Counter-UAS (C-UAS)

Detect, track, identify, and safely neutralize unauthorized drones—maintaining operational continuity and public safety with layered, mission-ready defenses.

Detect → Track → Identify → TakeoverNon-kinetic & Kinetic OptionsC2 Integration
Pegasus Counter-UAS System

What this solution delivers

Operational assurance with safe neutralization, low collateral risk, and rapid decision-support.

Continuous Sensing

RF/EO detection and accurate tracking to maintain situational awareness.

Positive ID

Distinguish authorized vs. unauthorized drones; assess intent & risk.

Safe Mitigation

Non-jamming, non-kinetic takeover to land safely—plus kinetic defeat where required.

C2 Integration

Open API to integrate with Command & Control and adjacent sensors.

Drone Incident Lifecycle

We align sensors, decisioning, and mitigation across the full incident lifecycle for assured outcomes.

  1. Detect — RF/EO sensing and geolocation
  2. Track — continuous kinematics and correlation
  3. Identify — authorization checks, payload/operator cues
  4. Takeover/Defeat — safe landing or kinetic defeat
Rules & AlertsOperator Oversight
Drone incident lifecycle

Available C-UAS Solutions

Select the right mitigation layer for the mission, environment, and rules of engagement.

Cyber RF Takeover

Non-jamming, non-kinetic control that can land rogue drones at predefined safe zones, operating reliably in noisy/sensitive environments and distinguishing authorized from unauthorized drones.

  • Combined RF detection, identification, and takeover in one SDR platform.
  • Open API for integration with Command & Control and other sensors.
Cyber RF unit

RF Jamming

Disrupts RC/video/GNSS links to force failsafe behavior. Available as fixed E-Wall, vehicle-mounted, or man-portable modules (subject to regulation).

  • Sector/area denial via high-gain directional antennas.
  • Configurable bands and output for varying environments.
RF jamming equipment placeholder

GNSS Spoofing

Controlled navigation deception to displace or down drones reliant on satellite positioning when permitted by ROE.

  • Configured for test ranges and specialized missions.
  • Applied under strict governance and geofencing policies.
GNSS spoofing rig

Kinetic Defeat

Physical neutralization (interceptors, nets, directed energy) for hardened targets, autonomy, or swarms as a last-line layer.

  • Complements electronic/Cyber RF measures in layered defense.
  • Configured to minimize collateral risk according to ROE.
Kinetic interceptor

Deployment Configurations

Scale from single-site protection to maneuver formations.

Fixed “E-WALL”

Networked directional units form a protective RF wall over facilities or borders.

Vehicle-Mounted

Module racks with high-gain antennas create mobile bubbles for convoys & armored assets.

Man-Portable

Integrated detect-and-jam/takeover systems for squads and first responders.

Expeditionary / Rapid Setup

Rugged SDR kits with quick-lock mounts for pop-up perimeters and events.

Deployment configurations collage

System Components & Integration

Rugged SDR hardware + antennas, unified UI, and open interfaces.

Sensing

RF + optional EO/IR for detection, classNameification, and correlation.

Mitigation

Cyber RF takeover and/or jamming modules; kinetic effectors when required.

C2 & APIs

Operator UI for alerting & policy; open API for C2 & sensor fusion.

C-UAS architecture

Where C-UAS is deployed

Adaptable options for civil security and defense missions.

Mass Events

Stadiums, festivals & VIP venues; predefined rules, geofences & safe landing pads.

Critical Infrastructure

Energy, ports, prisons & data centers; perimeter E-WALL layers and mobile bubbles.

Airports

Prevent disruptions, protect ATC & runways with safe mitigation workflows.

Prisons & Law Enforcement

Counter contraband drops & surveillance with layered response and audit trails.

Use cases collage

Compliance & Safety

C-UAS operations are subject to national spectrum, aviation, and public-safety regulations. Pegasus tailors deployments with your authorities and ROE to ensure lawful, safe, and auditable operations.

Plan a pilot or deployment?

Let's scope your site, threat model, and ROE—and align the right layers.