Mission-Ready Counter-UAS Solutions for Military Operations

In modern warfare, protecting military assets and defense personnel from unauthorized drone activities is paramount. Sentrycs offers military-grade and combat-proven counter-UAS solutions designed to detect, track, identify, and defeat rogue drones, ensuring force protection, operational security, and mission continuity.

Scroll down to learn more about our Advanced Counter-Drone Technology for Defense Applications.

Comprehensive Counter-drone Defense Capabilities

Autonomous, flexible, and combat-proven counter-drone solutions that provide military assets, units, and missions with complete 24/7 protection from unwanted eyes in the sky.

Sentrycs’ CUAS solutions provide passive detection, tracking, and identification of unauthorized drones, thus remaining undetected by the enemy. They locate the drone operator and can – if needed – take control of the unmanned aerial device and land it safely in a predefined area.

  • Mask Group 59@2x
    Military Base Defense

    Shield military installations from unwanted ISR and aerial threats.

  • Mask Group 56@2x
    Forces Protection

    Equip deployed units with portable and user-friendly C-UAS systems for real-time threat mitigation.

  • Mask Group 60@2x
    Air Defense Integration

    Enhance existing air defense layers with proven drone DTI and defeat CRF technology.

Powering Global Defense Solutions

Sentrycs is proud to work alongside leading defense innovators to deliver mission-critical Counter-UAS solutions that enhance global military readiness. Our system integration partnerships strengthen our technology, expand interoperability, and ensure our solutions meet the most demanding defense environments.

Elbit-logo
partners-17
partners-06
partners-19
partners-04
partners-16
partners-03
SAIC logo

By partnering with these defense powerhouses, Sentrycs ensures that militaries worldwide have access to the most effective, field-proven and military-grade Counter-UAS solutions available today.

Sentrycs Solutions Meet Military Standards

Image 27@2x
Image 26@2x

Seamless Integration with Defense Systems

Sentrycs solutions are designed by default with an open architecture, to allow seamless compatibility, rapid deployment, and interoperability with military command and control infrastructures and with other systems and services using REST API, TAK and SAPIENT.

Sentrycs’ proven Protocol Manipulation technology - often referred to as Cyber over RF (or CRF in short) - is a crucial building block in any multi-layer C-UAS strategy.

By design, it seamlessly integrates with complementary counter-drone systems, such as radar, electro- optical, jammers, and more - creating synergies and optimizing overall performance.

Learn how Sentrycs can enhance your mission.
Group 843@2x

Frequently Asked Questions


Traditional counter-drone detection methods such as radars may emit radio waves, which can reveal the presence of military units and even expose them to anti-radar missiles. Sentrycs technology detects unauthorized or rogue drones, accurately identifies them, and then automatically takes control of the drones and lands them in a safe, designated area. The system is passive during detection and identification, so that military units do not unintentionally broadcast their location to the opposing force.

The Sentrycs solutions require very limited training in order to be operated. Our teams will provide this training prior to completing any installation. In essence, once deployed, the system is fully autonomous and does not require making real-time decisions.

Yes, it is possible to block a drone signal, which is typically accomplished by using a method called "jamming." Jamming involves broadcasting interference at the same frequency as the drone's control signal, blocking the communication link between the drone and the operator. However, it's important to note that jamming signals is subject to stringent regulations in many countries, including the U.S, due to its interference with other critical wireless communications and the safety implications of such actions.

Indeed, there are anti-drone drones designed to counter hostile or unauthorized drones. These include net-carrying drones that capture other drones mid-air, and jamming drones that disrupt a target drone's control signals. Some anti-drone drones are built to physically collide with the target, forcing it to the ground. Others act as aerial platforms, launching non-lethal projectiles at the target. It's important to note that while these technologies are available, their use is highly regulated due to safety, privacy, and legal concerns. Also, they require a high degree of precision to avoid collateral damage and to ensure the target is indeed a threat.

An Electromagnetic Pulse (EMP) is a burst of electromagnetic radiation, which can disrupt or damage electronic equipment. While EMPs can disrupt or damage drone electronics, using them as anti-drone weapons raises issues. EMPs aren't selective and can affect all electronics within their range, potentially causing collateral damage to unintended devices. Additionally, their effectiveness varies based on the drone's shielding and distance, making them less reliable in certain scenarios.