Honest by design

See exactly what CounterSwarm does — and what it doesn't.

Before you commit to a pilot, here's a straightforward look at what's live in the product today, what we'll show you in a guided walkthrough, and the lines we won't cross — so your team can decide with confidence.

Want to see it yourself?

Start with the sample readiness report.

The same format your team would receive after a pilot — scores, prioritized gaps, and remediation guidance you can hand to leadership.

Quick answer

What is CounterSwarm today?

A defensive readiness platform for defense, government-readiness, and critical-infrastructure teams. It models your site, runs approved drone scenarios, surfaces coverage gaps, and produces a board-ready report — so you can make a procurement or program decision based on evidence, not vendor pitch decks.

  • Used inside paid readiness pilots
  • Defensive-only — no active mitigation
  • Runs locally or in your secure environment
  • Outputs you can hand directly to leadership

What's live today

Built into the product and ready to use.

Site modeling

Live

Sites, assets, and zones are modeled inside the product workflow.

Defensive scenario execution

Live

Approved defensive-only scenarios run through SwarmSim.

Readiness report generation

Live

The API persists report artifacts with audit metadata, authenticated download support, and a proven Linux/Docker generation path. PDF is verified in the containerized path; HTML fallback remains explicit when a renderer is unavailable.

Incident workflow and SOP persistence

Live

The product stores incident state, SOP progress, and timeline events.

Evidence upload and artifact retrieval

Live

Incident artifacts now persist durably on disk, retain SHA-256 chain-of-custody metadata, and round-trip through authenticated download in the current product flow.

Repeatable demo reset

Live

Demo reset supports clean reruns for local and controlled walkthroughs.

In a guided walkthrough

What we'll show you in a live demo.

Airspace SOC operator view

Demo

The current operator air picture is demonstrated with staged telemetry, persisted incident context, and local continuity proof rather than a live field deployment claim.

Seeded buyer walkthrough

Demo

Founders, advisors, and pilot reviewers can walk a repeatable seeded path that stays explicitly labeled as staged product proof.

What we won't claim

The lines we draw on purpose.

CounterSwarm is not presented as a live countermeasure or command-and-control system.

The default product does not provide jamming, spoofing, kinetic defeat, or counter-countermeasure guidance.

The current repo and product are not represented as publicly launched or production-proven.

Simulated telemetry and controlled walkthroughs are clearly labeled when used in demos.

On our roadmap

Where we're heading next — but not promising yet.

Live staging verification

Hosted auth, artifact storage, report generation, and audit flow still need current staging proof.

Broad SOC telemetry fusion

M3 remains a controlled demo and roadmap track rather than a live deployment claim.

Government procurement readiness

Commercial packaging is advancing, but accreditation and formal procurement readiness are not claimed.

Active Defense integrations

Active Defense remains a separate gated future program and is not part of the default product path.

For analysts and procurement: machine-readable status