Dedrone logo

Energy and Utilities

While energy manufacturers and utilities are implementing drone surveying and inspection programs around the world, these organizations must also protect critical infrastructure, such as power stations and water reservoirs, from unwanted drones. With drones becoming ever more inexpensive, easy to fly, and able carry heavy payloads, the risk of not securing the airspace only increases every day.

dedrone Solutions

  • Protect critical infrastructure
  • Detect drones even before they take off
  • Provide forensic evidence of drone attacks
  • Integrate into existing security and monitoring systems
  • Are compatible with utilities’ internal drone programs

See It Live

Join us for an interactive webinar, Protect Arena & Stadium Airspace from Drone Threats, on May 02, 2018.

How Dedrone Can Help

Detect drone

Dedrone RF Sensors detect drones up to a mile away and give early warning of drone-based threats, often even before the drone takes off.

Alert Security Teams

Warnings and alerts are triggered automatically and can be sent to a mobile phone, monitoring platform, or any API-compatible system.

Track drone

By incorporating sensors such as RF or video cameras, users can track the flight path of the drone and reveal the location of the pilot.

Jam drone

Active countermeasures, including RF and GPS jamming, can easily and quickly remove a drone before it gets too close to the facility.

Capture drone

Once a drone is disabled, it can be retrieved, confiscated, and examined to determine the nature of the threat.

Locate and arrest pilot

Dedrone’s direction-finding technology locates the positions of drones and their pilots, adding important situational awareness of the airspace.

Provide evidence

All alerts, flight paths, and video footage of drone threats are automatically recorded and catalogued. These are easily exported to share with law enforcement.

Harden Security

Drones often look for security gaps, on both physical and IT infrastructure. By identifying potential areas of exploit, teams can examine their security for potential gaps.

Want to learn more?