Access Control

Access Control

video surveillance

Government agencies and businesses constantly seek new ways to make their areas safer and secure. An innovative artificial-intelligence-powered video surveillance system could help improve...

Safeguarding IT requires a multi-layered approach that incorporates security technologies and user training. Geofencing creates a virtual fence on a user's network access. This limits...
smart watch

A new series of smart campus products now support contactless student IDs in Apple Wallet. Allegion, which specializes in seamless access technologies, announced that the...
Photo-by-US-Customs-and-Border-Flickr

As the international dependency for Artificial Intelligence and facial recognition software for police and military forces increases, then so does the controversy revolving around...
photo illustration

The use of biometric identification has become more and more widespread. A new partnership will develop a biometric data-based identification platform that will significantly...
Photo illust. Wikimedia

While the debate continues in many countries regarding the privacy concerns of facial recognition technologies, new technology provides facial recognition system that has been...
border control

Blockchain first gained wide notoriety as the system that runs the Bitcoin digital currency transaction confirmation process. As a shared, synchronized database, with no...
Photo Smarter Security fastlane

Sidegating, when two people attempt unauthorized side-by-side entry through a turnstile, has become a growing security issue as changing regulations and customer demands for...
Photo-illust.-Wikimedia-US-Navy

The US Customs and Border Protection (CBP) processes nearly million visitors a day. The agency is responsible for border management and control, customs, immigration,...

Law enforcement agencies spend up to eight hours manually redacting each hour of body camera video footage. When redacting video footage, users are manually...

AI is increasingly found in everyday surveillance cameras and software. AI-powered video technology has been playing a growing role in tracking faces and bodies...

US border patrol teams need training and instruction from time to time. A new training solution will maximize the efficiency and effectiveness of border...

The use of facial recognition technologies has become a widespread phenomenon all over the world. Google, Apple, Facebook, Amazon, and Microsoft have developed their...

Law enforcement in the US has been using Google’s location history, designed primarily to send you targeted ads, as a tool to solve crimes...

At almost every wavelength, electromagnetic antennas can detect and record waves and create images at radio, microwave, infrared, visible, and x-ray frequencies. However, there...
offshore security

Attend the leading Border, Perimeter & Offshore Security Conference and Exhibition on May 7, 2019 at the Lago Conference Center, Rishon LeZion West. Israel is...
facial recognition

Passenger processing in airports often takes time and causes delays. A new facial recognition solution will offer check-in and immigration screening, robot assistants to...

Drone owners in the US are now required by the FAA to mark the drone registration number on the exterior of the aircraft. The...

Attend Border, Perimeter & Offshore Security Conference and Exhibition on May 7, 2019 at the Lago Conference Center, Rishion LeZion West. Israel is a global leader...
drones

Russia’s Mikran has recently announced its production of a new counter-drone drone robot. The device is built to...

A next-generation Enhanced Advanced Imaging Technology for checkpoint security screening has been operated for the first time in...

It appears that Amazon's facial recognition software wouldn't just be licensed to law enforcement agencies like Immigration and Customs Enforcement (ICE) to identify potential...

iHLS Events