Develop, test, and assess your physical security system using customizable software with virtual facilities and analysis tools developed by Sandia National Laboratories, a global security leader for more than 70 years.

Log In

Get Started

Software Request

Software Update*


Scribe3D

Use Scribe3D© to conduct visually rich and responsive tabletop training exercises developed using modern game engine technology. Conduct tabletops on actual or notional facilities complete with a plethora of personnel, weapons, props, security system components, and vehicles to choose from. Scribe3D visualizes the exercise in real-time, tracking all personnel actions and events to intuitively convey time, events, personnel actions, and realistic consequences.

  • Create tabletop exercises for attack, theft, sabotage, or natural disasters
  • Evaluate current security system effectiveness, then add, move, or replace components as needed
  • Develop operational staff training videos
  • Develop terrains in 2D using images or 3D using models
  • Derive terrain from different sources, including maps, images, GIS, and high-fidelity 3D models
  • Intuitive interface enables rapid creation of personnel and vehicles easily and quickly
  • Integrated PHPK adjudication
  • First-person perspectives and control for all personnel and vehicles
  • All events and actions are captured into an instinctive timeline for clear scenario development, time management, and playback
  • Record notes at specific locations and times

PathTrace

Adversary Pathway Analysis and Exploration

image.png

PathTrace©, is a path analysis tool that uses established algorithms to help facility operators identify site security risks and vulnerabilities. PathTrace enables the user to upload floor plans or images of real-world, hypothetical or mock facilities and define site security components, detection areas, response force times, and targets. The user then specifies the adversary, including the adversary’s skills and tools. Using this information, PathTrace analyzes potential entry paths the adversary might use to successfully breach facility defenses, and provides the user with the following data:

  • Adversary task time
  • Total probability of detection
  • Critical detection point
  • Time after the critical detection point
  • Probability of interruption
  • Probability of detection, delay, and defeat time of every barrier
  • Detection area that the adversary has encountered

These tools, licensing, and training are free to registered partners.

Back to Top