VigilantGrid Platform

Operational and cybersecurity monitoring — in one platform.

Continuous monitoring across water, electric, and gas control systems. Network traffic, log data, control-system physics, and firmware — correlated, real-time, audit-ready.

A look inside

See VigilantGrid in flight.

Live network map and correlated event feed. Cyber events sit alongside physical events — because they live in the same platform.

Network map · substation 4VigilantGrid live network map
Live event feedVigilantGrid · mock data
03:14 UTCPLC outbound traffic flagged · substation 4-B → 184.105.x.x
03:09 UTCFirmware change detected · SEL-3530 relay 7
02:51 UTCForeign IP blocked · outbound from RTU-12 quarantined
02:43 UTCAuth anomaly · OPC server · 4 failed logins in 30s
02:31 UTCPatch applied · CVE-2025-1184 closed on 3 devices
02:14 UTCTap-changer drift · reg 12 · 27 ops/24h vs 6 baseline
01:58 UTCPhysical fault · breaker trip correlated to SCADA event
01:42 UTCSettings audit · relay 19 settings drift recorded
03:14 UTCPLC outbound traffic flagged · substation 4-B → 184.105.x.x
03:09 UTCFirmware change detected · SEL-3530 relay 7
02:51 UTCForeign IP blocked · outbound from RTU-12 quarantined
02:43 UTCAuth anomaly · OPC server · 4 failed logins in 30s
02:31 UTCPatch applied · CVE-2025-1184 closed on 3 devices
02:14 UTCTap-changer drift · reg 12 · 27 ops/24h vs 6 baseline
01:58 UTCPhysical fault · breaker trip correlated to SCADA event
01:42 UTCSettings audit · relay 19 settings drift recorded
The difference

Most OT tools watch one thing. VigilantGrid watches four.

Network traffic analysis is table stakes. VigilantGrid correlates four independent data sources — so when something looks normal in one, you can see what it looks like in the others.

🌐
Source 01
Network traffic

DNP3, Modbus, IEC-61850, IP. East-west and north-south flows from RTUs, PLCs, and field devices.

📝
Source 02
Log data

Authentication, configuration changes, command-and-control activity, audit trails from SCADA, OPC, and security concentrators.

Source 03
Physics of the control system

Voltage, current, tap positions, breaker states, pressure, flow, fault waveforms. The system telling you what it’s actually doing.

🔌
Source 04
Firmware tracking

Version inventory, change detection, CVE matching, and tampering alerts across every relay, RTU, and PLC in the fleet.

From extreme to mundane

Everything from cyber attacks to tap counts.

The same platform sees both ends of the spectrum. Other tools see only one — usually the wrong one for the situation in front of you.

Catastrophic — cyber
Cyber attack on a substation RTU.

Foreign IP outbound traffic, an authentication anomaly on the local OPC server, and a firmware-version change on a nearby relay — three weak signals across three data sources, correlated into one high-priority alert before any operational impact.

NetworkLogsFirmware
Mundane — operational
Voltage regulator changing tap 14× more than baseline.

Physics monitoring caught a slowly drifting tap-changer that no SCADA alarm threshold was watching. Bearing wear surfaced six months before failure — through one tap-count time series.

Physics

Both happened. Both surfaced through VigilantGrid. The same platform sees them.

The control-systems gap

Utility control systems were never built for today’s threat surface.

Most OT environments lack continuous visibility, can’t correlate cyber and physical events in time to act, and rely on manual processes that don’t scale across substations, pump stations, treatment plants, and compressor stations.

Blind spots between IT and OT

Cyber detection tools don’t understand DNP3, Modbus, or IEC-61850. SCADA alarms don’t see network anomalies. Neither team gets the full picture.

🔄
Configuration drift everywhere

RTU and relay settings drift over years. Default credentials linger. Firmware versions diverge across the fleet. None of it is visible until something breaks or fails an audit.

📝
Audits drain engineering time

NERC-CIP, TSA pipeline cybersecurity, and AWIA / EPA water requirements all want evidence. Assembling it manually pulls senior engineers away from real work.

Capabilities

What VigilantGrid does, day to day.

👁
Real-time cyber + physical monitoring

One pane for control-system events — substation, pump station, compressor station, control center.

🛡
Intrusion detection & SIEM

OT-aware detection rules that understand DNP3, Modbus, and IEC-61850 — not just IP traffic.

🔌
Network security monitoring

Continuous traffic analysis from RTUs, PLCs, and field devices to surface anomalies and policy violations.

📝
Firmware & vulnerability tracking

Inventory every device’s firmware version against known CVEs — with audit-ready evidence.

Fault analysis

Pull fault data from substations and field devices automatically — no truck rolls, no manual exports.

🔍
Rapid root-cause analysis

Replay correlated events across cyber and physical layers to compress investigation time from days to minutes.

What it monitors

Every corner of the control-system network.

Passive event collection, sanitization, and storage across the assets that actually run your utility.

Substations
💧
Pump & treatment stations
🔥
Compressor & regulator stations
🏭
Power plants
Distributed generation
🔌
Feeders & distribution
💻
Control centers
📱
Field devices & PLCs
Built for control systems

Water, electric, and gas utilities — one platform.

Designed for the protocols, devices, and regulatory regimes that real utility OT environments actually run on.

Electric
Investor-owned, co-ops, municipals, transmission operators

Substation RTUs, protection relays, SCADA, NERC-CIP audit posture — covered by one platform with native DNP3 and IEC-61850 awareness.

Aligned with: NERC-CIP
Water & wastewater
Treatment, distribution, and pump-station operators

Pump-station PLCs, treatment SCADA, lift-station RTUs — with cybersecurity posture documented to AWIA / EPA expectations.

Aligned with: AWIA / EPA
Gas pipeline
Transmission, distribution, and gathering operators

Compressor stations, regulator stations, gathering RTUs — with TSA pipeline cybersecurity directive documentation built in.

Aligned with: TSA pipeline cybersecurity
Add-on services

Pair the platform with expert hands.

VigilantGrid is the platform. These two services let GridIntel design, build, and operate your OT security program on top of it.

 
🔧
Service
Cyber Engineering

Design and harden the OT security architecture that VigilantGrid monitors. Network segmentation, hardened RTU and relay configurations, vulnerability remediation roadmap, and audit-ready documentation.

OT network segmentation & zone design
Device hardening (RTU, relay, PLC)
Compliance gap analysis & remediation
Learn more →
 
🛡
Service
SOC as a Service

24/7 expert monitoring on top of VigilantGrid. GridIntel OT analysts triage cyber and physical alerts, escalate real incidents, and deliver monthly executive reports — without the cost and staffing of building your own SOC.

24/7 OT-aware analyst coverage
Triage, escalation & runbook execution
Monthly compliance & incident reports
Learn more →
 
How it works

Four steps from device to decision.

01
Connect

Passively connect to field devices, SCADA systems, and security concentrators. No agents on production OT.

02
Collect & sanitize

Events sanitized and normalized into a unified time-series store across all four data sources.

03
Correlate

OT-aware rules surface real signals: a misconfigured RTU spotted alongside a relay misoperation that follows it.

04
Act

Engineers, security, and compliance get role-based dashboards, real-time alerts, and audit-ready reports.

See VigilantGrid on your control system.

A 30-minute walkthrough with a GridIntel specialist — tailored to your environment, no commitment.