Modelling Hazardous Phenomena

Modelling consequences of accidental phenomena

From reputational damage to unforeseen costs, increased risks and threats associated with driving industrial projects can have dramatic consequences. That’s why today’s industrial risk management strategies require C-level attention

Leading the way

We pride that our customers recognize us as having developed an integrated modelling approach, built on years of modelling complex scenarii in the most critical industries.

Why Airbus Protect?

To better prevent risks and justify the layout and the design of facilities, we focus on the following areas:

  • Analysing hazardous phenomena and quantifying potential effects
  • Anticipating the consequences of an accidental scenario
  • Understanding the vulnerability of a site to the effects of fire, explosion and the dispersion of toxic products
  • Positioning gas and flame detection sensors…

Our offering

Our highly skilled consultants, experts and trainers can help you manage and mitigate risk and predict the consequences of a dangerous scenario. Our offering covers:

  • Thermal effects (fire, flaming jet, flash fire, fire ball…)
  • Overpressure waves effects (explosions, BLEVE, UVCE…)
  • Accidental atmospheric dispersion (toxic products, dust…)
  • Toxic and/or flammable products concentration in a room
  • Pyrotechnic effects / Ballistic (explosives, wind farm…)
  • 2D/3D modelling: PHAST, FDS, Flumilog, Winvent, CFAST…

Get in touch to discover how we can support you

What's new?

Filter
Blog woman_working_cybersecurity
Women in STEM: Sunaina Aytan, cybersecurity consultant

With over four years of cyber experience under her belt, Sunaina Aytan is a cybersecurity consultant based in Airbus Protect’s Newport campus. In this blog, Sunaina explains more about her route into cyber and what attracted her to Airbus Protect – as well as sharing her training and development top tips. Tell us about your […]

Blog AD Canary
Active Directory: A canary under your hat – Part 2

Foreword: This three-part blog article series focuses on some research work on how to detect effectively Active Directory enumeration in a SOC environment. To help you through this quite long journey, grab a cup of hot beverage of your liking, and use this short reference: Part 1: about detecting AD enumeration  This first part explains […]

Blog A year on from the NHS Ransomware attack
A year on from the NHS Ransomware Attack

What happened to the NHS a year ago? Let’s find out with Gareth, CTI & Vulnerability Lead at Airbus Protect Introduction to NHS Ransomware Attack A year has passed since the NHS fell victim to a further major ransomware attack which saw their critical NHS 111 service being taken offline alongside management systems for GP […]