Managing a distributed grid requires real-time awareness of diverse devices – from smart meters and home batteries to reclosers and transformers. Existing grid management tools lack the visibility and network awareness that distribution utilities will come to need.
Our approach is different. We provide grid-wide, real-time visibility and network optimization, inclusive of utility-owned and customer devices. Leveraging distributed computing, our monitoring and controls technology enables operators to reliably and securely manage grid conditions, scaling to nearly infinite distributed devices.
Integrate disparate data sources.
Select modules to fit your needs.
Manage ten devices or ten million.
Leverage proven technology.
Protect with zero trust security.
Stay safe with regular updates.
With GMaaS, utilities subscribe to reliable, secure cloud-based tools hosted by a third-party.
We employ the proven advantages of software as a service (SaaS) to manage the grid with Grid Management Software as a Service (GMaaS).
Instead of on-premise software that quickly becomes outdated, GMaaS provides utilities with tools that evolve to tackle new challenges.
Grow from monitoring and controlling hundreds of assets to millions. Our cloud software employs distributed computing principles to handle massive data sets and run complex simulations quickly and accurately.
Our cloud-based updates are automatic, with no downtime or additional costs, so you’ll always have access to the latest tools.
Our open source foundation enables utilities to collaborate, innovate, and customize solutions to meet unique and evolving needs with forward compatibility and full flexibility.
We’ve seen the power of open source to transform other industries. We believe that collaboration will create more value for all involved and unlock the sustainable, decentralized energy ecosystem of the future.
Our zero trust cybersecurity model authenticates each user or subsystem through multi-channel mechanisms and provides explicit access to only a limited set of systems.
This end-to-end security approach protects your infrastructure better than relying upon a firewall or VPN, which focus solely on keeping bad actors out while leaving internal services exposed to those inside the security boundary.
Get started with an initial setup and integrate diverse data sources in weeks. Then, enjoy your subscription to cloud hosting, maintenance, data management, and technical support.
Scale your capabilities by adding new software modules like DER orchestration and market integration. You have the flexibility to add what you need, when you need it.