Use case: Perimeter Defence

Remotely defend unauthorised intrusions

Warn, control, and eliminate identified threats, enabling optimal reaction.

Perimeter Defence is linked to the battle management system, feeding the data to C4ISR-systems directly allowing the usage of all weapons systems.

c2 room command and control

Perimeter Defence Capabilities

Pinpoint targets using different sensors and systems

Pinpoint targets using different sensors and systems

screen icon

Highly tailorable
& extensible system

The system extends to meet the location specifics, user needs and requirements. Linked directly to the battle management system, feeds the required data directly to the C4ISR-systems allowing the usage of all weapons systems.

chart icon

Enabling optimal reaction

At all times, Perimeter Defence identifies exactly what is threatening the secured perimeter allowing the most optimal reaction to all land, sea and air-based threats.

icon

Designed to operate with other systems and operational units

The system works in all environments and is designed to operate with a multitude of systems and operational units connected to the Perimeter Defence.

pin locator icon

Target Pinpointing
capabilities

Targets can be pinpointed using different sensors and systems: Land surveillance radars, Seismic wireless ground sensors, Automated drones or swarm of drones and other sensors.

More Use Cases

Perimeter Scout

for civil and military applications

We know that a second can last a lifetime

which is why we tailor our solutions based on our Clients’ unique requirements and the specific needs of each operation.

Get in touch

Contact us for a detailed interoperability and integration capabilities list. We tailor our solutions to meet the exact specifications and operational requirements of our customers, ensuring they are optimally configured to meet and exceed your demands.