. In 2017, Canon was granted nearly 3,000 patents in the United States, ranking it third in the world and the top ranked Japanese company. Number one was IBM. Number two was Samsung. Number three was Canon. This is impressive when you consider all of the large technology companies that fall further down on the list, such as Apple, HP, Microsoft, Intel, Cisco Systems, Amazon, Google, and so on. And, this isn’t just flash in the pan success. Canon has been in the top five in patents for the past 32 consecutive years! What does all this mean for our customers? You get reliable products with strong, innovative technology and they can trust that Canon will continue to deliver these types of products in the future. 
  4. Protecting Customer Data Compliance Cybersecurity Threats Security is something we’re hearing about every day, and it’s a valid concern with an increase in cyber attacks and changes to security regulations.
  5. Security is something we’re hearing about every day, and it’s a valid concern with an increase in cyber attacks and changes to security regulations. Here are areas to consider regarding security related to MFPS Network Security is a company-wide concern across all technologies on a network. Here, companies look to implement security policies and measures to protect against cyber attacks into an organization Device security - this is protecting the information being processed by the MFP and the integrity of the device firmware The third is Document Security <CLICK> Interestingly, while there’s not as much “hype” in this areas as it relates to media as well as competitors claims, this is arguably the area of most frequent occurrences. It does not take any level of knowledge to retrieve confidential information off of an output tray – it happens much more frequently than it should. You’ll learn in the authentication session that there’s a huge opportunity to implement authentication into today’s install base. You’ll learn how to communicate to your customers that implementing authentication solutions is taking the first step in security their MFP. Finally, you’ll learn in the security session how Canon can also help your customers in securing their electronic data from both within the company, as well as access control for information sent outside of the organization
  6. At a time when security is more important and relevant for customers than it’s ever been, the Canon product offering is stronger than it’s ever been. With the third generation of this platform, you now have extensive security features included within the standard offering. In our view, strong security shouldn’t be an option. And this extends throughout the entire line-up. We’ve seen from some other competitive offerings that the security features could vary from device to device. With Canon’s offering, this is consistent across the entire line-up. Consistency is a big weakness of competitors, especially HP. They introduced a number of new products with different Series (pro, enterprise, flow, managed flow) with different feature sets, including security capabilities. When they make a claim about the “world’s most secure printer” it’s difficult to know which they’re even referring to. And it’s not just Canon saying this. All third generation iR ADV models tested by BLI have received a rating of 10 out of 10 for security features. BLI has awarded us for “Pacesetter Award for Document Imaging Security”. And finally, with the third generation product line, we introduced the Unified Firmware Platform. With UFP, there’s a common source code across all models in the iR ADV family. Approximately twice a year, we introduce a new UFP firmware that includes additional features and updates. Similar to how you update to a new version of iOS on your iPhone. With each release, Canon has included additional features to address security. Examples include support for SMB 3.0, TLS Version selection, and Cipher Algorithm selection. Since the core of the firmware is common, all third generation iR ADV updates come together at the same time. So as strong as this product line is, it’s also continuing to improve and evolve.
  7. Security is something we’re hearing about every day, and it’s a valid concern with an increase in cyber attacks and changes to security regulations. Here are areas to consider regarding security related to MFPS Network Security is a company-wide concern across all technologies on a network. Here, companies look to implement security policies and measures to protect against cyber attacks into an organization Device security - this is protecting the information being processed by the MFP and the integrity of the device firmware The third is Document Security <CLICK> Interestingly, while there’s not as much “hype” in this areas as it relates to media as well as competitors claims, this is arguably the area of most frequent occurrences. It does not take any level of knowledge to retrieve confidential information off of an output tray – it happens much more frequently than it should. You’ll learn in the authentication session that there’s a huge opportunity to implement authentication into today’s install base. You’ll learn how to communicate to your customers that implementing authentication solutions is taking the first step in security their MFP. Finally, you’ll learn in the security session how Canon can also help your customers in securing their electronic data from both within the company, as well as access control for information sent outside of the organization
  8. Why don’t you apply log-in method onto MFP ?
  9. Why don’t you apply log-in method onto MFP ?
  10. Protecting Customer Data Compliance Cybersecurity Threats Security is something we’re hearing about every day, and it’s a valid concern with an increase in cyber attacks and changes to security regulations.
  11. As I mentioned earlier, the imageRUNNER ADVANCE line is at the core of our office products, and is an industry-leading MFP platform, winning Copier MFP Line of the Year for a third consecutive year from Buyer’s Lab. There are a lot of different analysts in our industry (GAP Intelligence, IDC, Gartner). Most of them really focus on industry trends and strategies. The difference with Buyer’s Lab is that they’re actually testing the products. Canon, as well as our competitors, send them many products to test and they look for productivity, reliability, image quality, feature set, security features, and much more. And based on this testing, BLI has for three years in a row they’ve determined that our products are the most deserving of this award. Canon’s core strengths and market differentiators are based in these 4 areas you see at the bottom of this slide: Reliability – with one of the most trusted brands for imaging equipment and the top product line for quality Consistency – regardless of bw, color, or speed range - user experience, feature support and device management is consistent across the fleet Advanced Simplicity – Intuitive user, admin, and service experience, even with the advanced feature set Evolving – An agile product line that has the ability to evolve with changing business needs
  12. Canon Inc R&D & Manufacturing teams are closely aligned to focus on enhancing quality. When the third generation imageRUNNER ADVANCE products were introduced in 2016, there were more than 530 design changes incorporated to enhance quality based on customer and field feedback. This continues to evolve – Since the launch of the third generation products in 2016, another 670 improvements have been made with system updates through Unified Firmware Platform, UI Improvements and some adjustments to hardware to further improve quality. Supported by our strong relationship with Marco