Transportable Solutions



In many applications, the need for a vehicle based drone detection system is preferred, over a permanent installation on a building. In many situations, there will not be any infrastructure to support a permanent installations - the V2 Sentry System provides the perfect solution.


Law Enforcement


Executive Protection


Natural Resources and Conservation


Private Security


Public Events


Version 2's V2 Sentry System constantly monitors drone communications with a detection range of up to 1500 meters. By analyzing the signals, it can uniquely identify drones and categorize unidentifiable signals into various threat levels for the majority of commercially available drones. The Sentry software displays threats and issues instant audio and/or email alerts.

Our drone/UAV detection system, the V2 Sentry, offers robust area-wide site coverage. Installation has been simplified as the detection system is self-configuring requiring no specialized programming expertise. Processing of threats, analysis, and communications relies on a laptop or permanently installed server.




Sentry Software

The Sentry software installs onto any Windows/Mac/Linux computer with Java. The software is easy to install, and will be up and running within minutes.

In operation, the V2 Sentry reports continuously to a server where the signals are analyzed using a variety of techniques and further processing confirms the threat. The server then immediately sends an alert through desktop and/or mobile platforms.

Current communication traffic, threat status, and system status are all displayed by the Sentry software. Alerts and detection sensitivity can also be fully customized in the preferences.

The Drone Monitor Map displays the sensor/vehicle location and threat stauts in real time, allowing you to assess the current drone activity in one look.





Capabilities

Built-in Self-Test - Continuous system status monitoring and display

Alerts - Audio and/or email alerts issued upon threat detection

Live View - Monitor all electronic communication traffic in range

Replay Mode - Replay historic data for forensic analysis

Alert Time - 2 seconds typical

Simultaneous Threats - over 100

Software Compatibility - Windows / Mac / Linux

Spec Sheet