Integrating Video Analytics Technologies At Airports.

Only three years ago a Hezbollah terrorist passed safely and quietly at an airport, just before committing a terror attack in the city of Borges in Bulgaria. The terrorist was seen in the airport’s security cameras carrying a large duffle bag, which could have been hiding the explosives. There is no doubt that there is a critical need for finding solutions for more advanced security in airports.

Ipsotek has managed to develop a range of smart Video Analytics capabilities, meant to answer exactly these needs in the aviation industry and contribute to the effective management of security in airports. The company displayed its technologies at the Aviation Security Conference 2015, which took place in September at Dubai.

The company’s Video Analytics solutions include perimeter protection, intrusion detection, Crowd and Operations Management, including advanced Face Recognition. The company’s forensics solutions include identifying causes of security breaches by conducting effective face based or appearance based searches.
“The deployment of Ipsotek’s range of sophisticated video analytics meets the needs of aviation security bodies to effectively detect and respond to threats and incidents,” says Bill Flind, Chief Executive, Ipsotek Ltd. “Along with our exhibition partner, CNL, we’re looking forward to discussing with delegates, how the integration of analytics into security management & control systems can provide a new level of situational awareness and highly-effective automated threat & incident management within an airport’s day-to-day management.”

The Borges’ attack investigation revealed that the terrorist was walking around the terminal and around Israeli buses for several hours, examining their locations, and surveying his surroundings before exploding himself. Detecting such behavior, which could be taken as suspicious, amongst thousands of people in the airport is exactly where Video Analytics technology comes in, allowing calling attention to relevant factors inside a flood of existing information using smart algorithms.

I-HLS: http://bit.ly/1OcBkz7

 

 

« Karma Police: From Radio to Porn, British Spies Track Web Users’ Online Identities
U.S & China Talk Truce But Cyber War Remains »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Charlton Networks

Charlton Networks

Charlton Networks provide a complete range of IT infrastructure, network and security solutions aimed at SME companies.

Codified Security

Codified Security

Codified is a testing platform for mobile application software. We make it easier than ever for companies to detect and fix security vulnerabilities and ensure their applications are compliant.

Span

Span

Span designs, develops and maintains information systems based on advanced technological solutions of global IT leaders.

Corrata

Corrata

Corrata is an award-winning provider of mobile security and data control solutions for enterprises.

Data Eliminate

Data Eliminate

Data Eliminate provide data destruction, secure end-of-life IT asset disposal, and data protection consultancy services.

Arctic Wolf Networks

Arctic Wolf Networks

Arctic Wolf Networks delivers the industry-leading security operations center (SOC)-as-a-service that redefines the economics of cybersecurity.

Voxility

Voxility

Voxility provides Infrastructure-as-a-Service in the biggest Internet hubs in the world.

Cypress Data Defense

Cypress Data Defense

Cypress Data Defense helps clients build secure applications by providing training, best practices, and evaluating security during every stage of the Secure Application Development Lifecycle.

Thistle Technologies

Thistle Technologies

Thistle Technologies is building tools that help connected device manufacturers build security resiliency into devices.

Intigriti

Intigriti

Intigriti helps companies protect themselves from cybercrime. Our community of ethical hackers provides continuous, realistic security testing to protect our customer’s assets and brand.

Creative Destruction Lab (CDL)

Creative Destruction Lab (CDL)

Creative Destruction Lab is a nonprofit organization that delivers an objectives-based program for massively scalable, seed-stage, science- and technology-based companies.

CyberUp

CyberUp

CyberUp is a nonprofit organization created to strengthen the cybersecurity workforce. We help employers reimagine how they grow and scale their cybersecurity workforce.

Muscope Cybersecurity

Muscope Cybersecurity

Muscope CYSR platform performs a risk assessment and offers a comprehensive overview of the potential cyber attack risks.

Kong

Kong

Kong - powering the API world. Increase developer productivity, security, and performance at scale with the unified platform for API management, service mesh, and ingress controller.

Insurica

Insurica

INSURICA is a full-service insurance agency built upon a tradition of integrity, industry leadership, and excellence.

Everfox

Everfox

Everfox (formerly Forcepoint Federal) has been defending the world's most critical data and networks against the most complex cyber threats imaginable for more than 25 years.