Modelling Hazardous Phenomena

Modelling consequences of accidental phenomena

From reputational damage to unforeseen costs, increased risks and threats associated with driving industrial projects can have dramatic consequences. That’s why today’s industrial risk management strategies require C-level attention

Leading the way

We pride that our customers recognize us as having developed an integrated modelling approach, built on years of modelling complex scenarii in the most critical industries.

Why Airbus Protect?

To better prevent risks and justify the layout and the design of facilities, we focus on the following areas:

  • Analysing hazardous phenomena and quantifying potential effects
  • Anticipating the consequences of an accidental scenario
  • Understanding the vulnerability of a site to the effects of fire, explosion and the dispersion of toxic products
  • Positioning gas and flame detection sensors…

Our offering

Our highly skilled consultants, experts and trainers can help you manage and mitigate risk and predict the consequences of a dangerous scenario. Our offering covers:

  • Thermal effects (fire, flaming jet, flash fire, fire ball…)
  • Overpressure waves effects (explosions, BLEVE, UVCE…)
  • Accidental atmospheric dispersion (toxic products, dust…)
  • Toxic and/or flammable products concentration in a room
  • Pyrotechnic effects / Ballistic (explosives, wind farm…)
  • 2D/3D modelling: PHAST, FDS, Flumilog, Winvent, CFAST…

Get in touch to discover how we can support you

What's new?

Filter
Blog Security Architecture part 1: budget
Budgeting for Security Architecture: Making the Business Case for Investment

In today’s digital-first world, cybersecurity isn’t just an IT cost; it’s a fundamental business enabler and a critical component of risk management. Yet, ask any security architect and they’ll likely tell you that securing adequate budget for robust security architecture initiatives remains a persistent challenge. How do you move beyond simply asking for more money […]

News
Understanding Uber’s corporate hack – lessons learned

On September 15th this year, an 18-year-old surprised Uber’s security team by gaining access to the company’s internal networks. The supposed attacker sent evidence of their escapades to security researchers and the New York Times – including screenshots of source code, cloud storage, and internal emails. The attacker also explained their methods – presenting a […]

Blog Expectations vs. Reality: Cybersecurity and Remote Working
Expectations vs. Reality: Cybersecurity and Remote Working

Why is remote working so significant? When the pandemic unexpectedly arose organisations were not fully prepared and the supporting infrastructures for this change were not in place. Despite this, the world continued to move, and so as a result various ways of connecting to an organisation’s facilities spawned; this has extended the attack surface to […]