New Products

New Products

Research found that when an explosion starts, it requires a reaction speed of 120-150 milliseconds to halt it. After an explosion is detected, gas...

Drones have been increasingly deployed in search and rescue in recent years. However, it is hard to find a solution that could cover great...

Thanks to new machine-learning tools, researchers and police departments can use behavioral data to find the earliest signs an officer may be flouting policy...
startup competition

We are delighted to invite ground-breaking startups developing disruptive solutions in the security, defense and HLS fields to take part in the prestigious iHLS...

Aerospace giant Boeing has successfully completed the first outdoor flight tests of the cargo air vehicle (CAV), its electric vertical takeoff and landing (eVTOL)...

A new fingerprint identification system to increase security and reliability in the collection and verification of fingerprint records will be implemented by Canada’s security...

Unmanned vehicles control systems require a lot of space, and space is at a premium on a US Navy ship. Whether it's an aircraft...

Rolls-Royce has been quietly developing an integral system required to operate laser weapons on the battlefield for about a decade. The technology is an...

New training modules for tactical combat casualty care will be developed for the US Army. The military medicine education and training initiative will include...
counter UAV

  A Belarus-based company has announced the development of a mobile Counter Unmanned Aerial Vehicle jammer. The Groza-P2 C-UAV system, developed by KB Radar, will...
thermal detection

Today more than ever military forces and opposition groups are using night vision sensors and thermal devices. Detection by thermal imaging is an emerging...
vr gloves

  The U.S. Patent Office has recently published a patent application relating to a virtual reality (VR) glove that can measure the movement of individual...

The conference and exhibition Border, Perimeter and Offshore Security, organized by iHLS for the sixth year, was especially important this year over the backdrop...

Drones are transforming operations in a number of industries, including infrastructure inspection, agriculture, search and rescue, mining, and more. Drones are becoming an integral part...

Security environments are often a collection of disconnected layers of security products that leave gaps where threats can dwell undetected for hundreds of days....

Developing nations such as Indonesia, the Philippines or Vietnam in Southeast Asia, as well as Eastern European countries, haven’t been able to afford expensive...

GPS spoofing is a malicious attack that broadcasts incorrect signals to deceive GPS receivers, while GPS manipulation modifies a real GPS signal. GPS satellites...

For security practitioners, it could seem impossible to catch everything that happens in wide, crowded spaces such as airports, stadiums and other large, public...
entrepreneurs

By Chen Lupescu, IoT & Smart Technologies Entrepreneur, Mentor, Strategic Advisor A proper description of your company and product - the first significant step on...

A Russian face recognition system can be used to control access and prevent unsanctioned access in the military sector. The monitoring cameras of the...

When a disaster occurs, every minute counts. A new drone solution will provide 24/7 first-response service to disasters in Asia in less than one...

The deployment of 5G technologies offers opportunities for innovation, efficiency, and economic growth, but it may also present risks. The US administration seeks innovative...

iHLS Events