For Utilities
Problem
Solution
Approach
Problem
Root cause analysis, event reconstruction, predictive maintenance, troubleshooting settings, and the identification of malicious activity are each by their own right a challenge. These challenges are exponentially magnified for resource-constrained teams and when events are analyzed in silos.
Solution
Using GridIntel’s VigilantGrid, our power system engineers and security analysts are equipped with the tools and knowledge to augment your teams and help passively and securely monitor your power system environments. Events, alarms, and other operational data is passively collected and sent to monitoring tools like VigilantGrid where it is then analyzed by our engineers and security analysts.
Approach
Our interdisciplinary team of licensed power engineers and security analysts work with you to collect and monitor in near real-time operational, diagnostic, and security event data. We then flag events and will start correlating event logs from a variety of sources and of different types to gain a complete picture. At every stage of the analysis, the context of the power system is taken into consideration. For example, there are many system assets that are unique to our industry like breakers, transformers, and cap bank controllers. This also includes the devices (remote terminal units, protection relays, automation controllers) used for control and monitoring. These assets produce events and alarms that when analyzed in the context of the power system application produce a wealth of information that can be used to ensure the reliability and overall resilience of the system.
Trust
Together with our sister firm Ampirical we have a proven track record of focused service to the power industry and in safeguarding system designs, settings files, and other proprietary information that either we directly produce as a design deliverable or are given. This track record includes a variety of projects ranging from designing and building to securing and maintaining power plants, substations, and T&D lines. In other words, we are fully aware of the responsibility and have vetted controls in place for protecting sensitive and proprietary information.
Key Areas
- SIEM as a Service
- Physical and Virtual Intrusion Detection
- Root Cause Analysis
- Event Reconstruction
- Thermal Monitoring
- Gas Monitoring
- Fault Analysis
- Predictive Maintenance/Analytics