We integrate drones, CCTV, sensors, and SOC detections into the TAK ecosystem — ATAK, WinTAK, iTAK, and WebTAK — so disaster response, border, and critical-infrastructure teams operate from a single live map. Built by the team behind simpliSOC.
From the server core out to every device on the edge. We work with the open TAK protocol (CoT) and the official TAK Product Center clients — no proprietary lock-in.
Deployment, certificate authority setup, federation with partner servers, group-based access control, mission packages, and high-availability hardening for on-prem or sovereign cloud.
The connective tissue. We translate proprietary feeds — drone telemetry, RTSP video, NVR events, ANPR cameras, AIS, ADS-B, SCADA alarms — into signed CoT messages and forward them to TAK Server.
Native plugins for ATAK (Android), WinTAK (Windows ops centers), iTAK (iOS), and WebTAK. We add custom map layers, overlays, video tiles, mission-specific dialogs, and team workflows tailored to your standard operating procedures.
Our signature. Cyber detections from Wazuh become geolocated CoT events in ATAK; physical incidents observed in TAK push back into IRIS as cases. One operating picture for the SOC analyst, the operations director, and the team on the ground.
A standards-based pipeline you can audit, federate, and extend — not a black box. Every link uses open protocols: CoT over TLS, REST, MQTT, or WebSocket.
Drone telemetry, RTSP video, AIS, ADS-B, GPS trackers, fence and perimeter sensors, NVR alerts, ANPR cameras, SCADA alarms.
A FastAPI / Python or Go CoT bridge normalizes each feed into signed Cursor on Target messages, then forwards them to TAK Server over TCP/TLS.
TAK Server authenticates clients via certificates, places them into mission groups, federates with partner servers, and distributes CoT to only the teams that need to see it.
Field teams see tracks, alerts, and overlays in ATAK / iTAK; the ops center coordinates in WinTAK or WebTAK; commanders annotate, route, and dispatch — all on the same live map.
How edge sensors, the CoT bridge, TAK Server, clients, and the SOC stack connect — and where the cyber-physical bridge sits.
We're based in Bangkok. These are the operational pictures we've designed for in the region — disaster response, border, energy, maritime, and estate security.
Flood, earthquake, and wildfire response across multiple provinces. Drone overflights, vehicle tracking, evacuation zones, shelter locations — federated to inter-agency partners on a shared map.
Patrol track-of-interest, fence-breach sensors, ANPR at checkpoints, off-grid radio relays. TAK on rugged Android devices with cached offline maps for terrain with no cellular coverage.
Power transmission, pipelines, substations. Fence sensors, perimeter CCTV with analytics, drone inspections, and SCADA alarm overlays — fused with simpliSOC cyber events on a unified map.
Offshore rigs, supply vessels, harbor security. AIS ingestion, coastguard coordination, weather overlays, dark-vessel detection — pushed to vessel bridges and shore ops simultaneously.
Palm, rubber, and sugar estates across SEA. Patrol vehicle tracks, anti-theft CCTV alerts, fire-detection drones, and worker safety check-ins on a single estate-wide command picture.
Mountain and maritime SAR. Searcher tracks, search-pattern overlays, drone scan tiles, last-known-position markers, and team-to-team coordination across volunteer and government units.
TAK is mission-agnostic. If you have field teams, sensors, and a coordinator who needs a live picture, we can almost certainly help. Tell us the geography, the constraints, and what "good" looks like — we'll come back with a thin-slice integration plan.
Most TAK integrators stop at drones, video, and tracking. Most SOC vendors stop at log files. Cyber and physical security teams sit in different rooms, looking at different screens, missing the same incident.
We connect them. A Wazuh detection — say, an authentication brute-force on a substation HMI — becomes a CoT event pinned to the substation on the ATAK map, visible to the response team in real time. A TAK-observed perimeter breach becomes an IRIS case with the camera, the drone scan, and the GPS track already attached.
It's the same engineering team that builds and operates simpliSOC. That's not a marketing claim — it's the reason the bridge works.
Talk to us about a converged command pictureA Wazuh rule fires on an OT network. The SOC integrator publishes a CoT event with location, severity, and asset context. ATAK shows a flashing marker exactly where the incident lives in the real world.
A field analyst pins an incident in ATAK. A bridge listener writes it to IRIS as a case with geo, video frames, and on-scene team callsigns attached — and Shuffle kicks off the notification playbook.
2-week engagement. We audit your existing sensors, networks, command rooms, and procurement constraints, then deliver a TAK adoption plan with realistic effort, cost, and risk estimates.
Fixed-scope delivery of a CoT bridge for one or more sensor types. Source available, full handover, plus a Wazuh-style runbook so your team can extend it without us.
ATAK / WinTAK plugins for mission-specific workflows. Custom dialogs, overlays, video tiles, offline map regions for your AO — everything signed and packaged for your TAK Server's app store.
Two-way bridge between simpliSOC (Wazuh / IRIS / Shuffle) and your TAK Server. Cyber detections become geolocated CoT; physical incidents become IRIS cases with full context. Our signature offering.
On-prem or sovereign-cloud TAK Server deployments with mTLS, federation, and HA. Air-gapped variants for sites with no internet. No data ever leaves your jurisdiction.
Managed-service operations and training for your dispatchers, field teams, and admins. We can run the server, monitor the bridges, and rotate certificates while your team focuses on the mission.
The TAK explainer that brought you here, plus the SOC engineering posts behind the convergence story.
The full primer — what TAK is, what CoT does, how the server federates, and where ATAK / WinTAK / iTAK fit. The starting point for anyone evaluating the ecosystem.
Our flagship engineering write-up. How cyber detections from Wazuh land as CoT events on the ATAK map — the technical pattern behind every SOC × TAK engagement we run.
Patrol track-of-interest, fence-breach sensors, ANPR at checkpoints, off-grid radio relays — what a TAK-based border picture actually looks like in practice.
Multi-agency flood response on a shared map: drone overflights, evacuation zones, shelter locations, and inter-agency federation. A DDPM-style operational picture.
Tell us about your sensors, your teams, and the operational picture you wish you had. We'll come back with a thin-slice integration plan — no slideware, no boilerplate.
EN · TH · JA · ZH · KO welcome. Initial scoping calls are free; engagements scoped only after we understand the mission.