Integrating Video Analytics Technologies At Airports.

Only three years ago a Hezbollah terrorist passed safely and quietly at an airport, just before committing a terror attack in the city of Borges in Bulgaria. The terrorist was seen in the airport’s security cameras carrying a large duffle bag, which could have been hiding the explosives. There is no doubt that there is a critical need for finding solutions for more advanced security in airports.

Ipsotek has managed to develop a range of smart Video Analytics capabilities, meant to answer exactly these needs in the aviation industry and contribute to the effective management of security in airports. The company displayed its technologies at the Aviation Security Conference 2015, which took place in September at Dubai.

The company’s Video Analytics solutions include perimeter protection, intrusion detection, Crowd and Operations Management, including advanced Face Recognition. The company’s forensics solutions include identifying causes of security breaches by conducting effective face based or appearance based searches.
“The deployment of Ipsotek’s range of sophisticated video analytics meets the needs of aviation security bodies to effectively detect and respond to threats and incidents,” says Bill Flind, Chief Executive, Ipsotek Ltd. “Along with our exhibition partner, CNL, we’re looking forward to discussing with delegates, how the integration of analytics into security management & control systems can provide a new level of situational awareness and highly-effective automated threat & incident management within an airport’s day-to-day management.”

The Borges’ attack investigation revealed that the terrorist was walking around the terminal and around Israeli buses for several hours, examining their locations, and surveying his surroundings before exploding himself. Detecting such behavior, which could be taken as suspicious, amongst thousands of people in the airport is exactly where Video Analytics technology comes in, allowing calling attention to relevant factors inside a flood of existing information using smart algorithms.

I-HLS: http://bit.ly/1OcBkz7

 

 

« Karma Police: From Radio to Porn, British Spies Track Web Users’ Online Identities
U.S & China Talk Truce But Cyber War Remains »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DoSarrest Internet Security Ltd

DoSarrest Internet Security Ltd

DOSarrest is a fully managed security firm specializing in cloud based DDoS protection services to a worldwide client base.

Secure360

Secure360

Secure360 focuses on the following key areas: governance, risk and compliance, information security, physical security, business continuity management, and professional development.

ForgeRock

ForgeRock

ForgeRock, the leader in digital identity, delivers comprehensive Identity and Access Management solutions for consumers, employees and things to simply and safely access the connected world.

XBOSoft

XBOSoft

XBOSoft is a software QA and testing company. We cover the entire QA and testing life cycle including software and application security.

ASU Online - Information Technology Program

ASU Online - Information Technology Program

The Information Technology program at ASU Online provides you with the expertise to design, select, implement and administer computer-based information solutions.

ClearDATA

ClearDATA

The ClearDATA Managed Cloud protects sensitive healthcare data using purpose-built DevOps automation, compliance and security safeguards, and healthcare expertise.

Destel

Destel

Destel is a system integrator and provider of IT services focused on Advanced Network & Security Solutions.

Workz Group

Workz Group

Workz connects and protects mobile subscribers of today and tomorrow by providing secure removable or embedded SIMs and remote provisioning solutions for consumer, M2M and IOT devices.

Findings

Findings

Findings (formerly IDRRA) is a scalable AI powered assessment platform that streamlines security compliance across sectors, jurisdictions and regulatory frameworks.

Fischer Identity

Fischer Identity

Fischer Identity provide identity & access management and identity governance administration solutions.

Accelerator Frankfurt

Accelerator Frankfurt

Accelerator Frankfurt is an independent go-to-market program focused on Fintech, Cybersecurity and Digital B2B startups.

Selectron Systems

Selectron Systems

Selectron offers system solutions for automation in rail vehicles and support in dealing with your railway cyber security challenges.

Blackpanda

Blackpanda

Blackpanda is Asia’s premier cyber security incident response group, hyper-focused on digital forensics and cyber crisis response.

NextGen Cyber Talent

NextGen Cyber Talent

NextGen Cyber Talent is a non-profit providing a platform to increase diversity and inclusion in the cybersecurity industry.

CYBRI

CYBRI

CYBRI is a cybersecurity company helping businesses detect and remediate mission-critical vulnerabilities before they get exploited by hackers.

SolidityScan

SolidityScan

SolidityScan is an advanced smart contract scanning tool designed to uncover vulnerabilities and proactively address risks within your code.