Infrastructure Security

Infrastructure Security

pipelines

More than $38 billion is spent annually monitoring oil and gas pipelines using less efficient means, which often identify problems only long after they’ve...
swarm

Despite perimeter fences and other site barriers, intrusion into protected areas is not uncommon. When trespassing is detected in a protected area, the main...
shooter

Several cases of mass shooting in public places have occurred in the US in recent years. A small, relatively inexpensive device could make the...
groundbreaking technologies

We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for civilian defense, securing government institutions vital infrastructure and borders,...

Some people consider IoT (the Internet of Things) as the next industrial revolution. The connected devices networks present in all aspects of life and...
synagogues

Jewish organizations in the US face multiple types of threats, including from far-right nationalists and neo-Nazis, radical Islamists and far-left anti-Israel activists. Some synagogues...
cyber security

As the frequency and sophistication of cyber-attacks continuously increase, governments and critical infrastructure providers face significant challenges. A cyber security solution designed for customers...
hacking

The US government has recently issued a rare public warning about hacking campaigns targeting energy and industrial firms. The Department of Homeland Security and...
spider-like drone

One of the challenges drone developers face is the flight time: the ability to stay in the air for long enough to be useful,...
video surveillance

Intrusion detection is the most critical step in securing border protection of any kind. An advanced thermal radar utilizes a rotating FLIR Tau2 thermal...
video analytics

The new technology revolution is here. Video analytics is expected to be the next big opportunity for installers, system integrators and others, to win...
drone identification

As drones have become an everyday tool for professional and personal use, authorities want to be sure they can identify who is flying near...
video analytics

Video analytics can be used for various purposes - motion detection for security, facial recognition & license plate reading, people counting for retail stores...
solar uas

A solar electric, fixed wing, long endurance, long range Unmanned Aircraft System is the only solar electric unmanned aerial system to provide long endurance...
video analytics

Israel is a leading player in the Homeland Security arena, with proven field capabilities and experience. Leading Israeli companies are involved in many of...
drone threat

Do commercial drones pose a genuine security threat? Owen West, a former Marine who U.S President Donald Trump hired to advise Secretary of Defense...
mapping

A new geospatial mapping interface allows users to better comprehend physical location information. The use of static facility floor plans overlaid directly onto the...
inspection

One of the dangerous consequences of natural disasters can be gas leakages, and their detection is a complex mission in the aftermath of storms...
infrastructure inspections

Unmanned aerial systems can be used effectively for various sorts of critical infrastructure inspection missions, as the networks are spread over vast geographical areas....
underwater operations

A new drone under development is designed to be able to plunge almost 10 meters into the water and surface and fly from that...
drone attacks

With the commercialization of drones, public security and critical infrastructure security have been exposed to potential drone attacks, thus becoming a major concern for...
gas installations

Securing offshore oil and gas installations, which can represent a strategic target for enemies, requires a wide array of advanced systems. Gas discovery in...