Modelling Hazardous Phenomena

Modelling consequences of accidental phenomena

From reputational damage to unforeseen costs, increased risks and threats associated with driving industrial projects can have dramatic consequences. That’s why today’s industrial risk management strategies require C-level attention

Leading the way

We pride that our customers recognize us as having developed an integrated modelling approach, built on years of modelling complex scenarii in the most critical industries.

Why Airbus Protect?

To better prevent risks and justify the layout and the design of facilities, we focus on the following areas:

  • Analysing hazardous phenomena and quantifying potential effects
  • Anticipating the consequences of an accidental scenario
  • Understanding the vulnerability of a site to the effects of fire, explosion and the dispersion of toxic products
  • Positioning gas and flame detection sensors…

Our offering

Our highly skilled consultants, experts and trainers can help you manage and mitigate risk and predict the consequences of a dangerous scenario. Our offering covers:

  • Thermal effects (fire, flaming jet, flash fire, fire ball…)
  • Overpressure waves effects (explosions, BLEVE, UVCE…)
  • Accidental atmospheric dispersion (toxic products, dust…)
  • Toxic and/or flammable products concentration in a room
  • Pyrotechnic effects / Ballistic (explosives, wind farm…)
  • 2D/3D modelling: PHAST, FDS, Flumilog, Winvent, CFAST…

Get in touch to discover how we can support you

What's new?

Filter
Blog Uncovering Cyber Intruders

Uncovering Cyber Intruders: A Forensic Deep Dive into NetScan, Angry IP Scanner, and Advanced Port Scanner

Introduction The use of network scanners with a graphical user interface (GUI) has been observed in a number of former IR engagements conducted by the CSIRT Airbus Protect. Indeed, Ransomware and Advanced Persistent Threat (APT) operators often use tools like GUI network scanners as part of their techniques. By using network scanners, operators can map [...]

Blog Regulation (EU, Euratom) 2023/2841: What does it mean for EUIBA?

Regulation (EU, Euratom) 2023/2841: What does it mean for EUIBAs?

What is Regulation 2023/2841?   The EU cybersecurity Regulation, which came into force at the start of this year, aims to establish a comprehensive and standardised approach to cybersecurity across European Union Institutions, Bodies and Agencies (EUIBA). This ensures that all entities are well-protected against evolving cyber threats and capable of executing a coordinated incident […]

Blog CSIRT blogpost

Incident Response: Analysis of recent version of BRC4

Introduction During our latest incident response case we have discovered a recent sample of Brute Ratel C4 packed with Themida. BRC4 is a powerful Command and Control (C2) tool which allows to control targeted workstations through an executable agent. The objective of Themida is to protect code against reverse engineering. Currently, C2 tools are used [...]