skip to content
Your session has expired.

Your authenticated session has expired due to inactivity. You can close this message and continue as a guest or log in again before proceeding.

Unlock More Power to Defend

Force Protect is a converged security and information management system that delivers a common operating picture of a military installation’s resources and personnel. The installation-wide platform integrates multiple systems to enable real-time voice, video, and data collaboration, allowing commanders, operation centers and first responders to unify workflows and act as one.

The Power of Converged Security and
Information Management

When voice, video, and data systems come together in one seamless installation-wide platform, you unlock the power of true integration and unleash new value from existing systems.

With Force Protect’s integrated operations platform, installations:

  • Receive actionable, real-time intelligence in a common operating picture driven by an advanced analytics and correlation engine
  • Share real-time video and data over any device
  • Automate standard operating procedures with dynamic workflows
  • Leverage public and private data sources for advanced queries
  • Automatically generate activity logs for records management and performance
  • Gain multi-layered cybersecurity and information assurance

Force Protect Demo Preview


Our full-length demo provides an in-depth look at Force Protect
features and functionality in action.

FORCE PROTECT

CONVERGED SECURITY INFORMATION MANAGEMENT

FORCE PROTECT ECOSYSTEM

Force Protect tightly integrates individual base defense systems. When a security event is detected, it automatically triggers relevant actions for each system in the area. The result is a highly intelligent and versatile solution, more powerful than each individual part.

Video Management Systems
Integrate real-time video analytics from any source: surveillance cameras, body-worn cameras, drones, and more. Conduct advanced searches using key descriptions of an object or person and make correlations across all video inputs.
SCADA Systems
Linked SCADA systems trigger events in other security and information management systems. Plus, they gain access to infrastructure controls when security events are triggered in the area. Inputs include RTUs, programmable controllers, communications infrastructure, and more.
Alarm Systems
Linked alarm systems and control panels trigger other systems in the area when an alarm has been sounded. Operators can manually trigger system alarms or automate the process using an advanced rules engine for standard operating procedures in pre-defined situations.
Military Surveillance Systems
Integrate proprietary military systems to detect and pinpoint threats via sonar, radar, sensor data, motion detection, geospatial, contextual analytics, and more.
Access Control Systems
Linked access controls systems alert operators to unauthorized access attempts. Using an advanced rules engine, they immediately and automatically activate other systems around the access point to provide operators with additional relevant data.
Computer & IT Systems
Integrate all physical and virtual IT systems to facilitate rapid access to information across infrastructure and device ecosystems including IT networks, network storage, and computer processing and security layers.
Communications Systems
Integrate all communications networks, applications, and devices to visualize resources and personnel in a common operating picture and disseminate information to teams in real-time.