Kinesense

Kinesense Ltd is a trusted provider of intelligent video solutions, purpose-built for the demands of law enforcement. We bring key functions into one place: ingesting video from almost any source, using AI video analytics to alert & filter key events, enabling real-time detections and rapid review, and exporting court-ready packages with full audit trails. Whether your […]

Genetec

Genetec Inc. is a global technology company that has been transforming the physical security industry for over 25 years. The company’s portfolio of solutions enables enterprises, governments, and communities around the world to secure people and assets while improving operational efficiency and respecting individual privacy. Genetec delivers the world’s leading products for video management, access […]

Gedion

Gedion is the market leader for covert miniaturized audio surveillance equipment concealed in Credit card or SD card footprint. We combine Radio, Bluetooth, 4G, GNSS to provide most effective and ultra-innovative solutions to government organizations worldwide. Main products include: Credit card audio recorder with GPS and Bluetooth SD card audio recorder Wi-Fi, Radio store & […]

NEC Software Solutions

At NEC Software Solutions, our security and policing portfolio is entering a new era – defined by AI enhanced workflows and secure, scalable cloud-native foundations. Our next-generation platforms span security and policing operations from first contact to crime, intelligence and case preparation, and include Command & Control, mission-critical communications, world-leading Biometrics and Facial Recognition technology; […]

Sesanti Limited

Sesanti produce high-performance overt and covert specialist surveillance systems for customers around the world. Developed for reliability and performance during extended deployments in the harshest environments, we minimise weight and volume whilst preserving deployment simplicity for the extreme pressures of specialist Security and Policing operations. From ultra-low-acoustic-noise, cooled thermal imagers, to large multi-spectral asset and […]

Fujitsu Services

Fujitsu has spent more than half a century strengthening the UK’s critical national infrastructure, consistently advancing security and innovation. Working closely with the UK Public Sector, we help organisations achieve their strategic ambitions. Together with our partners, we deliver next‑generation solutions that transform identity management, enhance situational awareness, and boost operational efficiency. Our approach, using […]

Digital Barriers

Digital Barriers is a revolutionary video technology provider that empowers individuals, organisations, and society with instant insights to support mission-critical decision-making. Through our patented AI-based video codec and secure edge platform – now available as a modern, containerised solution – we help customers across law enforcement, public safety, defence, transportation, industry, and critical infrastructure unlock […]

Phonexia

Phonexia is an innovative Czech software company founded in 2006 with a vision to unlock voice potential with voice biometrics and speech recognition technologies. Through its close relationship with a renowned speech research group at the Brno University of Technology, Phonexia is transforming the latest scientific breakthroughs into the everyday reality of highly accurate, state-of-the-art […]

Cursor Insight

Walking Recognition: AI-powered biometric technology that identifies individuals based on their unique gait (motion patterns) and body dimensions. Court-admissible forensic tool, recently accepted as evidence in an EU murder case Achieves 99+% accuracy (EER below 0.1% in combined gait + body structure analysis) Excels where other biometrics fail: low light, low resolution, masked faces, or […]

Packet Forensics Intl

Packet Forensics provide direct support to cyber operations and are a market leader in complex network surveillance and active network defense through our wired, wireless, data and managed service products.  Our team excel in cyber operational areas and develop complex software and equipment to collect, process and manipulate data flows. Our capabilities can be used […]