[{"data":1,"prerenderedAt":618},["ShallowReactive",2],{"{\"version\":\"published\",\"resolve_links\":\"url\"}global/config":3,"global/config|published":161,"{\"version\":\"published\",\"resolve_links\":\"url\",\"resolve_relations\":[]}system":162,"system|published":617},{"data":4,"headers":137},{"story":5,"cv":126,"rels":127,"links":128},{"name":6,"created_at":7,"published_at":8,"updated_at":9,"id":10,"uuid":11,"content":12,"slug":14,"full_slug":118,"sort_by_date":46,"position":119,"tag_list":120,"is_startpage":49,"parent_id":121,"meta_data":46,"group_id":122,"first_published_at":123,"release_id":46,"lang":124,"path":46,"alternates":125,"default_full_slug":46,"translated_slugs":46},"Config","2024-10-29T08:04:36.784Z","2026-04-10T21:21:20.913Z","2026-04-10T21:21:20.934Z",13962863,"0833751d-fdcf-4209-b8c7-55f089b808fb",{"_uid":13,"component":14,"header_menu":15,"left_footer_menu":88,"right_footer_menu":89,"right_header_menu":109},"7ddf2809-6734-4fc4-9670-6fc36eda7e42","config",[16,29,37,50,60,68,78],{"_uid":17,"link":18,"component":28},"b612b9d4-c75a-42a0-92c5-864890aa4726",{"id":19,"url":20,"linktype":21,"fieldtype":22,"cached_url":23,"story":24},"9e8d022b-3480-47de-becc-68e99071c8b3","","story","multilink","home",{"name":25,"id":26,"uuid":19,"slug":23,"url":23,"full_slug":23,"_stopResolving":27},"Home",160621112776230,true,"menu-link",{"_uid":30,"link":31,"component":28},"7de0a7fe-a022-4255-b348-d030c00e1641",{"id":32,"url":20,"linktype":21,"fieldtype":22,"cached_url":33,"story":34},"b2a44abf-951c-4dd6-afb7-db6ca0cdab30","system",{"name":35,"id":36,"uuid":32,"slug":33,"url":33,"full_slug":33,"_stopResolving":27},"System",161010446918339,{"_uid":38,"link":39,"image":45,"as_button":49,"component":28,"title_override":20},"a0ffcd11-0237-47f2-a681-3e2f9a30b5b0",{"id":40,"url":20,"linktype":21,"fieldtype":22,"cached_url":41,"story":42},"8cc401de-e7af-4ad9-8f80-119cf1007d66","endpoint",{"name":43,"id":44,"uuid":40,"slug":41,"url":41,"full_slug":41,"_stopResolving":27},"Endpoint",161354198425907,{"id":46,"alt":46,"name":20,"focus":46,"title":46,"source":46,"filename":20,"copyright":46,"fieldtype":47,"meta_data":48},null,"asset",{},false,{"_uid":51,"link":52,"image":58,"as_button":49,"component":28,"title_override":20},"b614f471-3af2-4ec1-91a0-e78faf2c5ee5",{"id":53,"url":20,"linktype":21,"fieldtype":22,"cached_url":54,"story":55},"d163adae-897e-489d-853f-c9e37cf84cb8","pricing",{"name":56,"id":57,"uuid":53,"slug":54,"url":54,"full_slug":54,"_stopResolving":27},"Pricing",15199689,{"id":46,"alt":46,"name":20,"focus":46,"title":46,"source":46,"filename":20,"copyright":46,"fieldtype":47,"meta_data":59},{},{"_uid":61,"link":62,"component":28,"title_override":20},"aa968f07-28ea-46f9-a771-4ac9c22bf3e0",{"id":63,"url":20,"linktype":21,"fieldtype":22,"cached_url":64,"story":65},"b9cc568d-a89f-4f04-9baf-8ed0cde76ac7","about-us",{"name":66,"id":67,"uuid":63,"slug":64,"url":64,"full_slug":64,"_stopResolving":27},"About Us",15016755,{"_uid":69,"link":70,"image":76,"as_button":49,"component":28,"title_override":20},"a9d9a6b8-95ca-4ef2-befc-da58b65dfcf5",{"id":71,"url":20,"linktype":21,"fieldtype":22,"cached_url":72,"story":73},"4304f1dd-67a3-46cc-b914-104532e52a5c","careers",{"name":74,"id":75,"uuid":71,"slug":72,"url":72,"full_slug":72,"_stopResolving":27},"Careers",14761028,{"id":46,"alt":46,"name":20,"focus":46,"title":46,"source":46,"filename":20,"copyright":46,"fieldtype":47,"meta_data":77},{},{"_uid":79,"link":80,"image":86,"as_button":49,"component":28,"title_override":20},"f6b8ff20-da26-45c2-9f52-a52632327590",{"id":81,"url":20,"linktype":21,"fieldtype":22,"cached_url":82,"story":83},"d36ab688-b7df-4a61-841a-8527a9a24d96","newsroom",{"name":84,"id":85,"uuid":81,"slug":82,"url":82,"full_slug":82,"_stopResolving":27},"Newsroom",27502011,{"id":46,"alt":46,"name":20,"focus":46,"title":46,"source":46,"filename":20,"copyright":46,"fieldtype":47,"meta_data":87},{},[],[90,101],{"_uid":91,"link":92,"image":95,"as_button":49,"component":28},"ddf285db-7f84-4b12-a28b-55f628d7b09c",{"id":20,"url":93,"linktype":94,"fieldtype":22,"cached_url":93},"https://twitter.com/GalvanickCo","url",{"id":96,"alt":20,"name":20,"focus":97,"title":20,"source":20,"filename":98,"copyright":20,"fieldtype":47,"meta_data":99,"content_type":100,"is_external_url":49},996530,"394x395:395x396","https://a-us.storyblok.com/f/1022207/800x800/27c02bd27d/x_logo.jpg",{"alt":20,"title":20,"source":20,"copyright":20},"jpg",{"_uid":102,"link":103,"image":105,"as_button":49,"component":28},"9039371a-b752-492b-8374-9311e55da2c5",{"id":20,"url":104,"linktype":94,"fieldtype":22,"cached_url":104},"https://www.linkedin.com/company/galvanick/",{"id":106,"alt":20,"name":20,"focus":20,"title":20,"source":20,"filename":107,"copyright":20,"fieldtype":47,"meta_data":108,"is_external_url":49},996529,"https://a-us.storyblok.com/f/1022207/512x512/9c948f2847/61109.png",{},[110],{"_uid":111,"link":112,"as_button":27,"component":28,"title_override":20},"7a07de42-1099-43a3-b056-a93d11ba1f94",{"id":113,"url":20,"linktype":21,"fieldtype":22,"cached_url":114,"story":115},"0d23699b-c9ea-4c86-b327-261a69fe2828","get-started",{"name":116,"id":117,"uuid":113,"slug":114,"url":114,"full_slug":114,"_stopResolving":27},"Get Started",15122427,"global/config",-20,[],13962862,"0d60ecf1-c2d3-4bf3-a36e-ed2d47259f15","2024-11-08T22:49:35.365Z","default",[],1776116620,[],[129,130,131,132,133,134,135,136],{"name":116,"id":117,"uuid":113,"slug":114,"url":114,"full_slug":114},{"name":74,"id":75,"uuid":71,"slug":72,"url":72,"full_slug":72},{"name":43,"id":44,"uuid":40,"slug":41,"url":41,"full_slug":41},{"name":25,"id":26,"uuid":19,"slug":23,"url":23,"full_slug":23},{"name":35,"id":36,"uuid":32,"slug":33,"url":33,"full_slug":33},{"name":66,"id":67,"uuid":63,"slug":64,"url":64,"full_slug":64},{"name":56,"id":57,"uuid":53,"slug":54,"url":54,"full_slug":54},{"name":84,"id":85,"uuid":81,"slug":82,"url":82,"full_slug":82},{"age":138,"cache-control":139,"connection":140,"content-encoding":141,"content-type":142,"date":143,"etag":144,"referrer-policy":145,"sb-be-version":146,"server":147,"strict-transport-security":148,"transfer-encoding":149,"vary":150,"via":151,"x-amz-cf-id":152,"x-amz-cf-pop":153,"x-cache":154,"x-content-type-options":155,"x-frame-options":156,"x-permitted-cross-domain-policies":157,"x-request-id":158,"x-runtime":159,"x-xss-protection":160},"86929","max-age=0, public, s-maxage=604800, stale-if-error=3600","keep-alive","gzip","application/json; charset=utf-8","Mon, 13 Apr 2026 21:44:25 GMT","W/\"7da7cd80e5e372c9afeee45353038d3c\"","strict-origin-when-cross-origin","5.730.0","nginx/1.29.1","max-age=31536000","chunked","Origin,Accept-Encoding, Origin","1.1 295b916a9e7205a7661c81a0c48d031c.cloudfront.net (CloudFront)","6tfFvp3VHLE3Fbgl8YrUn0CSjKE2F4KB1l7plTOYc0hLRqhKtBcmZg==","IAD55-P10","Hit from cloudfront","nosniff","SAMEORIGIN","none","f921300b-4cd6-41ff-aab3-3c9ea690eb1a","0.020336","0",["Reactive",5],{"data":163,"headers":610},{"story":164,"cv":126,"rels":606,"links":607},{"name":35,"created_at":165,"published_at":166,"updated_at":167,"id":36,"uuid":32,"content":168,"slug":33,"full_slug":33,"sort_by_date":46,"position":600,"tag_list":601,"is_startpage":49,"parent_id":602,"meta_data":46,"group_id":603,"first_published_at":604,"release_id":46,"lang":124,"path":46,"alternates":605,"default_full_slug":46,"translated_slugs":46},"2026-03-31T23:13:11.129Z","2026-04-10T23:02:34.670Z","2026-04-10T23:02:34.742Z",{"_uid":169,"body":170,"title":35,"component":598,"description":599,"fade_in_rows":49,"display_title":27},"129aa9df-ac8a-49a1-8cd7-0456a3552d78",[171,220,301,314,371,425,467,505,578,583],{"_uid":172,"body":173,"component":219,"background":20,"full_width":27,"has_padding":49,"center_content":49,"fade_on_scroll":49,"fit_to_contents":27},"ada59040-71e3-4ee1-ad91-2e670d62c942",[174],{"_uid":175,"body":176,"image":216,"padded":49,"component":218,"background":124,"mask_image":49,"has_padding":27,"fade_on_scroll":49,"constrain_content_width":49},"13f3dc13-fdb9-4f4b-95ff-eddfe2480d58",[177,181,209],{"_uid":178,"text":179,"component":180,"has_underline":27},"e98e3480-6ef3-4510-bc45-8e800c306975","Threat detection across every data source.","header",{"_uid":182,"body":183,"component":208},"ebb850a8-d588-42a5-a940-1dc073d9113e",{"type":184,"content":185},"doc",[186,199],{"type":187,"attrs":188,"content":190},"paragraph",{"textAlign":46,"key":189},"p-0",[191],{"text":192,"type":193,"marks":194},"Galvanick ingests endpoint, network, infrastructure, and application data into a single detection engine. It correlates activity across every source, detects threats through behavioral analysis, and delivers complete findings with recommended response actions.","text",[195],{"type":196,"attrs":197},"textStyle",{"color":198},"#000000",{"type":187,"attrs":200,"content":202},{"textAlign":46,"key":201},"p-1",[203],{"text":204,"type":193,"marks":205},"Deploy in Galvanick-managed cloud, GovCloud, or fully on-premises.",[206],{"type":196,"attrs":207},{"color":198},"text-block",{"_uid":210,"link":211,"size":213,"text":214,"variant":20,"component":215},"84fa2980-1284-4675-b366-81a8be4bab13",{"id":113,"url":20,"linktype":21,"fieldtype":22,"cached_url":114,"story":212},{"name":116,"id":117,"uuid":113,"slug":114,"url":114,"full_slug":114,"_stopResolving":27},"lg","Schedule a demo","button",{"id":46,"alt":46,"name":20,"focus":46,"title":46,"filename":46,"copyright":46,"fieldtype":47,"meta_data":217,"is_external_url":49},{},"hero","full-width-container",{"id":20,"_uid":221,"style":222,"component":223,"background":224,"full_width":49,"has_padding":49,"left_content":225,"right_content":295,"fade_on_scroll":49},"196f074b-e955-431b-b779-e1901a3938f1","auto","two-panel","navy",[226,229,232],{"_uid":227,"size":213,"component":228},"33985538-7c5f-44b8-9edd-a772f6fb3b11","Spacer",{"_uid":230,"text":231,"component":180,"has_underline":49},"831c26fc-aa42-4812-9858-238485688bcc","Multi-source data collection.",{"_uid":233,"body":234,"component":208},"8bfc7f3b-614a-43ea-9a5c-6d2dd933859a",{"type":184,"content":235},[236,241],{"type":187,"attrs":237,"content":238},{"textAlign":46,"key":189},[239],{"text":240,"type":193},"Galvanick ingests and normalizes data from every layer of your environment, simultaneously and without operational impact. ",{"type":242,"content":243},"bullet_list",[244,256,268,280],{"type":245,"content":246},"list_item",[247],{"type":187,"attrs":248,"content":249},{"textAlign":46,"key":201},[250,254],{"text":43,"type":193,"marks":251},[252],{"type":253},"bold",{"text":255,"type":193}," (HMIs, engineering workstations)",{"type":245,"content":257},[258],{"type":187,"attrs":259,"content":261},{"textAlign":46,"key":260},"p-2",[262,266],{"text":263,"type":193,"marks":264},"Network",[265],{"type":253},{"text":267,"type":193}," (Modbus, Profinet, Ethernet/IP, etc.)",{"type":245,"content":269},[270],{"type":187,"attrs":271,"content":273},{"textAlign":46,"key":272},"p-3",[274,278],{"text":275,"type":193,"marks":276},"Application ",[277],{"type":253},{"text":279,"type":193},"(change management, ticketing, inventory)",{"type":245,"content":281},[282,292],{"type":187,"attrs":283,"content":285},{"textAlign":46,"key":284},"p-4",[286,290],{"text":287,"type":193,"marks":288},"Infrastructure",[289],{"type":253},{"text":291,"type":193}," (Syslog ingestion from firewalls and network devices)",{"type":187,"attrs":293},{"textAlign":46,"key":294},"p-5",[296,298],{"_uid":297,"size":213,"component":228},"9395b6d8-7933-4141-86b0-81ccbd94c084",{"_uid":299,"component":300},"39fb1929-230d-40a0-9a70-79a35455cd8d","data-collection-diagram",{"id":20,"_uid":302,"style":222,"component":223,"background":224,"full_width":49,"has_padding":27,"left_content":303,"right_content":307,"fade_on_scroll":49},"4c491ef1-ff9e-4179-b711-7de331e480cf",[304],{"_uid":305,"text":306,"component":180,"has_underline":49},"05c1c334-f549-40e1-882a-d9eb497427d8","Already have network monitoring?",[308],{"_uid":309,"link":310,"size":213,"text":313,"variant":20,"component":215},"555810a7-3b7d-4764-b487-ed83f390ea7b",{"id":40,"url":20,"linktype":21,"fieldtype":22,"cached_url":311,"story":312},"endpoint-nick-draft",{"name":43,"id":44,"uuid":40,"slug":41,"url":41,"full_slug":41,"_stopResolving":27},"view our endpoint solution",{"id":20,"_uid":315,"style":222,"component":223,"background":20,"full_width":49,"has_padding":27,"left_content":316,"right_content":320,"fade_on_scroll":49},"64786b3f-e76a-436a-a8dd-8efcf2e23d87",[317],{"_uid":318,"component":319},"2f45aaa3-c1ce-4ed5-9e33-5e8f0176d6c7","attack-path-diagram",[321,324],{"_uid":322,"text":323,"component":180,"has_underline":49},"b5438f45-760c-4f5c-9d84-2c694e043537","Behavioral Threat Detection.",{"_uid":325,"body":326,"component":208},"ad4d3126-edc4-4b68-bf3c-2d634f65441b",{"type":184,"content":327},[328,333,338,368],{"type":187,"attrs":329,"content":330},{"textAlign":46,"key":189},[331],{"text":332,"type":193},"Galvanick analyzes the specific actions attackers take to compromise OT systems, not statistical deviations. It slots in immediately with no learning period required.",{"type":187,"attrs":334,"content":335},{"textAlign":46,"key":201},[336],{"text":337,"type":193},"Anomaly-based tools require weeks of baselining, generate alerts on benign operational changes, and miss novel attacks that don't deviate from learned patterns. Galvanick does it differently.",{"type":242,"content":339},[340,347,354,361],{"type":245,"content":341},[342],{"type":187,"attrs":343,"content":344},{"textAlign":46,"key":260},[345],{"text":346,"type":193},"MITRE ATT&CK for ICS mapping",{"type":245,"content":348},[349],{"type":187,"attrs":350,"content":351},{"textAlign":46,"key":272},[352],{"text":353,"type":193},"Cross-source attacker tradecraft identification",{"type":245,"content":355},[356],{"type":187,"attrs":357,"content":358},{"textAlign":46,"key":284},[359],{"text":360,"type":193},"Early-stage detection of lateral movement and reconnaissance",{"type":245,"content":362},[363],{"type":187,"attrs":364,"content":365},{"textAlign":46,"key":294},[366],{"text":367,"type":193},"Coverage for living-off-the-land techniques and bespoke tooling",{"type":187,"attrs":369},{"textAlign":46,"key":370},"p-6",{"id":20,"_uid":372,"style":222,"component":223,"background":224,"full_width":49,"has_padding":27,"left_content":373,"right_content":421,"fade_on_scroll":49},"4a450369-00a6-479e-8ad5-ad10633cd198",[374,377,416],{"_uid":375,"text":376,"component":180,"has_underline":49},"6e5a6a67-11c1-4291-84df-0fc8c2517e2b","Automated investigations.",{"_uid":378,"body":379,"component":208},"4f389c19-7544-482a-88fd-bf2cb16e34aa",{"type":184,"content":380},[381,386],{"type":187,"attrs":382,"content":383},{"textAlign":46,"key":189},[384],{"text":385,"type":193},"When Galvanick detects suspicious activity, it automatically investigates across all data sources, reconstructs the full attack path, and delivers a complete finding in seconds.",{"type":242,"content":387},[388,395,402,409],{"type":245,"content":389},[390],{"type":187,"attrs":391,"content":392},{"textAlign":46,"key":201},[393],{"text":394,"type":193},"Asset, user, and process attribution for every finding",{"type":245,"content":396},[397],{"type":187,"attrs":398,"content":399},{"textAlign":46,"key":260},[400],{"text":401,"type":193},"Cross-source event correlation and timeline reconstruction",{"type":245,"content":403},[404],{"type":187,"attrs":405,"content":406},{"textAlign":46,"key":272},[407],{"text":408,"type":193},"Historical pattern comparison and prior activity matching",{"type":245,"content":410},[411],{"type":187,"attrs":412,"content":413},{"textAlign":46,"key":284},[414],{"text":415,"type":193},"Complete attack path from initial access to current state",{"_uid":417,"link":418,"size":213,"text":420,"variant":20,"component":215},"f08e80f9-15b3-4a7e-afbc-4538b9699e3b",{"id":113,"url":20,"linktype":21,"fieldtype":22,"cached_url":114,"story":419},{"name":116,"id":117,"uuid":113,"slug":114,"url":114,"full_slug":114,"_stopResolving":27},"See it in real time",[422],{"_uid":423,"component":424},"d9bb6f2e-d27f-4958-86ee-a63db1ff1c2f","attack-timeline-diagram",{"id":20,"_uid":426,"style":222,"component":223,"background":20,"full_width":49,"has_padding":27,"left_content":427,"right_content":431,"fade_on_scroll":49},"940d82cd-6e0b-4179-b7bc-da73d62ec33a",[428],{"_uid":429,"component":430},"4733df4b-546e-44f0-a8c6-0ea8c5256679","response-routing-diagram",[432,435],{"_uid":433,"text":434,"component":180,"has_underline":49},"2fc3a327-a483-4dc0-992e-548ec1c6b432","Intelligent Response Guidance.",{"_uid":436,"body":437,"component":208},"26c940f4-63bb-4284-adeb-ae802c490f08",{"type":184,"content":438},[439,444],{"type":187,"attrs":440,"content":441},{"textAlign":46,"key":189},[442],{"text":443,"type":193},"Every finding includes environment-aware response recommendations and integrates seamlessly into your response process.",{"type":242,"content":445},[446,453,460],{"type":245,"content":447},[448],{"type":187,"attrs":449,"content":450},{"textAlign":46,"key":201},[451],{"text":452,"type":193},"Severity-specific next steps for affected assets",{"type":245,"content":454},[455],{"type":187,"attrs":456,"content":457},{"textAlign":46,"key":260},[458],{"text":459,"type":193},"SIEM, Slack, Teams, and Outlook integration",{"type":245,"content":461},[462],{"type":187,"attrs":463,"content":464},{"textAlign":46,"key":272},[465],{"text":466,"type":193},"Response actions tailored to observed activity",{"id":20,"_uid":468,"body":469,"component":219,"background":224,"full_width":49,"has_padding":27,"center_content":27,"fade_on_scroll":49},"1cc687f8-9e23-4850-a8af-5867a732636a",[470,473,482,485],{"_uid":471,"text":472,"component":180,"has_underline":49},"09fff54d-174f-40d8-a6a9-fd0949b81aaa","Deploy in hours. Detect on day one.",{"_uid":474,"body":475,"component":208},"e85c9f3a-6745-442a-b334-1c2c1fffdb14",{"type":184,"content":476},[477],{"type":187,"attrs":478,"content":479},{"textAlign":46,"key":189},[480],{"text":481,"type":193},"Deploy in Galvanick-managed cloud, customer-managed GovCloud (including FedRAMP High), or on-premises environments. No SIEM needed: Galvanick handles correlation, detection, and investigation natively.",{"_uid":483,"size":484,"component":228},"713a3206-7ddb-4543-8306-d32da3f10605","sm",{"_uid":486,"cards":487,"component":504},"9926a380-8dd4-4def-88ec-ae519b86fb5b",[488,494,499],{"_uid":489,"stat":490,"label":491,"component":492,"description":493},"a8d91dc9-5662-40e9-bd2c-70a6b7bf381d","Instant","Cloud provisioning.","stat-card","Galvanick provisions your analytics environment and configures the platform. No customer time required.",{"_uid":495,"stat":496,"label":497,"component":492,"description":498,"line_position":20},"fca7eb45-5adf-4701-b7c9-7d8319d7bc37","One Window","Sensor deployment.","Galvanick sensors deploy during a single maintenance window, without rebooting your systems.",{"_uid":500,"stat":501,"label":502,"component":492,"description":503,"line_position":20},"99dae17e-62e1-45e2-93b0-a1035fb19de1","Day One","Detection starts.","Threat detection begins immediately with no learning period. Endpoints are analyzed for prior activity.","stat-cards",{"id":20,"_uid":506,"body":507,"component":219,"background":124,"full_width":49,"has_padding":49,"center_content":27,"fade_on_scroll":49},"cccb1cd3-f338-4542-9443-09c2f7d52522",[508,511,514,575],{"_uid":509,"size":510,"component":228},"446feaed-fe79-41d7-82fe-5fb33368765a","md",{"_uid":512,"text":513,"component":180,"has_underline":49},"eab9bab2-dede-4fe9-b56f-bdb0cc8e3c2b","Zero Operational Impact.",{"_uid":515,"body":516,"component":208},"b12a0d25-5263-445e-9916-ecba077a2044",{"type":184,"content":517},[518,535,564],{"type":187,"attrs":519,"content":521},{"textAlign":520,"key":189},"left",[522,524,528,530],{"text":523,"type":193},"Galvanick collects data ",{"text":525,"type":193,"marks":526},"passively",[527],{"type":253},{"text":529,"type":193},". ",{"text":531,"type":193,"marks":532},"No active scanning, no probing, no inline deployment.",[533],{"type":196,"attrs":534},{"color":20},{"type":187,"attrs":536,"content":537},{"textAlign":520,"key":201},[538,540,544,546,550,552,556,558,562],{"text":539,"type":193},"Endpoint sensors run in ",{"text":541,"type":193,"marks":542},"user-mode only",[543],{"type":253},{"text":545,"type":193}," with ",{"text":547,"type":193,"marks":548},"no kernel drivers",[549],{"type":253},{"text":551,"type":193},", ",{"text":553,"type":193,"marks":554},"no control channel",[555],{"type":253},{"text":557,"type":193},", and ",{"text":559,"type":193,"marks":560},"no self-updates",[561],{"type":253},{"text":563,"type":193},". Network sensors monitor via SPAN/TAP. Infrastructure and application data flow through standard syslog and API integrations. All analysis  happens in the analytics engine, off your production systems entirely, deployable in managed cloud, GovCloud, or on-premise.",{"type":187,"attrs":565,"content":566},{"textAlign":520,"key":260},[567,569,573],{"text":568,"type":193},"This is ",{"text":570,"type":193,"marks":571},"OT-safe by architecture",[572],{"type":253},{"text":574,"type":193},", not configuration. Galvanick cannot execute commands, push updates, or modify systems in your industrial environment because it lacks the architectural capability to do so.",{"_uid":576,"component":577},"53246cd8-2c6f-44f9-93ce-854d723bfda3","passive-sensor-diagram",{"_uid":579,"color":580,"component":581,"thickness":582,"full_width":49,"fade_on_scroll":49},"4395e4af-1abb-4701-bb85-81d10ab41009","accent","divider","thin",{"id":20,"_uid":584,"style":222,"component":223,"background":20,"full_width":49,"has_padding":49,"left_content":585,"right_content":591,"fade_on_scroll":49},"34981bbb-83cb-44ed-98fc-979af0f6a2fb",[586,588],{"_uid":587,"size":213,"component":228},"4c073adc-ce07-412f-9ef1-35eec0e0b5e1",{"_uid":589,"text":590,"component":180,"has_underline":49},"3de3d41d-a4c5-464d-8b9e-4df5040ab359","See how Galvanick Correlates data across your entire OT environment.",[592],{"_uid":593,"link":594,"size":596,"text":597,"component":215},"b834036e-8ef9-4cb1-ae02-581a0c5f7c2e",{"id":113,"url":20,"linktype":21,"fieldtype":22,"cached_url":114,"story":595},{"name":116,"id":117,"uuid":113,"slug":114,"url":114,"full_slug":114,"_stopResolving":27},"xl","Schedule a Demo","page","Complete Visibility Of Your Industrial Environment And Real-Time Threat Detection",30,[],0,"42384042-22f5-4913-810e-0ef52ef8e80a","2026-04-10T21:21:54.881Z",[],[],[608,609],{"name":116,"id":117,"uuid":113,"slug":114,"url":114,"full_slug":114},{"name":43,"id":44,"uuid":40,"slug":41,"url":41,"full_slug":41},{"age":611,"cache-control":139,"connection":140,"content-encoding":141,"content-type":142,"date":612,"etag":613,"referrer-policy":145,"sb-be-version":146,"server":147,"strict-transport-security":148,"transfer-encoding":149,"vary":150,"via":151,"x-amz-cf-id":614,"x-amz-cf-pop":153,"x-cache":154,"x-content-type-options":155,"x-frame-options":156,"x-permitted-cross-domain-policies":157,"x-request-id":615,"x-runtime":616,"x-xss-protection":160},"86927","Mon, 13 Apr 2026 21:44:28 GMT","W/\"0b0f431eb7c7a9a0fbceade8c3aae8f5\"","YSl8MH1dcsAbOPiVBkCvt-tjND07JYuebyU_E1GA_oNoel2_BQSSGw==","a826de6a-ceeb-4ba6-8520-d5b974f017d9","0.022105",["Reactive",164],1776203592717]