Sentrycs
Sentrycs CoRF (Cyber-over-RF) attacks the drone-operator communication protocol rather than jamming RF frequencies — making it the only legally compliant C-UAS option in civilian airspace where jamming is prohibited.
Products
Counter-Unmanned Aircraft System (C-UAS)
c-uasai-assistedcyberThe Sentrycs C-UAS system is designed to detect, identify, and mitigate threats from hostile drones, providing a secure perimeter around critical assets.
RF and radar sensors, multi-layered defense protocols, operates in varied frequency bands, ensures low SWaP footprint
Proprietary AI and machine learning algorithms for threat detection and mitigation
Compatible with leading C2 systems and can integrate with existing defense platforms
Developed to counter the increasing threat of drone intrusions in sensitive airspace, the system ensures a high level of security for military and civilian purposes.
Operators gain real-time threat detection and response capabilities against unauthorized drones.
Effectiveness can be limited in highly cluttered environments or against rapidly evolving drone technologies.
Integrations
Sentrycs CoRF ↔ Iron Drone Raider
CoRF detects and classifies the hostile drone via RF protocol analysis, passes GPS coordinates and drone model classification to Iron Drone Raider via a shared data protocol. Raider launches autonomously, confirms target via onboard optics, and executes net capture.
Control Points
CoRF drone interception protocol (cyber-over-RF methodology)
Joint Ventures
Sentrycs × IDF CoRF deployment
activeOperational CoRF (cyber-over-RF) C-UAS deployment with the Israeli Defense Forces for border airspace protection.