Regulus Cyber Pyramid GNSS Logo

Regulus Cyber Pyramid GNSS

Software solution protecting GNSS systems from spoofing & jamming attacks.

Visit website
Claim and verify your listing
0
CybersecRadarsCybersecRadars

Go Beyond the Directory. Track the Entire Market.

Monitor competitor funding, hiring signals, product launches, and market movements across the whole industry.

Competitor Tracking·Funding Intelligence·Hiring Signals·Real-time Alerts

Regulus Cyber Pyramid GNSS Description

Pyramid GNSS is a cybersecurity software solution designed to protect GNSS (Global Navigation Satellite System) receivers and systems from spoofing and jamming attacks. It addresses threats to satellite-based navigation and timing across multiple industries. The product consists of two components: **Pyramid DT (Detection)** A hardware-agnostic, stateless, lightweight software library that detects and alerts against GNSS spoofing and jamming attacks. It operates in connected or standalone modes and requires minimal computational resources (~2 DMIPS, 500 bytes RAM, 2KB flash). It detects data and range spoofing, time shifts, combined attacks, and multiple simultaneous attack sources using dozens of independent software mechanisms and algorithms. The library is updated continuously to address newly identified threats. **Pyramid MT (Mitigation)** A chip/hardware-level solution that both detects and mitigates spoofing attacks, enabling continuous PNT (Position, Navigation & Time) operation even during active spoofing events. It uses multi-patent, multiple-peak detection and tracking algorithms and is designed for chip-level integration, FPGA, or software-based receivers.

Regulus Cyber Pyramid GNSS FAQ

Common questions about Regulus Cyber Pyramid GNSS including features, pricing, alternatives, and user reviews.

Regulus Cyber Pyramid GNSS is Software solution protecting GNSS systems from spoofing & jamming attacks. developed by Regulus Cyber. It is a OT Security solution designed to help security teams with Spoofing, Critical Infrastructure, Hardware Security.

Have more questions? Browse our categories or search for specific tools.

FEATURED

Heeler Application Security Auto-Remediation Logo

Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Wiz Cloud Logo

Agentless cloud security platform for risk detection & prevention

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

13
OSINTLeak Real-time OSINT Leak Intelligence Logo

Real-time OSINT monitoring for leaked credentials, data, and infrastructure

8
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

5
TestSavant AI Security Assurance Platform Logo

AI security assurance platform for red-teaming, guardrails & compliance

5
Mandos Brief Logo

Weekly cybersecurity newsletter covering security incidents, AI, and leadership

5
View Popular Tools →

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox