Anti Drone / UAV / UAS Service

The cloud software provided enables users to detect and respond to airspace incursions by drones, also known as UAS or UAV devices.


  • Real-time Airspace monitoring
  • Top cover assessment
  • remote access
  • incident response capability


  • Ensure physical security of buildings
  • Ensure physical security of people, crowds, public safety
  • Protect intellectual property / privacy


£15000 to £250000 per device per year

  • Education pricing available
  • Free trial available

Service documents


G-Cloud 11

Service ID

7 6 5 3 0 3 7 5 1 5 9 8 2 7 4



Paul Heneghan


Service scope

Service scope
Software add-on or extension No
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints Service requires hardware sensors which we design configure and install.
System requirements None

User support

User support
Email or online ticketing support Email or online ticketing
Support response times <2 hrs weekday
<4 hrs weekend
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Onsite support
Support levels 1st year fully warrantied
Thereafter subject to SLA
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide onsite in-person training and remote conference training where applicable.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Upon request we can provide the data.
End-of-contract process Typically a customer will renew onto a support basis, otherwise we can arrange for collection of equipment and decommissioning.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices No
Service interface No
What users can and can't do using the API API extensions to all features of the system - also we can develop custom API features per customer request.
API documentation Yes
API documentation formats PDF
API sandbox or test environment Yes
Customisation available No


Independence of resources Autoscaling is used to ensure that the service does not reach performance limiting usage


Service usage metrics No


Supplier type Reseller providing extra features and support
Organisation whose services are being resold DeDrone and others

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Directly via the interface, automated via the API, or by contacting us
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability 5 nines service availability
Approach to resilience Available Upon Request
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels Whitelisting
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Aligned with ISO 27001 but not certified
Information security policies and processes ISO 27002 baseline with extensions for current best practice

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Internal change control ticketing system,
Vulnerability management type Supplier-defined controls
Vulnerability management approach Using automated tools such as Qualys
Patching as soon as patches tested
Protective monitoring type Supplier-defined controls
Protective monitoring approach System level protective controls such as tripwire
Detect, Respond, Restore policy
Incident management type Supplier-defined controls
Incident management approach Incidents automatically reported to customers
Staff member assigned to each incident

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £15000 to £250000 per device per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial We are willing to temporarily deploy a data capture solution to certain customers

Service documents

Return to top ↑