If you are a power utility dealing with rising cyber-physical threats to your generation assets — DEFENDER developed an integrated security platform tested at TRL 7 that combines drone surveillance, sensor networks, and AI-based threat detection. It was validated on 4 real demonstrator sites including a bulk generation plant operated by ENGIE SA and a decentralized renewable energy site, covering the full energy value chain.
Integrated Cyber-Physical Security System for Energy Grids and Power Plants
Imagine your power grid is like a house with dozens of doors and windows — some physical, some digital. Right now, most security systems only watch either the doors or the windows, never both at the same time. DEFENDER built an alarm system that watches everything together: cameras, drones, network sensors, and even the people inside. They tested it on real power plants, transmission networks, and renewable energy sites across Europe to catch both hackers and physical intruders before they cause blackouts.
What needed solving
Energy companies face a growing convergence of cyber and physical threats to their infrastructure — but most security solutions only address one side, leaving dangerous blind spots. A hacker breaching a grid control system while someone tampers with a substation physically creates a compounding threat that siloed security tools cannot catch. Operators need an integrated detection and response system that sees the full picture across generation, transmission, and distribution assets.
What was built
DEFENDER built an integrated cyber-physical security platform combining drone surveillance, fixed sensors (PMUs), advanced video monitoring, AI-based threat detection, blockchain-based trust mechanisms, and an incident response toolbox. The system was validated at TRL 7 across 4 real energy sites and 1 lab emulator covering the full energy chain.
Who needs this
Who can put this to work
If you are a grid operator struggling to protect geographically dispersed infrastructure from combined cyber and physical attacks — DEFENDER built a detection and response toolbox validated on a TSO high-voltage network (ELES in Slovenia) and a DSO distribution network (ASM in Italy). The system uses fixed sensors like PMUs plus mobile drones to give real-time situational awareness across your entire grid.
If you are a security integrator looking for proven cyber-physical protection technology to offer energy clients — DEFENDER integrated TRL 4-5 technologies into a TRL 7 adaptable security system with blockchain-based trust, video surveillance, and incident response tools. With 13 industry partners in the consortium, there are multiple potential technology licensing and integration partnership paths.
Quick answers
What would it cost to implement this security system?
The project data does not include specific pricing or per-unit costs. However, given the system was designed as a modular and adaptable platform validated across 4 different site types, implementation costs would vary depending on infrastructure scale. Contact the consortium for pricing discussions.
Can this scale to protect a national-level grid?
DEFENDER was validated across the full energy value chain — from bulk generation (ENGIE SA) to TSO high-voltage networks (ELES) and DSO distribution grids (ASM). The 4 real-life demonstrators across France, Italy, and Slovenia suggest the system was designed for large-scale, geographically distributed infrastructure.
What is the IP and licensing situation?
The consortium includes 20 partners across 9 countries, with 13 industry partners and 5 SMEs. IP is likely distributed among consortium members. The coordinator, Engineering Ingegneria Informatica SPA, is a major Italian IT company and the most likely entry point for licensing discussions.
How mature is this technology — is it ready to deploy?
DEFENDER explicitly aimed to bring TRL 4-5 technologies to TRL 7, which means system prototype demonstrated in an operational environment. The 4 real-life demonstrators and 1 lab emulator at RWTH Germany confirm this was tested well beyond the lab.
Does this handle both cyber attacks and physical intrusions?
Yes, that is the core value proposition. DEFENDER models energy infrastructure as cyber-physical systems, combining network security monitoring with physical surveillance (drones, cameras, PMU sensors) and a human-in-the-loop approach. The incident response toolbox covers both threat types.
What regulations does this help comply with?
Based on available project data, DEFENDER addresses critical infrastructure protection under the EU CIP (Critical Infrastructure Protection) topic. The system's design for resilience and self-healing aligns with the EU NIS Directive requirements for energy sector operators of essential services.
Can this integrate with our existing security systems?
DEFENDER was designed as an adaptable system that integrates multiple technology types — fixed sensors, mobile drones, video surveillance, and blockchain. The fact that it was validated on 4 different real-world sites with different operators suggests it was built for integration with existing infrastructure rather than replacement.
Who built it
This is a heavily industry-driven consortium with 13 out of 20 partners from industry (65%), which signals strong commercial intent. The coordinator, Engineering Ingegneria Informatica SPA, is one of Italy's largest IT companies — a credible system integrator. The presence of major energy operators as demonstrator hosts (ENGIE SA for generation, ELES for transmission, ASM for distribution) means the technology was tested by the companies that would actually buy it. With 5 SMEs and partners across 9 countries (DE, EL, FR, IL, IT, PT, RO, SI, UK), the consortium covers both technology development and end-user validation across different regulatory environments.
- ENGINEERING - INGEGNERIA INFORMATICA SPACoordinator · IT
- INSTITUT JOZEF STEFANparticipant · SI
- ETHNIKO KAI KAPODISTRIAKO PANEPISTIMIO ATHINONparticipant · EL
- MINISTERO DELL'INTERNOparticipant · IT
- RHEINISCH-WESTFAELISCHE TECHNISCHE HOCHSCHULE AACHENparticipant · DE
- SIEMENS SRLparticipant · RO
- INEO ENERGY AND SYSTEMSparticipant · FR
- VENAKA MEDIA LIMITEDparticipant · UK
- ENGIEparticipant · FR
- STUDIO TECNICO BFP SOCIETA A RESPONSABILITA LIMITATAparticipant · IT
- INSTITUT ZA KORPORATIVNE VARNOSTNE STUDIJE LJUBLJANAparticipant · SI
- DR FRUCHT SYSTEMS LTDparticipant · IL
- UNINOVA-INSTITUTO DE DESENVOLVIMENTO DE NOVAS TECNOLOGIAS-ASSOCIACAOparticipant · PT
- TECHNOLOGIKO EKPEDEFTIKO IDRIMA STEREAS ELLADASparticipant · EL
- SINGULARLOGIC PLIROFORIAKON SYSTIMATON KAI EFARMOGON PLIROFORIKISparticipant · EL
- POWER OPERATIONS LIMITEDparticipant · UK
- THALESparticipant · FR
- ELES DOO OPERATER KOMBINIRANEGA PRENOSNEGA IN DISTRIBUCIJSKEGA ELEKTROENERGETSKEGA OMREZJAparticipant · SI
- E-LEX - STUDIO LEGALEparticipant · IT
- ASM TERNI SPAparticipant · IT
Engineering Ingegneria Informatica SPA (Italy) — major IT systems integrator, coordinator of the project
Talk to the team behind this work.
Want an introduction to the DEFENDER consortium for licensing or deployment? SciTransfer can connect you with the right partner for your infrastructure type.