Please enable JavaScript in your browser!!! This site doesn't work if JavaScript is disabled!!!

Intelligent solutions for your security

 

There is no need manual high skilled drone flights anymore

We have developed an all-in-one solution where artificial intelligence drones make surveillance of secured area autonomously, with no ground operator presented

Our robots are full autonomy

We are multiplying the force of your security staff

We succeed at sites with large perimeters that requires rapid response

  • Increase the effectiveness of your existing security tools
  • Reduce costs and focus your resources on objectives that fortify your security
  • Get increased resilience to potential harm and hostile action

Use our intellectual drones to make your business safer

Drone, which is moving inside the perimeter, replaces numerous of surveillance cameras because it monitors every inch of the facility.

Drones are performing takeoff, flight and landing according to the pre-programmed schedule and route.

The video stream from copters is transmitted to the operator's monitor. The operator does not need to have any special skills to control the drone

Our clever drone acts like a fast eye on the sky, which is soaring above the suspicious area and transmits video stream to the facility administration

???
unknown person

How It Works

  1. 3D map of perimeter

    The system is building a 3D map of area of the facility or 3D map of the the controlled perimeter.

    If something has changed the 3D map is altered automatically

  2. Authorized personnel only

    ****
    this is our employee
    ****
    !!!!
    unknown person
    !!!!

    Meanwhile, our software, using artificial intelligence, builds the data base of personal who have access to the monitored area

  3. The threat response

    ALARM!!!

    ****
    AN UNKNOWN PERSON HAS BEEN DETECTED INSIDE THE PERIMETER!!! IMMEDIATELY SEND ALARM TO GUARDS!!!
    ****

    The build in artificial intelligence is constantly monitoring persons, which are have been detected inside the secured site, and if an unknown person is detected an alarm is raised

  4. The Patrolling

    20m 1 30m 2 30m 3 40m 4 40m 5 20m 6 20m 7 20m 8
    90° + - 1x T W

    Drones are performing, inside the property, autonomous patrol missions by schedule or constantly or on alarm, according predefined path, altitude, hover duration, camera direction, etc.

Subscriptions and prices

59.00

per month for one device,

billed monthly

Video archive:7 days
Number of devices:1
Maximum number of records about staff members, which will be stored in database:100

199.00

per month for one device,

billed monthly

Video archive:30 days
Number of devices:5
Maximum number of records about staff members, which will be stored in database:500

499.00

per month for one device,

billed monthly

Video archive:365 days
Number of devices:10
Maximum number of records about staff members, which will be stored in database:1000

The following payment methods are available:

Bank cards, Bank transfer

The Software

Our software receives video stream from drones to continuously monitor the perimeter and detect any unknown individuals who may be present. When an unknown person is detected, the system triggers an alarm to alert security personnel.

Our product is extremely useful in high-security settings, such as private properties, warehouses, power plants and government buildings. The product can help to prevent unauthorized access and enhance security by quickly alerting security personnel to the presence of unknown individuals.

time when employee has been seen by drone

7:008:009:0010:0011:0012:0013:0014:0015:0016:0017:0018:0019:00
this person has not been caught on camera during 7 hours and 27 minutes
this picture has been made at 8:29

In addition to its safety and security benefits, this type of software can also help businesses to improve their operations and productivity. By providing real-time data on the location of employees, businesses can gain a better understanding of how their employees are utilizing their time and resources. This can help managers to identify any bottlenecks or inefficiencies in their operations and take steps to address them.

The report about an employee

based on the data gathered by drone / drones

Ivan Kravets

Chief of development dept.

Total time, during which this person has been seen

Today This week Last week During this month

2 h 53 m

29 h 47 m

26 h 53 m

13 h 12 m

The Reports

monday

5 h 16 m

tuesday

6 h 10 m

wednesday

8 h 01 m

thursday

8 h 18 m

friday

5 h 58 m

saturday

0 h 0 m

sunday

0 h 0 m

Overall, the use of facial recognition technology in security systems is a powerful tool that can help to enhance security and prevent unauthorized access. By collecting a database of authorized individuals and continuously monitoring the perimeter for unknown individuals, this system provides an extra layer of protection for high-security facilities.

Have questions?


Товары и услуги реализуются совместно с plentr