SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on Cybersecurity

Read now!

ISAF Security offers more space for its exhibitors in 2015

Contact company
Contact Marmara Fair Organisation
icon Add as a preferred source Download PDF version
ISAF is the sole organisation of Eurasia in Security, Information-Network security and Smart Buildings
ISAF team is aiming at the visit of a bigger number of procurement committees from more countries this year

ISAF, being the sole organisation of Eurasia in Security, Information-Network security and Smart Buildings, is organised in 9th, 10th and 11th Halls of Istanbul Expo Center between September 17th and 20th, 2015. The leading companies in the sector already took their places in ISAF which will be organised for the 19th time this year. As ISAF achieves growth in the number of visitors every year, it will again achieve a serious growth this year.

More space for more exhibitors

ISAF which was organised only in the 9th and 10th Halls in the past years will host its visitors and exhibitors in 3 Halls in total by including the 11th hall. This happened thanks to the separation of Fire&Rescue and Safety&Health Exhibitions from ISAF and their organisation in their own weeks this year and this gave the opportunity to allocate more exhibition space for more exhibitors.

As well as the 9th and the 10th halls got full as of July 01st, the participation rate of the 11th hall has reached to 20%. Due to the fact that the conferences such as Security, IT Security and Smart Buildings which will take place for the first time this year will be organised simultaneously with ISAF, ISAF will provide a chock full exhibition week to its visitors with a great synergy.

Promotion studies continue unabated

ISAF promotional studies and announcements are performed on 150 billboards and 100 megalights in major junctions and regions across Istanbul within the framework of domestic promotion of the fair. In parallel to this, talks and studies with many domestic bodies such as associations, industrial zones and chambers are being arranged. Besides, ISAF which is the leading fair of Turkey in issues as security, information security and building automation technologies, has taken its place on the billboards in Perpa Trade Center where the heart of trade beats.

Along with this, ISAF team is aiming at the visit of a bigger number of procurement committees from more countries this year and maintains the studies on the subject at full speed. In the scope of these studies, many countries have been contacted such as USA, Australia, Spain, Egypt, Poland, Romania, and Ukraine. Nowadays as the studies regarding the buying committees are carried out pursuant to the demands of the exhibitor companies, more procurement committees will visit the exhibition this year, according to the ISAF team.

Smart buildings conference becomes actual

Due to the fact that the conferences such as Security, IT Security and Smart Buildings which will take place for the first time this year will be organised simultaneously with ISAF, ISAF will provide a chock full exhibition week to its visitors with a great synergy

A new conference will be added to the Security and IT Security Conferences which mark a new epoch with the effective issues and strong speakers every year. Smart Buildings Conference will be organised simultaneously with ISAF Smart Home Exhibition as an activity in which the innovations and changes emerged with the reflection of today’s technology to the products used at our homes will be presented.

Smart Buildings Conference which will be organised for the first time with detailed topics under the headline “Facility Management” will be organised with the support of Association International of Facilities Technical Managers (AIFTM). The professionals willing to enter the sector with information sessions and panels to be held in relation to the “Facility Management” will be able to access to the invaluable information.

IT security conference is getting stronger

IT Security Conference, the 4th of which will be organised this year, is getting stronger with the support from many non-governmental organisations and it will draw the attention to important topics in the sector together with the leading names in the sector and the decision makers in the public institutions.

The topics of IT Security Conference to be arranged simultaneously with ISAF IT Security Fair have been specified as follows:

  • Cyber Security
  • Mobile Security
  • SOME
  • Network Security
  • Hot spot and network authorization
  • Antivirus solutions
  • Confidentiality of Personal Information
  • Social Engineering
  • Log management and reporting
  • Next generation security products
  • UTM
  • DDOS solutions

Effective topics at the security conference

Security Conference to be organised simultaneously with ISAF which the sole activity is bringing all parties together in the security area has faced a dense interest in the last 3 years and this year it has been restructured.

This year’s topics of Security Conference reinforcing its importance in the sector have been determined and attained a strong structure with speakers specialised in their areas:

  • Transportation Security (Terminal/Harbour, Local Transportation and Travel Safety),
  • Transport Security (Hazardous/Explosives Transplant)
  • Sports Security (Sport Area Security and Crowd Control)

In the conference where the leading names in security area and decision makers in the related public institutions in the country will meet, current and important topics of the sector will be addressed and presentations will be made in this regard.

Find out about secure physical access control systems through layered cybersecurity practices.

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Security management
  • Sports security
  • Cyber security
  • Fire Safety
  • Related links
  • ISAF Security 2015
  • Related categories
  • CCTV cameras
  • Digital video recorders (DVRs)
  • Access control systems & kits
  • Intruder alarm system control panels & accessories
  • Intruder detectors
  • Intruder warning devices
  • Access control readers
  • Network video recorders (NVRs)
  • CCTV camera lenses
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Events news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec