Convexum

Defense & National Security Dual-Use Technology Priority Signal Founded 2016

Convexum is an Israeli counter-UAS startup whose public website now resolves to Sentrycs-branded content, offering cyber-RF drone detection, tracking, identification, and mitigation for sensitive sites.

Visit Website

Company Overview

Convexum’s public web presence now resolves to Sentrycs-branded counter-drone content, and the product story centers on autonomous Cyber Over RF / protocol-analytics detection. The platform passively detects, tracks, identifies, and geolocates drones by analyzing their communication links rather than relying only on radar or electro-optical sensing.

The product appears modular. The website describes fixed-site and vehicle-mounted configurations, a DTI stack for detection/tracking/identification, and an optional mitigation module that can take over the drone, force a safe landing, or disconnect the controller. That architecture matters because it lets the same stack serve hardened perimeters, mobile patrols, and rapid-response deployments.

Commercially, the company is aimed at airports, border regions, critical infrastructure, public-safety agencies, and defense buyers. The homepage and solution pages emphasize autonomous operation, low false-alarm rates, and reduced collateral damage versus broad-spectrum jamming or kinetic defeat. The border-security page also references DHS anti-swarm testing as a credibility signal, which should be independently diligence-tested rather than accepted as a verified operating claim.

From an investor and strategic perspective, this is a real dual-use category rather than a generic drone-software pitch. Counter-UAS demand is driven by cheap UAV proliferation, drone-enabled smuggling and reconnaissance, and force-protection needs around bases, convoys, and sensitive facilities. The main questions are regulatory permissibility of mitigation, field performance across drone models and RF conditions, and whether the company can convert technical credibility into repeatable procurement wins.

Dual-Use Assessment

The core stack is substantively dual-use: RF sensing, protocol analytics, operator geolocation, and optional mitigation are relevant to military force protection, border security, and civilian critical-infrastructure defense. The same product can serve defense and public-safety buyers, although the mitigation layer is constrained by spectrum and use-of-force rules.

Key Technologies

  • Cyber Over RF / protocol analytics
  • Passive drone detection and classification
  • DTI workflow automation
  • Operator geolocation from RF links
  • Optional drone mitigation and takeover
  • Vehicle-mounted counter-UAS kits
  • Mission-control software and no-fly-zone management

Use Cases & Applications

  • Military base and convoy force protection
  • Border patrol and checkpoint drone interdiction
  • Airport and heliport airspace security
  • Critical infrastructure perimeter defense
  • Public-event and stadium drone monitoring
  • Prison and detention-facility drone detection
  • Rapid-response protection for special operations
  • Mobile patrol and VIP protection missions

Strategic Value to U.S.-Israel Alliance

Provides a software-defined counter-UAS layer that can complement radar, EO/IR, and security-command systems for allied defense and domestic security buyers. Its mobile and fixed-site form factors make it strategically relevant across bases, borders, convoys, and critical infrastructure.

Need a diligence readout?

Get in touch to discuss dual-use technology screening, government-market assessment, or strategic diligence.