Drone technology advances rapidly, and only a software-centric solution can keep up. DedroneTracker software, hosted in the cloud or on-premise, uses our DedroneDNA database to recognize and classify RF, WiFi, and non-WiFi drones. DedroneTracker also integrates with 3rd-party sensors, and triggers alerts and countermeasures.
DedroneDNA is a cutting-edge system and classification engine that recognizes drones of all kinds. Trained on millions of images and data points, it can distinguish between different drone models, and detect the difference between drones and other moving objects such as birds, planes, or other objects. DedroneDNA signatures are continually updated via the cloud, enabling the Dedrone system to be always up-to-date to protect against the latest threats.Learn More ->
DedroneSensors and integrated external video cameras record forensic evidence of drone intrusions. A combination of forensic data is automatically captured by the DedroneTracker software, including drone manufacturer, model, time and length of drone activity, and video verification. Summary reports are automatically produced and available on-demand for easy analysis of the most critical airspace security data.View Sample Report ->
Dedrone’s advanced, cutting-edge algorithms are built-in to DedroneTracker software, enabling the system to reliably detect the difference between drones and other moving objects in the airspace.
Based on an image recognition and classification library, the underlying analytics are trained on millions of data points and are continually updated via the cloud. DedroneTracker accepts video from off-the-shelf surveillance cameras, turning them into full-time airspace monitoring sensors.
The Dedrone Cloud makes deployment simple, eliminating the need for on-premise servers. DedroneSensors automatically connect to the cloud, and frequent software updates ensure the airspace is protected against the latest drone threats. For environments requiring on-premise management, local management configurations are also available.
DedroneTracker is built on Dedrone’s leading DedroneDNA database. Automatically updated and continuously trained through machine learning on drone signatures, it enables DedroneTracker to detect the latest threats 24/7.
Using advanced video analysis or RF signal processing, localization technology pinpoints the locations of drones, plotting them on an integrated map, enabling users to find the source of drone-based threats.
DedroneSensors are the foundation of the detection solution, providing early warning of malicious activities. Additional video sensors and radar aid detection, show real-time views, and archive video evidence.
By combining several sensors, large spaces with complex layouts can be secured effectively. Data from all sensors are combined and processed centrally in the cloud or an on-premise environment.
DedroneTracker integrates with your existing security system. Surveillance cameras, radar or 3rd-party counter-measures such as automatic blinds, fog bombs, or jammers are easily connected via the API.
Alarms are triggered as soon as the approach of a drone is detected. Alerts can be sent through SMS, the software user interface, e-mail, network (TCP/IP), SNMP, or smartphone push notification.
All detected events are recorded and stored locally, including collection of drone type, and model. If installed, video cameras accurately classify whether detected objects are drones and record video evidence — including the flight path of drone.
Automated summary reporting delivers the most critical information up-front. Find how many drones are intruding into your airspace, and details such as drone model, intrusion time, and frequency of recurrence.
Modern security requires a layered approach. Dedrone hardware and software technology is augmented through 3rd-party sensors and countermeasures, allowing customers to adapt the solution to their exacting specifications.
Multiple sensors can be connected to the DedroneTracker software, allowing for detection of even the most obscure drones. Both passive and active countermeasures can be triggered via the API, tailoring the defense mechanism to the severity of the threat.