Airspace Security - Semi autonomous and turnkey security solutions, designed and customized to a specific need, scenario, issue or group of issues. Airspace Security comes complete with UAV, smart sensors, payloads, hardware, mission planning, a tactical application, data fusion, a mission auditing tool, communications, maintenance, personnel, operators and pilots.
Modern security requires a layered approach that keeps up with the evolution of drone technology. Sensors connect to our software, which detects, classifies, and protects against drone threats, including localizing the drone and its pilot. Passive and active countermeasures can be triggered, tailoring the defense mechanism to the severity of the threat.
Airspace Security - Detect a Drone
RF Sensors are purpose-built for airspace security and collect hard data on drone activity in the airspace. They detect all kinds of drones and have a coverage range over over 1 mile in ideal conditions.
RF Sensors detect drones and remote controls by their radio frequency (RF) signatures. Commercial, hobbyist, and homebrew drones are detected, including the entire DJI product line.
Advanced Video Analytics
Machine-learning video algorithms for detecting and locating the position of drones are key parts of the solution. Using feeds from high-resolution video cameras, Airspace Security software distinguishes between drones and other moving objects, and plots the position and flight path of a drone on map.
DroneV is a machine learning system and classification engine that recognizes drones of all kinds. Trained on millions of images and data points, it can distinguish between different drone models, and detect the difference between drones and other moving objects such as birds, planes, or other objects.
DroneV signatures are continually updated via the cloud, enabling the Airspace Security system to be always up-to-date to protect against the latest threats. It’s not enough to secure the airspace against drone-based threats. Airspace's localization technology enables users to find the location of the pilot and drone, making termination of the threat much more practical.
Airspace Security - Reporting and Forensic Evidence
Sensors and integrated external video cameras record forensic evidence of drone intrusions. A combination of forensic data is automatically captured by the software, including drone manufacturer, model, time and length of drone activity, and video verification. Summary reports are automatically produced and available on-demand for easy analysis of the most critical airspace data.
Multiple layers of security can be added by integrating sensors such as radar, infrared, or acoustic devices. When layered on top of the Airspace Security RF Sensor, these additional sensors add extra layers of information, extending detection range or adding capabilities to the system.
Video cameras integrate with Airspace software to provide situational awareness, visual identification, and forensic recording. Video analytics are powered by DroneDNA database, allowing the solution to distinguish drones from airplanes, birds, and other moving objects.
Radar is designed to meet the challenges of long range, low-visibility, and areas with significant obstacles. It can detect larger fixed wing targets at over 3 km, and smaller multi-rotor drones at over 750 m. Radar integrates directly into Airspace Security software, delivering a single pane-of-glass view of sensor data.
The jammer system affects drones using GPS, GLONASS, Galileo, WLAN 2.4 GHz, and from 5000-6000 MHz. It can be custom-programmed to address specific threat scenarios.
Protect Your Facility
Passive and active countermeasures can be integrated into the solution, depending on needs and capabilities. Together with detection from sensors, they secure the airspace security around your facility.
Passive and active countermeasures can be integrated into the airspace security solution, depending on needs and capabilities. Together with detection from sensors, they secure the airspace security around your facility.
Passive countermeasures protect your facility by leading people to safety, blocking sensitive areas from view, locking (cell) doors and gates, shutting down parts of the IT infrastructure, and searching for dropped objects.