Access Control

Access Control

military coping with coronavirus

In recent days, there has been a substantial increase in the involvement of world military forces and defense organizations in the states’ coping with...

A new technology offering a public non-contact temperature measurement may serve as an effective solution for coping with the spread of the coronavirus. The...
border control and biometric technologies

Border threats have been creating various challenges, met by innovative control technologies. New systems deliver high security and fast passenger processing times in border...
facial recognition

More police departments have explored the use of facial recognition technology for crowd control or to identify suspects. The Federal Bureau of Investigation (FBI)...

The US Department of Homeland Security has confirmed it will not expand face recognition scans to U.S. citizens arriving and departing the country. Earlier,...
counter drone tech

Drones are difficult to detect and identify from the cockpit of an aircraft. Security agencies in the UK have been concerned about the increasing...
heartbeat security

1New biometric security technology is being developed and tested by Sandia National Laboratories and Aquila, a small firm based in New Mexico. The biometric...
video analytics

Attend iHLS 7th Video Analytics Conference and Exhibition on December 19, 2019, at the Lago Conference Center, Rishon LeZion. A free display area will be...
video analytics

Attend iHLS 7th Video Analytics Conference and Exhibition on December 19, 2019, at the Lago Conference Center, Rishon LeZion. A free display area will be...

An unconventional imaging method is known as ghost imaging. One of its advantages is that it allows one to form an image by illuminating...
port security by UAV

UAV technology has been developing rapidly, and there are potentially important implications for the homeland security practitioners operating at maritime ports. Systems based on...
video analytics

Attend iHLS 7th Video Analytics Conference and Exhibition on December 19, 2019, at the Lago Conference Center, Rishon LeZion. Video Analytics technology has been undergoing...

Radiation cannot be detected by human senses. A variety of handheld and laboratory instruments can detect and measure radiation, for use by customs, police...
Photo EasySec Solutions at Nimrod Group

Industrial connected devices, the Industrial IoT, is a real opportunity for industries to share efficiently their resources and increase their productivity. However, network sharing...
Photo illust. NASA

Much of the airspace above outdoor venues and campuses is virtually unprotected from unauthorized drones. A counter-drone security platform will be equipped with high-resolution...
Photo illust by Pixabay

Law-enforcement agencies often use automated license-plate recognition (ALPR) technologies to identify the location of vehicles associated with criminal activity. The readers can be mounted...
Photo illus. X-Ray Wikipedia

Screening individuals and their belongings has become a crucial security need for event venues and large public gatherings, but establishing permanent checkpoints can be...
Photo illust. US Air Force

Electronic passports contain embedded electronic computer chips that store biometric information that can be used to authenticate the identity of the passport holder. A...
Photo illust Pexels

Prisons and correctional facilities have unique security challenges that other enterprises typically do not have. In addition to traditional security concerns such as perimeter...
Photo crowd by Pixabay

A new solution in the concealed weapons detection for public venues will be tested in a convention center in Toronto, Canada. The system uses...
video surveillance

Government agencies and businesses constantly seek new ways to make their areas safer and secure. An innovative artificial-intelligence-powered video surveillance system could help improve...

Safeguarding IT requires a multi-layered approach that incorporates security technologies and user training. Geofencing creates a virtual fence on a user's network access. This limits...

iHLS Events