To recap from part one of our cUAS Technology Series, there are two primary functions of cUAS technology: the first is to identify or detect drone activity. The second function is to intercept the airspace threat or defeat the drone.
Dedrone’s cUAS Technology Series covers each of these elements, breaking down the types of technologies and common questions. In this edition, we explore types of detection software. cUAS software takes the data collected from hardware, such as RF, cameras, acoustic sensors, and radar. Software amalgamates sensor inputs, performs machine-learning analysis, and is the central nervous system for a complete solution.
Counterdrone software is designed to make it easy to assess data and make decisions on how to approach an unwanted drone. The core elements of counterdrone software include:
Security providers must be alerted in real-time when there is an intrusion, whether by email, SMS or through other operating picture/monitoring systems. Counterdrone software should have the ability to easily and quickly showcase archive data for past events, so users can dig deeper into incidents as needed
A user interface should be easy to use and not require extensive training or a dedicated specialist to operate. Additionally, the software should provide tiered multi-user access and provide real-time notifications of an approaching drone. Graphical summary reports should be automatically produced and available on-demand for easy analysis of the most critical airspace security data.
Counterdrone software should be nimble and flexible enough to integrate into third party command and control platforms (C2), providing one common operating picture for security or operations personnel. An open API allows for easy integration of alert data and tracking data to be passed to whoever and wherever the data is most relevant and needed for display.
Drone detection software should constantly be updating, much like antivirus software and malware protection tools. Automatic software updates that deliver major new features ensure the system keeps up with the evolution of the drone industry and users’ security needs.
Counterdrone software needs to be readily accessible while meeting the user’s specific technology requirements and security policies. Using an on-premise deployment, people who must host software locally can do so. Those who can deploy cloud-based systems can access their data anytime, anywhere.
The next edition in this series will discuss drone defeat systems, and how it uses the data collected from the hardware to make a decision whether or not an object in the sky is a drone or otherwise.
We welcome your feedback on this series, and our readers can reach us with questions and comments at email@example.com