Access Control

Access Control

video analytics

Attend iHLS 7th Video Analytics Conference and Exhibition on December 19, 2019, at the Lago Conference Center, Rishon LeZion. A free display area will be...

An unconventional imaging method is known as ghost imaging. One of its advantages is that it allows one to form an image by illuminating...
port security by UAV

UAV technology has been developing rapidly, and there are potentially important implications for the homeland security practitioners operating at maritime ports. Systems based on...
video analytics

Attend iHLS 7th Video Analytics Conference and Exhibition on December 19, 2019, at the Lago Conference Center, Rishon LeZion. Video Analytics technology has been undergoing...

Radiation cannot be detected by human senses. A variety of handheld and laboratory instruments can detect and measure radiation, for use by customs, police...
Photo EasySec Solutions at Nimrod Group

Industrial connected devices, the Industrial IoT, is a real opportunity for industries to share efficiently their resources and increase their productivity. However, network sharing...
Photo illust. NASA

Much of the airspace above outdoor venues and campuses is virtually unprotected from unauthorized drones. A counter-drone security platform will be equipped with high-resolution...
Photo illust by Pixabay

Law-enforcement agencies often use automated license-plate recognition (ALPR) technologies to identify the location of vehicles associated with criminal activity. The readers can be mounted...
Photo illus. X-Ray Wikipedia

Screening individuals and their belongings has become a crucial security need for event venues and large public gatherings, but establishing permanent checkpoints can be...
Photo illust. US Air Force

Electronic passports contain embedded electronic computer chips that store biometric information that can be used to authenticate the identity of the passport holder. A...
Photo illust Pexels

Prisons and correctional facilities have unique security challenges that other enterprises typically do not have. In addition to traditional security concerns such as perimeter...
Photo crowd by Pixabay

A new solution in the concealed weapons detection for public venues will be tested in a convention center in Toronto, Canada. The system uses...
video surveillance

Government agencies and businesses constantly seek new ways to make their areas safer and secure. An innovative artificial-intelligence-powered video surveillance system could help improve...

Safeguarding IT requires a multi-layered approach that incorporates security technologies and user training. Geofencing creates a virtual fence on a user's network access. This limits...
smart watch

A new series of smart campus products now support contactless student IDs in Apple Wallet. Allegion, which specializes in seamless access technologies, announced that the...
Photo-by-US-Customs-and-Border-Flickr

As the international dependency for Artificial Intelligence and facial recognition software for police and military forces increases, then so does the controversy revolving around...
photo illustration

The use of biometric identification has become more and more widespread. A new partnership will develop a biometric data-based identification platform that will significantly...
Photo illust. Wikimedia

While the debate continues in many countries regarding the privacy concerns of facial recognition technologies, new technology provides facial recognition system that has been...
border control

Blockchain first gained wide notoriety as the system that runs the Bitcoin digital currency transaction confirmation process. As a shared, synchronized database, with no...
Photo Smarter Security fastlane

Sidegating, when two people attempt unauthorized side-by-side entry through a turnstile, has become a growing security issue as changing regulations and customer demands for...
Photo-illust.-Wikimedia-US-Navy

The US Customs and Border Protection (CBP) processes nearly million visitors a day. The agency is responsible for border management and control, customs, immigration,...

Law enforcement agencies spend up to eight hours manually redacting each hour of body camera video footage. When redacting video footage, users are manually...

iHLS Events