Integrating Video Analytics Technologies At Airports.

Only three years ago a Hezbollah terrorist passed safely and quietly at an airport, just before committing a terror attack in the city of Borges in Bulgaria. The terrorist was seen in the airport’s security cameras carrying a large duffle bag, which could have been hiding the explosives. There is no doubt that there is a critical need for finding solutions for more advanced security in airports.

Ipsotek has managed to develop a range of smart Video Analytics capabilities, meant to answer exactly these needs in the aviation industry and contribute to the effective management of security in airports. The company displayed its technologies at the Aviation Security Conference 2015, which took place in September at Dubai.

The company’s Video Analytics solutions include perimeter protection, intrusion detection, Crowd and Operations Management, including advanced Face Recognition. The company’s forensics solutions include identifying causes of security breaches by conducting effective face based or appearance based searches.
“The deployment of Ipsotek’s range of sophisticated video analytics meets the needs of aviation security bodies to effectively detect and respond to threats and incidents,” says Bill Flind, Chief Executive, Ipsotek Ltd. “Along with our exhibition partner, CNL, we’re looking forward to discussing with delegates, how the integration of analytics into security management & control systems can provide a new level of situational awareness and highly-effective automated threat & incident management within an airport’s day-to-day management.”

The Borges’ attack investigation revealed that the terrorist was walking around the terminal and around Israeli buses for several hours, examining their locations, and surveying his surroundings before exploding himself. Detecting such behavior, which could be taken as suspicious, amongst thousands of people in the airport is exactly where Video Analytics technology comes in, allowing calling attention to relevant factors inside a flood of existing information using smart algorithms.

I-HLS: http://bit.ly/1OcBkz7

 

 

« Karma Police: From Radio to Porn, British Spies Track Web Users’ Online Identities
U.S & China Talk Truce But Cyber War Remains »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ITrust

ITrust

French cybersecurity pure player since 2007. ITrust offers its Cyber expertise services and develops disruptive products in Cyber/Artificial Intelligence.

Citicus

Citicus

Citicus provides world-class security, risk and compliance management software, plus supporting services.

Cyber London (CyLon)

Cyber London (CyLon)

CyLon is a leading cyber security accelerator and seed investment programme. We help entrepreneurs from across the globe to build cyber security businesses, raise investment, and develop partnerships.

OEDIV SecuSys

OEDIV SecuSys

OEDIV SecuSys (formerly iSM Secu-Sys) develops high-quality IT software solutions, setting standards as a technology leader in the area of identity and access management.

Corvid

Corvid

Corvid is an experienced team of cyber security experts who are passionate about delivering innovative, robust and extensive defence systems to help protect businesses against cyber threats.

SYSGO

SYSGO

SYSGO is the leading European provider of real-time operating systems for critical embedded applications in the Internet of Things (IoT).

International Data Sanitization Consortium (IDSC)

International Data Sanitization Consortium (IDSC)

IDSC is a group composed of individuals and companies dedicated to standardizing terminology and practices across the data sanitization industry.

BTblock

BTblock

Blockchain and cybersecurity is a vital combination for Enterprise success. BTblock is a Force Multiplier for its clients.

Vigilant Technology Solutions

Vigilant Technology Solutions

Vigilant is a global cyber security technology company offering solutions to manage entire IT & cyber security lifecycles.

Crypto International

Crypto International

Crypto International offers comprehensive services for the operation of our customers’ IT and communication infrastructure, with a focus on cybersecurity and encryption solutions.

Cardonet

Cardonet

Cardonet is an IT Support and IT Services business offering end-to-end IT services, 24x7 IT Support to IT Consultancy, Managed IT and Cyber Security.

Fortify 24/7

Fortify 24/7

Fortify 24×7 provides a robust portfolio of managed cybersecurity solutions to help you identify and prevent attacks.

ReasonLabs

ReasonLabs

ReasonLabs have created a next-generation anti-virus that is enterprise grade, yet accessible to any personal device around the world.

vCISO Services

vCISO Services

vCISO Services is a small, specialized, veteran-owned firm focused on the needs of SMBs only.

GTT Communications

GTT Communications

GTT are a global network provider that serves thousands of multinational and national enterprise, government and carrier customers with a portfolio of advanced connectivity and security services.

NextGen Cyber Talent

NextGen Cyber Talent

NextGen Cyber Talent is a non-profit providing a platform to increase diversity and inclusion in the cybersecurity industry.