Contents

IBM Digital Audit

I. Executive Summary: IBM’s Operational Foundation and Complicity Profile

This technographic audit of International Business Machines Corporation (IBM) assesses the company’s technical and operational linkages to the Israeli military, surveillance apparatus, and systems supporting the occupation of Palestine. The investigation focused on four Core Intelligence Requirements (CIRs): proprietary dual-use technology stacks, surveillance system adoption, digital transformation mandates, and cloud/data sovereignty initiatives.

The analysis confirms that IBM maintains a multi-decade, deeply embedded, and operationally critical relationship with the Israeli state and, specifically, the Israeli Ministry of Defense (IMOD). This relationship extends beyond standard commercial vendor status, encompassing decades of high-value infrastructure contracts, direct deployment of personnel within military IT units, the development of specialized military-grade Artificial Intelligence (AI) models, and strategic entanglement with the core Israeli cybersecurity technology ecosystem.

Synopsis of Key Complicity Vectors:

  1. Direct IMOD Support: IBM has been a sustained provider of high-value, mission-critical infrastructure, including central servers, storage systems, and cloud foundations, under contracts valued in the hundreds of millions of US dollars.1
  2. Operational Embedding: Crucially, IBM personnel are physically embedded within the military infrastructure, working alongside IMOD soldiers in the Computer and IT Unit on the operational military network.1 This provides direct technical expertise and ensures continuous maintenance of the military’s digital backbone.
  3. Algorithmic Enablement: IBM has created and deployed the IBM Defense Model, a purpose-built, dual-use AI system optimized for deployment in classified, air-gapped military networks, accelerating mission planning and operational decision support.3
  4. Supply Chain Integration: IBM’s global security portfolio, particularly the QRadar Security Information and Event Management (SIEM) platform, maintains official technical integrations with key Israeli dual-use cybersecurity firms, such as Check Point Software Technologies.5

IBM’s strategic commitment to “Digital Sovereignty” is observed to align directly with the high-security requirements of military and intelligence agencies, providing a critical architectural and ideological congruence that facilitates its role as a key technology provider to the Israeli security state.3 The evidence firmly establishes that IBM’s operational footprint and specialized product development materially and technically support the advanced digital capabilities utilized by the IMOD and related state entities.

II. IBM’s Institutional Entrenchment and Strategic R&D Footprint

IBM’s operational entanglement with the Israeli state is defined by its institutional longevity, geographic scale, and specific focus on advanced, dual-use technology research and development (R&D).

A. Historical Context and Institutional Longevity

IBM is a globally integrated enterprise, but its presence in Israel is foundational, dating back over half a century. The history of IBM R&D in Israel began in 1972 with the establishment of the IBM Israel Scientific Center in the Technion’s Computer Science Building in Haifa.7 This longevity, spanning five decades, demonstrates that IBM is not merely a recent commercial participant but a deep-seated partner in the development of the Israeli high-tech and computing sector.

The IBM Haifa Research Lab (HRL) rapidly gained prominence, eventually becoming the largest research laboratory outside of the United States.8 During the 1980s, HRL undertook major research and development projects that focused on technologies critical to contemporary military and intelligence systems, including Hebrew computational linguistics, signal processing, document recognition and processing, handwritten and printed text recognition, data compression, and Very-Large-Scale Integration (VLSI) design verification and testing tools.8 These early focus areas—text and signal processing, computational linguistics, and advanced analytics—establish a clear, historical trajectory toward the development of dual-use technologies essential for modern intelligence operations.

B. Geographic and Workforce Footprint

IBM has leveraged mergers and acquisitions (M&A) to further solidify its technical footprint, integrating Israeli technological expertise into its global product line. Notable acquisitions include iPhrase Systems, which developed software for automated classification of texts and maintained an R&D center in Jerusalem.7 Another key acquisition was Unicorn Solutions, a developer of metadata management software for ontology modeling and semantic mapping.7 These mergers cemented local expertise in sophisticated data classification and exploitation systems.

The current operational scale is substantial, with over 3,000 individuals employed at various IBM R&D locations across Israel as of 2023.7 These operations are geographically dispersed across major high-tech hubs, including Haifa, Tel Aviv, Herzliya, Rehovot, Jerusalem Technology Park, Givatayim (Hashachar Tower), and Be’er Sheva.7

The R&D centers—specifically IBM Research Israel—are strategically focused on core, defense-related dual-use technologies, including Artificial Intelligence, Hybrid Cloud, Security, Quantum Computing, and Natural Language Understanding.10 For example, the R&D center in Givatayim concentrates on developing hybrid cloud solutions using leading-edge technologies such as Kubernetes, containers, and serverless computing, while maintaining a strong emphasis on security leadership and enterprise-grade infrastructure.14

The extensive network of R&D facilities, combined with a workforce exceeding 3,000 employees, confirms that IBM’s local activities are development-focused, rather than limited to sales or service support. The deep historical roots and continuous research investment in computer vision, advanced security protocols, and analytical AI directly contribute to the technical talent pool and specialized software capabilities required for the Israeli military’s ongoing technological modernization. This extensive operational foundation functions as an indigenous source of highly sensitive, dual-use technology, mitigating the IMOD’s potential reliance on unstable foreign technology sources.

III. Core Intelligence Requirement 4: Cloud Infrastructure and Digital Sovereignty

The analysis of IBM’s relationship with the Israeli defense establishment reveals deep involvement in providing mission-critical computing infrastructure, operational support, and strategic ideological alignment through the concept of digital sovereignty.

A. IMOD Contractual History and Embedded Operational Support

IBM’s financial and technical support for the IMOD has been sustained over decades. Contractual evidence demonstrates that IBM has consistently supplied the backbone of the military’s computational hardware. In 2008, IBM secured a 3-year, US$60 million contract from the Israeli military for the provision of servers, supplemented by an estimated US$6–7 million contract for virtual Vmware servers.1 This high-value relationship continued, resulting in a contract in 2011 valued at hundreds of millions of US dollars for the provision of storage and central servers to the IMOD.1

This relationship moved beyond simple hardware supply with the establishment of the Israeli military’s internal operational cloud in 2017. This cloud, essential for sharing operational information among critical divisions—including the Israeli Air Force, Intelligence, Ground Forces, and Navy—was developed in collaboration with IBM’s subsidiary, Red Hat, and based on its technologies.1

The highest degree of operational entanglement is evidenced by the direct embedding of personnel. Since the early 2000s, dozens of IBM Israel employees have been outsourced to work directly alongside soldiers from the Israeli military’s Computer and IT Unit. These personnel provide ongoing software development, updates, and upgrades for the military’s network and digital infrastructure.1 This physical integration of IBM personnel into the IMOD’s operational structure signifies a high degree of operational and technical complicity, ensuring the continuous optimization and security of military networks.

B. Digital Sovereignty as a Strategic Enabler

IBM’s strategic positioning around “Digital Sovereignty” is highly relevant to its defense contracts. IBM defines sovereignty as a design principle focusing on jurisdictional control, regulatory compliance, and control over how data is governed and accessed.6 This concept aligns perfectly with the stringent security and legal demands of military and intelligence bodies, which require assurance that highly sensitive, classified data will not be subject to foreign legal jurisdiction or external access.

The provision of air-gapped or classified network deployment capabilities is a core component of this strategy, allowing defense agencies to run AI tools inside the “strictest security boundaries,” a requirement IBM specifically addresses in its defense model.3 This ideological and architectural alignment facilitates IBM’s ability to become a trusted, mission-critical partner to the IMOD, reinforcing the military’s command over its data and operations.

Project Nimbus Contextualization

It is necessary to clarify the distinction regarding “Project Nimbus.” While activist organizations globally cite IBM alongside Google and Amazon for providing cloud infrastructure and AI to the Israeli Ministry of Defense 15, the Israeli government’s specific $1.22 billion Project Nimbus cloud contract was awarded to Amazon and Google in 2021.15 It is crucial to note that IBM’s documented involvement in a separate, identically named UK-based “NIMBUS” project, focused on energy asset data, is not related to the Israeli government’s initiative.17

Regardless of the specific Nimbus contract award, IBM’s established, massive infrastructure contracts with the IMOD, coupled with its active role in delivering AI and cloud technologies, confirms its role as a high-level computing provider enabling military and security operations.1

C. Support for Surveillance and Population Data Systems

IBM’s provision of foundational computational resources is intrinsically linked to the function of large-scale state control systems. Activist groups have implicated IBM in supporting the infrastructure utilized by US tech companies to collect and store extensive amounts of Palestinian civilian data within the Population Registry computing system, in cooperation with Israel’s Population, Immigration, and Border Authority.15

The critical implication of this infrastructure support is that IBM provides the core computational resources—servers, storage, cloud infrastructure, and advanced analytics capabilities developed in its Israeli R&D centers—necessary for a modern security state to operate mass surveillance and population tracking systems. By furnishing the foundational infrastructure and sophisticated data management software, IBM materially enables the creation and exploitation of centralized, sensitive Palestinian civilian data sets. The capability for security and defense agencies to manage and analyze massive unstructured and structured datasets is precisely the focus of IBM Research Israel, confirming its deep role in enabling centralized state control systems.14

IV. Core Intelligence Requirement 1: The IBM-Israel Military AI Nexus (Algorithmic Complicity)

IBM’s strategic focus on Artificial Intelligence has led to direct, formalized collaboration with the Israeli military, resulting in the development of specialized AI models optimized for classified defense and intelligence purposes. This represents a transition from generalized IT supply to active, algorithmic enablement of military capabilities.

A. Joint AI/ML Projects and Dual-Use Technology

IBM maintains joint Artificial Intelligence (AI) and Machine Learning (ML) projects with the Israeli military’s Computer Service and Cyber Defense Divisions.1 This collaboration is a direct channel for ensuring that IBM’s cutting-edge AI research—a primary focus of IBM Research Israel, encompassing natural language processing, computer vision, and optimization 10—is adapted and integrated specifically for military and intelligence applications.

The integration of advanced AI technology is critical for modern defense, moving military decision support away from reliance on static, outdated intelligence. IBM research teams are actively developing core technologies to improve the state-of-the-art in natural language processing and generation, computer vision, optimization, and AI trust.13 These are all essential components for sophisticated military analysis and automated operational systems.

B. The IBM Defense Model: Dedicated Military AI

The culmination of this collaboration is the explicit development and deployment of the IBM Defense Model, announced in partnership with defense intelligence provider Janes. This model is purpose-built to deliver mission-relevant, defense-specific intelligence and is designed to accelerate mission planning, improve analytical accuracy, and boost operational readiness for defense and national security organizations.3

Technical Specifications and Deployment:

  1. Specialized Training: The model is trained specifically on Janes’ trusted defense data and military doctrine, enabling it to accurately understand domain-specific terminology, operational tactics, and mission-level strategies.18 This specialized training is intended to prevent the false or off-target responses common in general large language models, providing precise, verified answers.18
  2. Architecture: The system is powered by IBM’s Granite foundation models and operated through its enterprise-level AI studio, watsonx.ai.3
  3. Secure Deployment: The system is designed to run in air-gapped or classified networks, where sensitive data remains isolated from the public internet. This feature directly addresses military requirements for data sovereignty and security within classified environments.3
  4. Integration into Command Systems: The model is designed to integrate seamlessly into existing defense networks via an application programming interface (API), making it compatible with advanced systems focused on accelerating data sharing and battlefield decision-making, such as Project Maven.18

The development and offering of this mission-specific AI represents a profound layer of complicity. The IBM Defense Model is explicitly engineered for optimal performance within air-gapped military networks and is intended to accelerate battlefield decision-making, ensuring “speed, precision and confidence”.4 When integrated with the already-established IMOD contracts for storage, servers, and the operational cloud infrastructure 1, this AI model constitutes a direct algorithmic contribution to the military’s advanced warfare and targeting capabilities. By supplying the critical intelligence layer needed for rapid targeting and operational readiness, IBM is actively contributing to the technology identified by analysts as enabling “advanced AI targeting and weapons systems”.15 This transition confirms IBM’s role as an active partner in algorithmic militarization.

V. Core Intelligence Requirement 2: The “Unit 8200” Cybersecurity Stack Reliance

IBM’s role in the global technology landscape necessitates professional and technical engagement with the dominant Israeli cybersecurity firms, many of which trace their origins to the Israeli military’s Unit 8200 intelligence corps. This creates a technical interdependence that binds IBM’s global offerings to this specific supply chain.

A. Direct Integration: Check Point Software Technologies

The most direct linkage involves the integration of key Israeli cybersecurity vendors into IBM’s core security platforms. IBM QRadar SIEM (Security Information and Event Management), a flagship platform utilized by enterprises and governments globally for security analysis and threat detection, maintains an official integration with Check Point Software Technologies, Inc..5

Check Point is explicitly noted as a leading provider of cybersecurity solutions to governments and corporate enterprises globally.5 The partnership facilitates the feeding of rich information about incoming cyber threats and critical firewall data into the IBM QRadar SIEM.5 This technical partnership means that IBM’s security monitoring and incident response capabilities are reliant upon, and therefore financially support, integrating threat intelligence and data processing originating from a critical Israeli-origin vendor.5 This technical reliance constitutes a material commitment to sustain the operational reach of Check Point within the enterprise security market.

B. Ecosystem Interdependence: CyberArk, SentinelOne, and Wiz

Beyond direct integrations, IBM operates within a market landscape where its consulting services and hybrid cloud management must accommodate a deeply interlocked Israeli cybersecurity ecosystem. Key Israeli firms like CyberArk, Wiz, and SentinelOne dominate critical sectors of enterprise security, forcing IBM to validate, maintain, and support their technologies for its massive global customer base.

  • CyberArk (Identity Security): CyberArk’s AI-powered Identity Security Platform is globally recognized for applying intelligent privilege controls.21
  • Wiz (Cloud Security): Wiz, a cloud security decacorn, has forged a strategic partnership with CyberArk to improve multi-cloud security, specifically targeting the complex vulnerabilities associated with privileged access across human and machine identities in cloud-native environments.22
  • SentinelOne (Endpoint Security): SentinelOne, a leader in AI-powered Endpoint Detection and Response (EDR), is integrated with CyberArk. This collaboration enhances visibility and boosts defenses against attacks that compromise privileged access by combining the strengths of EDR and endpoint identity security.21

These strategic alliances—such as the CyberArk and Wiz integration, and the CyberArk and SentinelOne integration—form a powerful, unified security environment that IBM Consulting must support for any enterprise client using hybrid or multi-cloud infrastructures. Because these firms represent the vanguard of Israeli-developed cloud, identity, and endpoint security—often referred to as the ‘Unit 8200 Stack’—their market dominance compels IBM to professionally integrate, maintain, and sustain this technological ecosystem globally. IBM is therefore financially and professionally committed to ensuring the operational success of these key technological components of the Israeli defense supply chain.

The reliance on and integration with this specific technical ecosystem is formalized in the following manner:

Table: IBM’s Linkage to the Israeli Cybersecurity Ecosystem

Strategic Israeli Vendor IBM Product Linkage Complicity Level Significance
Check Point Software Technologies IBM QRadar SIEM (Official App Exchange Partner) Material/Operational Direct reliance for threat detection and data processing integration in IBM’s flagship security product.
CyberArk Indirect (Customer Ecosystem Support) Technical/Market Dominant player in Identity Security, forming critical alliances with other Israeli firms (Wiz, SentinelOne) that IBM customers rely on.
Wiz Indirect (Customer Ecosystem Support) Technical/Market Leader in Cloud Security, strategically allied with CyberArk, requiring IBM support for cloud environments.
SentinelOne Indirect (Customer Ecosystem Support) Technical/Market Leader in AI-powered Endpoint Security, integrated with CyberArk, requiring IBM service and integration support.

VI. Core Intelligence Requirement 3: Surveillance, Biometrics, and Retail Tech Complicity

An assessment of IBM’s direct utilization or promotion of retail technology or loss prevention software originating from key Israeli surveillance firms confirms a nuanced relationship, defined by internal capability rather than external partnership dependence.

A. Retail Technology Overlap (Trigo, Trax)

The investigation identified potential adjacent market presence but lacked evidence of formal, direct partnerships with high-profile Israeli firms specializing in biometric and surveillance-related retail technology.

  • Trigo: Trigo, an Israeli firm, is known for computer vision and AI for frictionless checkout (EasyOut®) and loss prevention, relying on real-time tracking of shopper movements and product interactions.24 Trigo is listed alongside IBM in certain industry materials 24, suggesting market overlap or indirect integration within the retail technology ecosystem.
  • Absence of Direct Partnership: No direct technical partnerships or mandated integrations were found between IBM and prominent surveillance or biometrics firms such as BriefCam (video analytics), Oosto (formerly AnyVision, facial recognition), or Trax (retail image recognition).26

B. Internal Video Analytics Capability

The reason for the lack of direct reliance on Israeli surveillance vendors is attributable to IBM’s extensive, indigenous R&D capabilities in Israel. IBM Research Israel has active departments dedicated to advanced research in Computer Vision, Image and Video Analytics, and general AI technologies.8 The early work of the IBM Haifa Research Lab included signal processing, portrait compression, and handwritten and printed text recognition.8

This sophisticated, decades-long internal expertise in image analysis and video analytics allows IBM to develop or integrate its own surveillance-enabling tools. The capability to transform unstructured video data into a structured database for search, smart alerting, and comprehensive reporting is a core offering of modern video analytics.29 By possessing advanced, internal capabilities developed through its research facilities (such as the Haifa Think Lab 12), IBM mitigates the need to contract with external Israeli third-party surveillance vendors like BriefCam or Oosto. Instead, IBM can deploy its internally developed or integrated surveillance-enabling tools directly to its government, law enforcement, or retail clients globally.

VII. Detailed Summary of Material and Operational Complicity (Data Foundation)

The accumulated evidence establishes multiple layers of involvement across infrastructure, personnel, and algorithmic domains, confirming IBM’s critical role as a technological enabler of the Israeli security apparatus. The highest points of evidence are synthesized below to provide a precise foundation for assessing the depth of complicity.

Table: IBM’s High-Complicity Linkages

Complicity Vector Status Evidence Detail Nature of Support
Direct Military Infrastructure High Multi-million dollar contracts (2008, 2011) for central servers, storage systems, and foundational IT infrastructure for the IMOD. Material/Financial
Operational Embedding High IBM employees are outsourced and work directly alongside IMOD soldiers on the development and maintenance of the military’s operational cloud (Red Hat based). Operational/Personnel
Algorithmic Militarization High Development and deployment of the specialized IBM Defense Model, an AI optimized for mission planning, wargaming, and decision support in air-gapped defense environments. Technical/Strategic AI
Cybersecurity Supply Chain Moderate Direct integration and official partnership with Check Point Software Technologies for threat intelligence feed into IBM QRadar SIEM. Supply Chain/Technical
Digital Sovereignty Support High Strategic enterprise focus on providing sovereign cloud architecture that specifically meets the high-security and jurisdictional control requirements of defense organizations. Ideological/Architectural
Surveillance Infrastructure Moderate Cited in activist reporting as enabling technologies used for the Population Registry (Palestinian civilian data collection) alongside other major tech firms. Infrastructure/Data

VIII. Conclusion and Implications for Digital Complicity Ranking

IBM’s operational history and current strategic focus confirm a high degree of digital complicity. The nature of this relationship is defined by its strategic, long-term depth rather than purely transactional sales.

The evidence confirms IBM functions as a strategic infrastructural backbone for the Israeli security state. The continuity of high-value infrastructure contracts dating back over a decade and the development of the Israeli military’s operational cloud demonstrate a persistent commitment to maintaining the core digital systems of the IMOD.1 This is compounded by the unprecedented operational embedding of IBM personnel directly within military IT units, ensuring that the company’s expertise is used to optimize and sustain the command and control network used by the Israeli military.1

A critical finding is the escalation of this support into the realm of advanced warfare technology. The provision of the specialized IBM Defense Model moves IBM’s complicity profile from a generalized IT supplier to an active algorithmic partner. This model, explicitly designed for air-gapped, classified military intelligence and decision support, directly contributes to maximizing the efficiency, precision, and speed of military operations.3

Furthermore, IBM’s high technical interdependence with the Israeli cybersecurity sector, exemplified by the crucial integration of Check Point into IBM’s global security platform, QRadar SIEM 5, ensures that IBM’s market success is partially predicated on the continuous professional validation and support of the broader ‘Unit 8200 Stack’ that dominates identity, endpoint, and cloud security globally.

The totality of the evidence—spanning decades of R&D in sensitive dual-use technology, sustained infrastructure supply, operational embeddedness, and the delivery of mission-specific AI—indicates that IBM provides material, operational, and intellectual support for the Israeli military’s IT and AI capabilities.

Works cited

  1. The Israeli Occupation Industry – IBM: A Major … – Who Profits, accessed December 9, 2025, https://www.whoprofits.org/publications/report/158
  2. International Business Machines Corp – AFSC Investigate, accessed December 9, 2025, https://investigate.afsc.org/company/ibm
  3. IBM Unveils Mission-Ready Defense AI Model for Decision Support – Efficiently Connected, accessed December 9, 2025, https://www.efficientlyconnected.com/ibm-unveils-mission-ready-defense-ai-model-for-decision-support/
  4. IBM Announces Defense-Focused AI Model to Accelerate Mission Planning and Decision Support, accessed December 9, 2025, https://newsroom.ibm.com/2025-10-29-ibm-announces-defense-focused-ai-model-to-accelerate-mission-planning-and-decision-support
  5. Integrations – QRadar SIEM | IBM, accessed December 9, 2025, https://www.ibm.com/products/qradar-siem/integrations
  6. Sovereign cloud on a global scale: Designing for resilience, trust and innovation – IBM, accessed December 9, 2025, https://www.ibm.com/think/insights/sovereign-cloud-on-a-global-scale
  7. IBM Israel – Wikipedia, accessed December 9, 2025, https://en.wikipedia.org/wiki/IBM_Israel
  8. History of IBM research in Israel – Wikipedia, accessed December 9, 2025, https://en.wikipedia.org/wiki/History_of_IBM_research_in_Israel
  9. Timeline of IBM, accessed December 9, 2025, https://timelines.issarice.com/wiki/Timeline_of_IBM
  10. accessed December 9, 2025, https://research.ibm.com/labs/israel#:~:text=With%20locations%20in%20Haifa%2C%20Givatayim,security%2C%20quality%2C%20and%20more.
  11. Givatayim site visitor information – IBM Research, accessed December 9, 2025, https://research.ibm.com/haifa/givatayim_hashachar_info.shtml
  12. Israel – IBM Research, accessed December 9, 2025, https://research.ibm.com/labs/israel
  13. Israel | AI – IBM Research, accessed December 9, 2025, https://research.ibm.com/haifa/dept/imt/index.shtml
  14. IBM Israel Software Development – IBM Research, accessed December 9, 2025, https://research.ibm.com/haifa/software.shtml
  15. No Tech for Oppression, Apartheid or Genocide | BDS Movement, accessed December 9, 2025, https://bdsmovement.net/no-tech-oppression-apartheid-or-genocide
  16. End UN Partnership with Genocide-Enabling Tech in AI for Good Conference and Regulate AI and Cloud as Dual-Use Technology | BDS Movement, accessed December 9, 2025, https://bdsmovement.net/news/end-un-partnership-genocide-enabling-tech-ai-good-conference-and-regulate-ai-and-cloud-dual
  17. NIMBUS – Icebreaker One, accessed December 9, 2025, https://ib1.org/energy/nimbus/
  18. IBM Debuts Military-Grade AI Designed for Secure Defense Ops, accessed December 9, 2025, https://militaryai.ai/ai-ibm-secure-defense/
  19. IBM Announces Defence-Focused AI Model to Accelerate Mission Planning and Decision Support, accessed December 9, 2025, https://canada.newsroom.ibm.com/2025-10-29-IBM-Announces-Defence-Focused-AI-Model-to-Accelerate-Mission-Planning-and-Decision-Support
  20. SentinelOne & Check Point Joint Solution Brief, accessed December 9, 2025, https://assets.sentinelone.com/singularity-marketplace-briefs/checkpoint-joint-sb-en
  21. CyberArk and SentinelOne Team Up to Enable Step Change in Endpoint and Identity Security, accessed December 9, 2025, https://www.cyberark.com/press/cyberark-and-sentinelone-team-up-to-enable-step-change-in-endpoint-and-identity-security/
  22. CyberArk and Wiz join forces to enhance cloud security in multi-cloud environments – CTech, accessed December 9, 2025, https://www.calcalistech.com/ctechnews/article/rkxojfmmjl
  23. CyberArk and Wiz partnership, accessed December 9, 2025, https://www.cyberark.com/wiz/
  24. Trigo – Computer Vision AI For Retail – CIOCoverage- Driven for Technology Leaders, accessed December 9, 2025, https://www.ciocoverage.com/trigo-computer-vision-ai-for-retail/
  25. Retail Solutions with Vision AI | Trigo, accessed December 9, 2025, https://www.trigoretail.com/
  26. Facial recognition firm Oosto, formerly AnyVision, sold for $125M after raising $352M | Ctech, accessed December 9, 2025, https://www.calcalistech.com/ctechnews/article/sk5ewnswke
  27. BriefCam Partnerships in security and safety technologies, accessed December 9, 2025, https://www.briefcam.com/partners/our-partners/
  28. About Us – Trax Retail, accessed December 9, 2025, https://traxretail.com/company/about-us/
  29. Video Analytics Solutions for Business – Technology – BriefCam, accessed December 9, 2025, https://www.briefcam.com/technology/video-analytics/

 

Related News & Articles