SlideShare a Scribd company logo
Vertex Perspectives
Counter-drone solution
D-fend believes that drones will prosper and
contribute to our lives in many ways. To keep this
future safe, D-fend provides comprehensive, safe
and scalable counter-drone solutions for
securing a stationary perimeter and portable
usage in urban environmentsCounter-Drone Solutions
for Urban Environments
Company Snapshot
TEAM INVESTORS HIGHLIGHTS
Founders • Founded in 2016
• HQ: Ra’anana, Israel
• Series A
• Recognitions include
• 2018 North American Counter-Drone
Solutions Enabling Technology
Leadership Award by Frost & Sullivan
Zohar Halachmi, CEO
A serial entrepreneur who founded
three startups and held VP/C-level
executive positions in public and
global telecommunications
enterprises prior to founding D-fend
Yaniv Benbenisti, CPO
An experienced business and product
executive that has held two
management positions in public
intelligence solutions enterprise. Yaniv
was also head of Cyber Access
Division in Israeli Intelligence Unit.
Assaf Monsa, CTO
A serial entrepreneur, technology and
business executive for the last 20
years. He managed large teams an
developed complex products with
cutting edge technology.
Industry Challenges
Traditional counter drone solutions are ineffective and dangerous for
urban environments
The popularity of commercial drones is growing. Until a few years ago,
Unmanned Aerial Vehicles (UAVs) were purely military aircrafts.
Today, commercial drones are widely available and feature top notch
military grade capabilities.
While most drones are used for legitimate and positive purposes, some
are used irresponsibly or maliciously.
Traditional counter drone technologies have been deployed
successfully in rural environments relying on
• Radar or optical detection
• RF jamming or kinetic (e.g. missiles, destructive laser beams)
mitigation methods
However, these are not suitable for the urban environment due to risks
such as collateral damage and communication interferences
Challenges in urban environment
Solution Overview
EnforceAirTM is an autonomous counter-drone system which relies on
Software-defined Radio (SDR) technology to detect & take control over
rogue commercial drones and lands them safely in a designated zone
without affecting Wi-Fi communications and GPS signals.
Modular capabilities include –
• Detect & Alert: Detect all drones and ground operators over long
distances
• Locate & Track: Find and track exact location of the drone and
ground operator
• Identify: Monitor radio waves to detect drones over long distances
and distinguished approved drones from others
• Forensics Extraction: Extract data (e.g. take-off position) to
support decision making and investigation
• Fend Off: Prevent drones from entering the secure zone by forcing
them to return to take-off location
• Take control & land: Prevent drones from entering the secure zone
by taking control and landing at designated zone
Solution Overview
Video link: https://www.youtube.com/watch?v=i9gZu-VxPuk
Case Studies
D-fend is working with partners including –
To provide solutions for the following use cases –
Airports Secret Services & MilitaryFirst RespondersPrisons
Safe City Corporate SecurityMedia Providers
& Sporting Events
Critical Infrastructure
& Utilities
Competitive Advantage
Counter drone solutions designed for urban environments
• Non-jamming: co-exist with wireless communication and
GPS signals
• Non-kinetic: no collateral damage
• No line of sight: suitable for dense urban environment
• Selective: discriminate between friend and foe
Capable of mitigating High Endurance Drones (HED) with long
range communication
• Taking control over the most advanced, long distance and
popular commercial drones available in the market
• Supports >80% HED market
• Periodic firmware update to protect against new drones and
new radio modules
Designed for advanced threats
• Swarm attacks
• DIY drones
Safe zone
Thanks for reading!
About Vertex Ventures
Vertex Ventures is a global network of operator-investors who manage portfolios
in the US, China, Israel, India and Southeast Asia. Vertex teams combine first-hand
experience in transformational technologies, on-the-ground knowledge in the
world’s major innovation centers and global context, connections and customers.
Contributors
Disclaimer
This presentation has been compiled for informational purposes only. It does not constitute a recommendation to any party. The presentation relies on data and insights from a wide range of sources including public and private companies, market research firms, government agencies and
industry professionals. We cite specific sources where information is public. The presentation is also informed by non-public information and insights. Information provided by third parties may not have been independently verified. Vertex Holdings believes such information to be reliable
and adequately comprehensive but does not represent that such information is in all respects accurate or complete. Vertex Holdings shall not be held liable for any information provided. Any information or opinions provided in this report are as of the date of the report and Vertex Holdings
is under no obligation to update the information or communicate that any updates have been made.
Please stay tuned and do let us know if you’d like to subscribe to future issues of Vertex Perspectives.
Vertex Perspectives: Cybersecurity Series
• Cybersecurity | Risk. Impact. Innovations.
• Cybersecurity | Axonius: Asset Management Platform
• Cybersecurity | Cylus: Railway Cybersecurity
• Cybersecurity | Cymulate: Breach & Attack Simulation
• Cybersecurity | D-fend: Counter-Drone Solutions for Urban Environments
• Cybersecurity | Indegy: Industrial Cybersecurity
• Cybersecurity | Meta Networks: NaaS Software Defined Perimeter
• Cybersecurity | PerimeterX: Next Generation Bot Defense
• Cybersecurity | Very Good Security: SaaS Platform for Data Security

More Related Content

PDF
Cybersecurity | Cylus: Railway Cybersecurity
PDF
Cybersecurity | Meta Networks: Software defined perimeter platform
PDF
Cyber Threat Intelligence: Highlights and Trends for 2020
PPTX
Global Cybersecurity Market (2017 - 2022)
PPTX
Securing medical apps in the age of covid final
PPTX
Security Trend Report, 2017
PPTX
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
PDF
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity | Cylus: Railway Cybersecurity
Cybersecurity | Meta Networks: Software defined perimeter platform
Cyber Threat Intelligence: Highlights and Trends for 2020
Global Cybersecurity Market (2017 - 2022)
Securing medical apps in the age of covid final
Security Trend Report, 2017
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...

What's hot (19)

PDF
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
PDF
F5 Networks: The Internet of Things - Ready Infrastructure
PDF
2021 English Part One Anti-phishing Webinar Presentation Slides
PPTX
The Future of Cybersecurity - October 2015
PPTX
Cybersecurity in the Era of IoT
PDF
G05.2013 gartner top security trends
PDF
Information Security Business Middle East 2011
PPTX
Understanding the Cyber Security Vendor Landscape
PPTX
Next-generation Zero Trust Cybersecurity for the Space Age
PPTX
Webinar Ivanti Neurons For Patch Intelligence
PPTX
SC Magazine & ForeScout Survey Results
PPTX
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
PDF
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PDF
Top 7 Security Measures for IoT Systems
PPT
Cy Cops Company Presentation
PPTX
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
PDF
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
PDF
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
PPTX
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
F5 Networks: The Internet of Things - Ready Infrastructure
2021 English Part One Anti-phishing Webinar Presentation Slides
The Future of Cybersecurity - October 2015
Cybersecurity in the Era of IoT
G05.2013 gartner top security trends
Information Security Business Middle East 2011
Understanding the Cyber Security Vendor Landscape
Next-generation Zero Trust Cybersecurity for the Space Age
Webinar Ivanti Neurons For Patch Intelligence
SC Magazine & ForeScout Survey Results
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
Top 7 Security Measures for IoT Systems
Cy Cops Company Presentation
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Ad

Similar to Cybersecurity | D-fend: Counter drone solution for urban environments (20)

PDF
Drone Service – Future of Service
PPTX
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
PDF
Ey hot topic_drones (2)
PPTX
Scalar Security Roadshow - Calgary Presentation
PDF
reStartEvents 9:26 TS:SCI & Above Employer Directory.pdf
PPTX
Scalar Security Roadshow - Vancouver Presentation
PDF
Red Cat - Investor Presentation Mar 2021
PPTX
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
PDF
Cybersecurity | Very Good Security: SaaS Platform for Data Security
PDF
Elsight powerpoint presentation final (2)
PDF
reStartEvents 11:14 DC metro & Beyond Employer Directory.pdf
PDF
Sunisle Technology Solutions Sales programs version 2013
PPTX
Nozomi-Networks-Corporate-Overview-Deck-2025.pptx
PDF
ISF Congress 2016 - Session 7.2_Kukreja
PDF
Kaspersky - Apresentação Corporativa
PDF
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
PDF
Security Software and Apps for Counter Terror, Sensitive Installations, Secur...
PDF
Mobile Security BROCHURE (1)
PDF
RA TechED 2019 - SS16 - Security Where and Why do I start
PPTX
Fortinet Corporate Overview Deck.pptx
Drone Service – Future of Service
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
Ey hot topic_drones (2)
Scalar Security Roadshow - Calgary Presentation
reStartEvents 9:26 TS:SCI & Above Employer Directory.pdf
Scalar Security Roadshow - Vancouver Presentation
Red Cat - Investor Presentation Mar 2021
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Cybersecurity | Very Good Security: SaaS Platform for Data Security
Elsight powerpoint presentation final (2)
reStartEvents 11:14 DC metro & Beyond Employer Directory.pdf
Sunisle Technology Solutions Sales programs version 2013
Nozomi-Networks-Corporate-Overview-Deck-2025.pptx
ISF Congress 2016 - Session 7.2_Kukreja
Kaspersky - Apresentação Corporativa
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Security Software and Apps for Counter Terror, Sensitive Installations, Secur...
Mobile Security BROCHURE (1)
RA TechED 2019 - SS16 - Security Where and Why do I start
Fortinet Corporate Overview Deck.pptx
Ad

More from Vertex Holdings (20)

PDF
Third-Generation Semiconductor: The Next Wave?
PDF
E-mobility E-mobility | Part 5 - The future of EVs and AVs (English)
PDF
E-mobility | Part 5 - The future of EVs and AVs (Japanese)
PDF
E-mobility | Part 5 - The future of EVs and AVs (German)
PDF
E-mobility | Part 5 - The future of EVs and AVs (Chinese)
PDF
E-mobility | Part 5 - The future of EVs and AVs (Korean)
PDF
E-mobility | Part 3 - Battery recycling & power electronics (German)
PDF
E-mobility | Part 3 - Battery recycling & power electronics (Japanese)
PDF
E-mobility | Part 4 - EV charging and the next frontier (Korean)
PDF
E-mobility | Part 4 - EV charging and the next frontier (Japanese)
PDF
E-mobility | Part 4 - EV charging and the next frontier (Chinese)
PDF
E-mobility | Part 4 - EV charging and the next frontier (German)
PDF
E-mobility | Part 4 - EV charging and the next frontier (English)
PDF
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Korean)
PDF
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Chinese)
PDF
E-mobility | Part 3 - Battery recycling & power electronics (English)
PDF
E-mobility | Part 2 - Battery Technology & Alternative Innovations (German)
PDF
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Chinese)
PDF
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Japanese)
PDF
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Korean)
Third-Generation Semiconductor: The Next Wave?
E-mobility E-mobility | Part 5 - The future of EVs and AVs (English)
E-mobility | Part 5 - The future of EVs and AVs (Japanese)
E-mobility | Part 5 - The future of EVs and AVs (German)
E-mobility | Part 5 - The future of EVs and AVs (Chinese)
E-mobility | Part 5 - The future of EVs and AVs (Korean)
E-mobility | Part 3 - Battery recycling & power electronics (German)
E-mobility | Part 3 - Battery recycling & power electronics (Japanese)
E-mobility | Part 4 - EV charging and the next frontier (Korean)
E-mobility | Part 4 - EV charging and the next frontier (Japanese)
E-mobility | Part 4 - EV charging and the next frontier (Chinese)
E-mobility | Part 4 - EV charging and the next frontier (German)
E-mobility | Part 4 - EV charging and the next frontier (English)
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Korean)
E-mobility | Part 3 - Battery Technology & Alternative Innovations (Chinese)
E-mobility | Part 3 - Battery recycling & power electronics (English)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (German)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Chinese)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Japanese)
E-mobility | Part 2 - Battery Technology & Alternative Innovations (Korean)

Recently uploaded (20)

PPTX
Cloud computing and distributed systems.
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
A Presentation on Artificial Intelligence
PPTX
sap open course for s4hana steps from ECC to s4
Cloud computing and distributed systems.
Mobile App Security Testing_ A Comprehensive Guide.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Empathic Computing: Creating Shared Understanding
Digital-Transformation-Roadmap-for-Companies.pptx
NewMind AI Weekly Chronicles - August'25-Week II
MIND Revenue Release Quarter 2 2025 Press Release
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
A comparative analysis of optical character recognition models for extracting...
Big Data Technologies - Introduction.pptx
Spectral efficient network and resource selection model in 5G networks
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Encapsulation theory and applications.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
cuic standard and advanced reporting.pdf
A Presentation on Artificial Intelligence
sap open course for s4hana steps from ECC to s4

Cybersecurity | D-fend: Counter drone solution for urban environments

  • 1. Vertex Perspectives Counter-drone solution D-fend believes that drones will prosper and contribute to our lives in many ways. To keep this future safe, D-fend provides comprehensive, safe and scalable counter-drone solutions for securing a stationary perimeter and portable usage in urban environmentsCounter-Drone Solutions for Urban Environments
  • 2. Company Snapshot TEAM INVESTORS HIGHLIGHTS Founders • Founded in 2016 • HQ: Ra’anana, Israel • Series A • Recognitions include • 2018 North American Counter-Drone Solutions Enabling Technology Leadership Award by Frost & Sullivan Zohar Halachmi, CEO A serial entrepreneur who founded three startups and held VP/C-level executive positions in public and global telecommunications enterprises prior to founding D-fend Yaniv Benbenisti, CPO An experienced business and product executive that has held two management positions in public intelligence solutions enterprise. Yaniv was also head of Cyber Access Division in Israeli Intelligence Unit. Assaf Monsa, CTO A serial entrepreneur, technology and business executive for the last 20 years. He managed large teams an developed complex products with cutting edge technology.
  • 3. Industry Challenges Traditional counter drone solutions are ineffective and dangerous for urban environments The popularity of commercial drones is growing. Until a few years ago, Unmanned Aerial Vehicles (UAVs) were purely military aircrafts. Today, commercial drones are widely available and feature top notch military grade capabilities. While most drones are used for legitimate and positive purposes, some are used irresponsibly or maliciously. Traditional counter drone technologies have been deployed successfully in rural environments relying on • Radar or optical detection • RF jamming or kinetic (e.g. missiles, destructive laser beams) mitigation methods However, these are not suitable for the urban environment due to risks such as collateral damage and communication interferences Challenges in urban environment
  • 4. Solution Overview EnforceAirTM is an autonomous counter-drone system which relies on Software-defined Radio (SDR) technology to detect & take control over rogue commercial drones and lands them safely in a designated zone without affecting Wi-Fi communications and GPS signals. Modular capabilities include – • Detect & Alert: Detect all drones and ground operators over long distances • Locate & Track: Find and track exact location of the drone and ground operator • Identify: Monitor radio waves to detect drones over long distances and distinguished approved drones from others • Forensics Extraction: Extract data (e.g. take-off position) to support decision making and investigation • Fend Off: Prevent drones from entering the secure zone by forcing them to return to take-off location • Take control & land: Prevent drones from entering the secure zone by taking control and landing at designated zone
  • 5. Solution Overview Video link: https://www.youtube.com/watch?v=i9gZu-VxPuk
  • 6. Case Studies D-fend is working with partners including – To provide solutions for the following use cases – Airports Secret Services & MilitaryFirst RespondersPrisons Safe City Corporate SecurityMedia Providers & Sporting Events Critical Infrastructure & Utilities
  • 7. Competitive Advantage Counter drone solutions designed for urban environments • Non-jamming: co-exist with wireless communication and GPS signals • Non-kinetic: no collateral damage • No line of sight: suitable for dense urban environment • Selective: discriminate between friend and foe Capable of mitigating High Endurance Drones (HED) with long range communication • Taking control over the most advanced, long distance and popular commercial drones available in the market • Supports >80% HED market • Periodic firmware update to protect against new drones and new radio modules Designed for advanced threats • Swarm attacks • DIY drones Safe zone
  • 8. Thanks for reading! About Vertex Ventures Vertex Ventures is a global network of operator-investors who manage portfolios in the US, China, Israel, India and Southeast Asia. Vertex teams combine first-hand experience in transformational technologies, on-the-ground knowledge in the world’s major innovation centers and global context, connections and customers. Contributors Disclaimer This presentation has been compiled for informational purposes only. It does not constitute a recommendation to any party. The presentation relies on data and insights from a wide range of sources including public and private companies, market research firms, government agencies and industry professionals. We cite specific sources where information is public. The presentation is also informed by non-public information and insights. Information provided by third parties may not have been independently verified. Vertex Holdings believes such information to be reliable and adequately comprehensive but does not represent that such information is in all respects accurate or complete. Vertex Holdings shall not be held liable for any information provided. Any information or opinions provided in this report are as of the date of the report and Vertex Holdings is under no obligation to update the information or communicate that any updates have been made. Please stay tuned and do let us know if you’d like to subscribe to future issues of Vertex Perspectives. Vertex Perspectives: Cybersecurity Series • Cybersecurity | Risk. Impact. Innovations. • Cybersecurity | Axonius: Asset Management Platform • Cybersecurity | Cylus: Railway Cybersecurity • Cybersecurity | Cymulate: Breach & Attack Simulation • Cybersecurity | D-fend: Counter-Drone Solutions for Urban Environments • Cybersecurity | Indegy: Industrial Cybersecurity • Cybersecurity | Meta Networks: NaaS Software Defined Perimeter • Cybersecurity | PerimeterX: Next Generation Bot Defense • Cybersecurity | Very Good Security: SaaS Platform for Data Security