Our Story
How Regulus grew from a GNSS security breakthrough into the world's most comprehensive counter-drone solution provider.
The Beginning
Regulus was founded with a singular insight: drones depend on GPS. Take away their navigation, and you take away the threat. Our proprietary GNSS manipulation technology proved devastatingly effective - a low-power, software-based approach that could stop any GNSS-dependent drone without kinetic force, without debris, without collateral damage.
The military noticed. Our first GNSS spoofer was deployed in active combat. It worked. Then it worked again. And again. TRL-9 certification followed. Selection by the US Department of Defense. Deployment by leading western militaries. The Ring was born.
Our Evolution
Each capability was born from real operational demand. Our customers told us what they needed next.
Chapter 1
Where it all began. Combat-proven GNSS manipulation that takes control of drone navigation. Push-back, hold, or land any GNSS-dependent threat. 7 kg, 60W, 1.5 km range. The foundation of everything that followed.
Chapter 2
Operators told us: "We need to see the drone before we engage it." So we built AI-powered passive RF detection. 99.999% detection rate across 70+ protocols. No emissions. Complete stealth. Now they could detect AND defeat.
Chapter 3
The battlefield evolved. FPV drones don't use GPS - they fly by camera. GNSS spoofing can't touch them. So we added 5-band, 47dBm datalink jamming. Now we could defeat every type of drone, regardless of navigation method.
Chapter 4
Our customers deploy multiple systems from multiple vendors. They needed one screen, one platform, one picture. LeC2 was born - integrating 13 sensor and effector types from 10 leading defense vendors into a unified C2 platform.
Chapter 5
The final piece. When electronic warfare isn't enough, DART provides kinetic hard-kill interception. Completing the Regulus kill chain from detection to destruction. Full spectrum Counter-UAS.
Learn more →Integration Ecosystem
LeC2 integrates the best-of-breed defense technologies. No vendor lock-in.
What Drives Us
Every product is validated by operational reality. TRL-9 is our standard, not our aspiration. We don't ship features that fail in the field.
We don't make one piece of the puzzle. We own the entire Counter-UAS kill chain - detect, track, identify, soft-kill, EW, and kinetic defeat.
The best defense uses the best technology, regardless of vendor. Our C2 platform integrates 10+ third-party systems because mission success demands it.
The drone threat evolves daily. So do we. AI models improve quarterly, protocol libraries update monthly, and new capabilities ship continuously.
By the Numbers
Support
Comprehensive operator and maintenance training for all systems. On-site and remote options available worldwide.
Round-the-clock assistance with dedicated support engineers assigned to each deployment.
Firmware, threat libraries, and AI models updated continuously through secure channels.
Tailored configurations and integration support for complex multi-vendor environments.