Industrial Security

Industrial Security

mapping

3
A new geospatial mapping interface allows users to better comprehend physical location information. The use of static facility floor plans overlaid directly onto the...
drone detection tools

41
Alongside the new opportunities offered by drone technology, people become concerned about their security and privacy. There has been a growing need for drone...
big data for homeland security

128
iHLS fifth annual conference on Big Data for Homeland Security attracted many technology experts, investors, entrepreneurs and representatives of the high-tech industries, defense industries,...

207
The Internet of Things (IoT) merges software and hardware with network connectivity, for the benefit of creating smart cities and safe cities. IoT devices -...

75
  The Internet of Things (IoT) is an innovative field developing rapidly. In daily life it is about connecting computers and various smart devices such...

122
It's no news that today institutes from all sectors, international banks to hospitals, are seeking for a complete cyber defense layer. Cyber DriveWare, which...

113
The role of video analytics in the security and law enforcement fields has been growing, and its  functions have expanded to traffic control and...

140
Three new Video Management Platform (VMP) models for video security and monitoring purposes were introduced by Hitachi Insight Group. The models combine virtualized compute...

162
Many of today’s automobiles leave the factory with secret passengers: prototype software features that are disabled but can be unlocked by clever drivers. In what...

233
Robots might be the next trend for private security. For the moment, the robots are essentially designed to patrol a certain area. They've got...

149
A new technology, Watermark Ink (W-INK), can distinguish liquids by their surface tension. The technology that can perform instant, in-field characterization of the chemical...

239
Seaports customs and security professionals might sometimes miss contraband attempts, including radiological materials. The problem was hightened during a US congressional hearing, when officials...

152
3D printing is a new emerging technology with applications at the civilian and military production. However, it has some cybersecurity and other implications that...

348
Israel and the United States have recently signed a cyber defense declaration calling for real-time operational connectivity through respective Computer Emergency Response Teams (CERTS)...
video

194
Meet the robot which could well be the security guard of the future: A patrol robot with infrared vision, laser radar navigation, 360 degree...

191
Due to improvements in the field, the demands of connected cameras today are increasing. One of the technologies that security cameras offer us today is...

104
Leading experts from Israel and the world in the field of perimeter & offshore security are participating in the conference taking place today today...

456
Focus Telecom has launched a revolutionary new cyber product, GPSdome, which protects GPS devices from electronic jamming. The new GPS anti-jamming is designed to...

86
By Ilan Cohen, ITL CTO Two decades ago Israel was not a player in the explosive environment arena. There was some minimal activity in the...

139
Cyber is the war turf, that much has become painfully clear. The recent cyber attacks on Ukrainian electrical infrastructure demonstrate that much. The US...

178
A  simple Web search can reveal information from thousands of unsecured devices. Even the casual browser can access camera data from Sweden, video game...

286
There are many systems out there on the perimeter security market, the question is how to best combine them for maximum protection. The first line...

iHLS Events

5

1021