Integrating Video Analytics Technologies At Airports.

Only three years ago a Hezbollah terrorist passed safely and quietly at an airport, just before committing a terror attack in the city of Borges in Bulgaria. The terrorist was seen in the airport’s security cameras carrying a large duffle bag, which could have been hiding the explosives. There is no doubt that there is a critical need for finding solutions for more advanced security in airports.

Ipsotek has managed to develop a range of smart Video Analytics capabilities, meant to answer exactly these needs in the aviation industry and contribute to the effective management of security in airports. The company displayed its technologies at the Aviation Security Conference 2015, which took place in September at Dubai.

The company’s Video Analytics solutions include perimeter protection, intrusion detection, Crowd and Operations Management, including advanced Face Recognition. The company’s forensics solutions include identifying causes of security breaches by conducting effective face based or appearance based searches.
“The deployment of Ipsotek’s range of sophisticated video analytics meets the needs of aviation security bodies to effectively detect and respond to threats and incidents,” says Bill Flind, Chief Executive, Ipsotek Ltd. “Along with our exhibition partner, CNL, we’re looking forward to discussing with delegates, how the integration of analytics into security management & control systems can provide a new level of situational awareness and highly-effective automated threat & incident management within an airport’s day-to-day management.”

The Borges’ attack investigation revealed that the terrorist was walking around the terminal and around Israeli buses for several hours, examining their locations, and surveying his surroundings before exploding himself. Detecting such behavior, which could be taken as suspicious, amongst thousands of people in the airport is exactly where Video Analytics technology comes in, allowing calling attention to relevant factors inside a flood of existing information using smart algorithms.

I-HLS: http://bit.ly/1OcBkz7

 

 

« Karma Police: From Radio to Porn, British Spies Track Web Users’ Online Identities
U.S & China Talk Truce But Cyber War Remains »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Zix

Zix

Zix offers secure email encryption, threat protection, archiving, DLP and BYOD security for hospitals, financial services, government, and more.

DynaRisk

DynaRisk

DynaRisk helps companies protect their staff, clients and supply chain from cyber threats by enabling people to take action for themselves.

Fujitsu

Fujitsu

Fujitsu is the leading Japanese global information and communication technology company, offering a full range of products, solutions and services including Managed IT Services and Cyber Security.

Pareteum

Pareteum

Pareteum is a leading Global provider of mobile networking software and services. Our mission is to provide a single solution to the problem of fully enabling and securing the Mobile Cloud.

CybernetIQ

CybernetIQ

CLAW by CybernetIQ is the industry's most advanced SOAR platform helping unify all cybersecurity tools under one umbrella and providing organizations faster, better and more accurate cybersecurity.

Kinetic Investments

Kinetic Investments

Kinetic Investments is a venture capital firm dedicated to early-stage companies that are transforming the digital landscape.

Wickr

Wickr

Wickr's mission is to secure the world's most critical communications. Wickr provides the highest standard of encryption trusted by millions worldwide.

Intrepid Solutions and Services

Intrepid Solutions and Services

Intrepid Solutions and Services provides technology solutions and professional services to key components of the intelligence and national security communities.

Twingate

Twingate

Twingate help organizations secure and manage access to their technology resources in a world where people work from anywhere.

Stronghold Cyber Security

Stronghold Cyber Security

Stronghold Cyber Security is a consulting company that specializes in NIST 800, the Cybersecurity Framework and the Cybersecurity Maturity Model Certification.

Pathway Communications

Pathway Communications

Established in 1995, Pathway Communications – is part of the Pathway Group of Companies, a Canadian IT Managed Services organization.

The Cyber Guild

The Cyber Guild

The Cyber Guild is a not-for-profit organization working to improve the understanding and practice of cybersecurity, and to help raise awareness and education for all.

CloudWave

CloudWave

CloudWave, the expert in healthcare data security, provides cloud, cybersecurity, and managed services to healthcare organizations.

Securonix

Securonix

Securonix delivers a next generation security analytics and operations management platform for the modern era of big data and advanced cyber threats.

UM6P Ventures

UM6P Ventures

UM6P Ventures is an African based early-stage ventures firm operating two funds; a Digital Transformation fund and a Deeptech Ventures fund.

aFFirmFirst

aFFirmFirst

aFFirmFirst is a unique software solution offering a simple yet effective way for businesses to protect and control their online images and logo, as well as allowing one-click website verification.