Integrating Video Analytics Technologies At Airports.

Only three years ago a Hezbollah terrorist passed safely and quietly at an airport, just before committing a terror attack in the city of Borges in Bulgaria. The terrorist was seen in the airport’s security cameras carrying a large duffle bag, which could have been hiding the explosives. There is no doubt that there is a critical need for finding solutions for more advanced security in airports.

Ipsotek has managed to develop a range of smart Video Analytics capabilities, meant to answer exactly these needs in the aviation industry and contribute to the effective management of security in airports. The company displayed its technologies at the Aviation Security Conference 2015, which took place in September at Dubai.

The company’s Video Analytics solutions include perimeter protection, intrusion detection, Crowd and Operations Management, including advanced Face Recognition. The company’s forensics solutions include identifying causes of security breaches by conducting effective face based or appearance based searches.
“The deployment of Ipsotek’s range of sophisticated video analytics meets the needs of aviation security bodies to effectively detect and respond to threats and incidents,” says Bill Flind, Chief Executive, Ipsotek Ltd. “Along with our exhibition partner, CNL, we’re looking forward to discussing with delegates, how the integration of analytics into security management & control systems can provide a new level of situational awareness and highly-effective automated threat & incident management within an airport’s day-to-day management.”

The Borges’ attack investigation revealed that the terrorist was walking around the terminal and around Israeli buses for several hours, examining their locations, and surveying his surroundings before exploding himself. Detecting such behavior, which could be taken as suspicious, amongst thousands of people in the airport is exactly where Video Analytics technology comes in, allowing calling attention to relevant factors inside a flood of existing information using smart algorithms.

I-HLS: http://bit.ly/1OcBkz7

 

 

« Karma Police: From Radio to Porn, British Spies Track Web Users’ Online Identities
U.S & China Talk Truce But Cyber War Remains »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Imperva

Imperva

Imperva is a leading provider of data and application security solutions including DDoS protection, Web application security, Data security and Cloud security.

LogRhythm

LogRhythm

LogRhythm's security platform unifies SIEM, log management, network and endpoint monitoring, user behaviour analytics, security automation and advanced security analytics.

MNCERT/CC

MNCERT/CC

MNCERT/CC is the national Computer Emergency Response Team for Mongolia.

TechGuard Security

TechGuard Security

TechGuard Security was founded to address national cyber defense initiatives and US critical infrastructure security.

TCPWave

TCPWave

TCPWave IPAM is the world’s first acclaimed DNS/DHCP management software to pass the most stringent Information security tests.

Oak Ridge National Laboratory (ORNL)

Oak Ridge National Laboratory (ORNL)

ORNL conducts basic and applied research and development in key areas of science for energy, advanced materials, supercomputing and national security including cybersecurity.

TUV Rheinland Group

TUV Rheinland Group

TUV Rheinland Group is a testing services company with nearly 145 years of technological experience. We help you to protect your systems comprehensively, proactively and permanently.

National Health Care Anti-Fraud Association (NHCAA)

National Health Care Anti-Fraud Association (NHCAA)

National Health Care Anti-Fraud Association is the leading national organization focused exclusively on the fight against health care fraud.

CyberASAP

CyberASAP

CyberASAP provides expertise, knowledge and support to convert academic ideas into commercial products in the cyber security space.

CONCORDIA

CONCORDIA

Concordia is a Cybersecurity Competence Network with leading research, technology, and competences to build the European Secure, Resilient and Trusted Ecosystem.

AuthLite

AuthLite

With AuthLite, you can keep using all your existing software, with added two-factor authentication security placed exactly where you need it.

OpenAVN (DefenseArk)

OpenAVN (DefenseArk)

Defending your life online, keeping your data safe and private. We detect digital threats magnitudes faster than the leading antivirus software.

Hub71

Hub71

Hub71 is a world-class tech ecosystem opening doors to global opportunities from an optimal business environment for entrepreneurial-minded innovators.

Regtank Technology

Regtank Technology

Regtank is a one-stop compliance solution for fintechs, navigating compliance, security and risk management.

ProArch

ProArch

ProArch is a global team of multidisciplinary experts in cloud, infrastructure, data analytics, cybersecurity, compliance, and software development.

Sekur Private Data

Sekur Private Data

Sekur Private Data Ltd. is a Cybersecurity and Internet privacy provider of Swiss hosted solutions for secure communications and secure data management.