Enterprise deployment, integration and API reference guide
GNSAC Vigil is an integrated AI-powered Cyber Threat Intelligence (CTI) platform providing real-time dark web monitoring, automated threat analysis and response for enterprise security operations. Continuously scanning 150+ dark web forums, 500+ Telegram channels and 100+ OSINT sources, Vigil transitions your organisation from reactive to proactive security posture.
Unlike traditional CTI tools that rely solely on rule-based detection, Vigil combines proprietary AI models with regional threat intelligence expertise covering Turkey, UK and USA. This delivers 40% faster detection and 60% fewer false positives versus industry benchmarks. Discovered credentials are never validated against target systems; our ethical data collection policy is fully compliant with GDPR and KVKK.
Vigil is built on a microservices architecture running on Kubernetes, designed for horizontal scalability, high availability and multi-tenant data isolation. Each layer scales independently; data collection and analysis layers are fully decoupled.
Kubernetes-native horizontal auto-scaling. Up to 10 billion events per day; new pods spin up in seconds during traffic spikes.
Multi-AZ active-active failover with 99.7% uptime SLA. Rolling updates achieve zero-downtime deployments; planned maintenance under 8 hours per year.
Per-tenant encryption keys (BYOK), isolated database schemas and configurable data retention policies ensure complete data isolation.
Vigil's proprietary AI engine combines multiple machine learning models for threat classification, false positive reduction and predictive risk assessment. Trained on 10M+ historical breach records, the engine continuously improves through feedback loops.
Entity extraction optimised for Turkish, English, Russian and Arabic threat actor communications. Identifies credentials, PII and sensitive data patterns with 99.2% precision. Named Entity Recognition (NER) with contextual analysis minimises false matches.
Unsupervised learning models (Isolation Forest, Autoencoder) detect unusual patterns in data exposure events. Models trained on 10M+ historical breach records identify novel attack vectors and emerging threat actor TTPs.
Contextual analysis engine reduces false positive rates by 60% through source reliability scoring, cross-referencing with historical data, and multi-factor validation. Explainable AI (XAI) scores are generated for each finding to support analyst decision-making.
ML-powered dynamic risk score (0โ100): evaluates threat actor activity, data sensitivity, exposure scope and historical exploitation rates. Mean detection time for critical findings is under 5 minutes; immediate notifications triggered for high-risk threats.
Vigil aggregates intelligence from 800+ sources across the surface, deep and dark web. Real-time monitoring of Turkish-language content provides a critical differentiator for Turkey-based organisations.
| Source Category | Coverage | Update Frequency | Data Types |
|---|---|---|---|
| Dark Web Forums | 150+ active forums | Real-time | Credentials, databases, exploit kits, initial access sales |
| Telegram Channels | 500+ monitored channels | Real-time | Leaks, combolists, threat intel, sale announcements |
| Paste Sites | 30+ platforms | Every 5 minutes | Code snippets, credentials, PII dumps, API keys |
| Marketplaces | 25+ active markets | Hourly | Access sales, stolen data, ransomware toolkits |
| Ransomware Blogs | 40+ groups tracked | Real-time | Victim announcements, data leak posts, negotiation logs |
| OSINT Feeds | 100+ sources | Continuous | IoCs, CVEs, threat reports, attack campaigns |
Each Vigil module is independently manageable via dedicated REST endpoints. All endpoints require JWT or API Key authentication; multi-tenant isolation is enforced through the user_id field embedded in the token.
| Method | Endpoint | Description |
|---|---|---|
| GET | /v1/brand-threats | List threats โ filters: type, status, limit, offset |
| POST | /v1/brand-threats | Create a new brand threat |
| GET | /v1/brand-threats/stats | Summary statistics (total, active, resolved) |
| GET | /v1/brand-threats/{id} | Get specific threat detail |
| PUT | /v1/brand-threats/{id} | Update threat information |
| DELETE | /v1/brand-threats/{id} | Delete threat |
| PATCH | /v1/brand-threats/{id}/status | Update status: active / investigating / resolved |
| POST | /v1/brand-threats/{id}/takedown | Initiate takedown request |
| POST | /v1/brand-threats/{id}/resolve | Mark threat as resolved |
fake_domain โ Fraudulent website impersonating your brandsocial_impersonation โ Fake social media accountapp_impersonation โ Fraudulent app in app storesphishing โ Phishing page or campaigncontent_abuse โ Unauthorised use of brand assets| Method | Endpoint | Description |
|---|---|---|
| GET | /v1/vendors | Vendor list โ filters: risk_level, category, search |
| POST | /v1/vendors | Add a new vendor |
| GET | /v1/vendors/stats | Supply chain statistics |
| GET | /v1/vendors/{id} | Vendor detail |
| PUT | /v1/vendors/{id} | Update vendor information |
| DELETE | /v1/vendors/{id} | Remove vendor |
| GET | /v1/vendors/{id}/breaches | Vendor breach history |
| POST | /v1/vendors/{id}/breaches | Add manual breach record |
| Method | Endpoint | Description |
|---|---|---|
| GET | /v1/vip | VIP persons list |
| POST | /v1/vip | Add VIP person |
| GET | /v1/vip/stats | VIP protection statistics |
| GET | /v1/vip/{id} | VIP person detail and alerts |
| PUT | /v1/vip/{id} | Update VIP person information |
| DELETE | /v1/vip/{id} | Remove VIP person |
| PATCH | /v1/vip/{id}/monitoring | Configure monitoring channels (email, social, darkweb) |
| GET | /v1/vip/{id}/alerts | VIP-related alerts list |
| POST | /v1/vip/{id}/alerts/{alert_id}/resolve | Mark alert as resolved |
| Method | Endpoint | Description |
|---|---|---|
| GET | /v1/playbooks | Playbook list |
| POST | /v1/playbooks | Create a new playbook |
| GET | /v1/playbooks/stats | Playbook statistics |
| GET | /v1/playbooks/{id} | Playbook detail (actions + recent runs) |
| PUT | /v1/playbooks/{id} | Update playbook |
| DELETE | /v1/playbooks/{id} | Delete playbook |
| PATCH | /v1/playbooks/{id}/status | Change status: active / draft / paused |
| POST | /v1/playbooks/{id}/run | Manually trigger playbook |
| GET | /v1/playbooks/{id}/runs | Execution history |
| POST | /v1/playbooks/{id}/actions | Add action step |
| DELETE | /v1/playbooks/{id}/actions/{action_id} | Remove action step |
| Type | Description |
|---|---|
credential_leak | Credential exposure detected |
brand_threat | New brand threat created |
vip_alert | Alert created for VIP person |
vendor_risk | Vendor risk score reached critical level |
critical_finding | Finding with risk score โฅ 80 detected |
| Type | Description |
|---|---|
send_notification | Send email, Slack or Teams notification |
create_ticket | Auto-create Jira / ServiceNow ticket |
force_password_reset | Force password reset via AD/LDAP |
block_ip | Add IP block to firewall rules |
escalate | Create SOC team escalation |
webhook | Send POST to custom webhook endpoint |
| Method | Endpoint | Description |
|---|---|---|
| GET | /v1/predictions | Predictions list โ filters: type, confidence |
| POST | /v1/predictions | Create manual prediction |
| GET | /v1/predictions/stats | Prediction statistics |
| GET | /v1/predictions/trends | 30-day trend analysis |
| GET | /v1/predictions/{id} | Prediction detail with AI reasoning |
| POST | /v1/predictions/{id}/validate | Provide outcome feedback (model improvement) |
| DELETE | /v1/predictions/{id} | Delete prediction |
| Method | Endpoint | Description |
|---|---|---|
| POST | /v1/search | Execute a search query |
| GET | /v1/search/history | Past searches |
| GET | /v1/findings | Findings list โ filters: severity, type, date_from |
| GET | /v1/findings/stats | Finding statistics |
| GET | /v1/findings/{id} | Finding detail |
| POST | /v1/findings/{id}/analyze | Trigger AI analysis |
| Operator | Description | Example |
|---|---|---|
site: | Filter by specific source / forum | site:raidforums "acme.com" |
type: | Filter by data type | type:credentials "acme.com" |
date: | Date range filter | date:2026-01-01..2026-03-25 |
severity: | Filter by severity level | severity:critical @domain.com |
actor: | Filter by threat actor name | actor:DarkVortex |
source: | Filter by source category | source:telegram @company |
| Method | Endpoint | Description |
|---|---|---|
| GET | /v1/vulnerabilities | Vulnerability list โ filters: severity, asset_id, cve |
| GET | /v1/vulnerabilities/{id} | Vulnerability detail with remediation guidance |
| GET | /v1/assets | Monitored assets list (domains, IPs, ASNs) |
| POST | /v1/assets | Add new asset |
| GET | /v1/assets/{id} | Asset detail with vulnerabilities |
| PUT | /v1/assets/{id} | Update asset |
| DELETE | /v1/assets/{id} | Remove asset from monitoring |
| Method | Endpoint | Description |
|---|---|---|
| GET | /v1/reports | Reports list โ filters: type, status |
| POST | /v1/reports/generate | Generate new report (async) |
| GET | /v1/reports/{id}/download | Download PDF / XLSX report |
| Report Type | Description | Format |
|---|---|---|
executive_summary | C-level summary threat report | |
technical_detail | Detailed technical report for SOC analysts | PDF, XLSX |
compliance_kvkk | KVKK breach notification report (ready template) | PDF, DOCX |
compliance_gdpr | GDPR Article 33 compliant breach report | PDF, DOCX |
threat_landscape | Sector-specific threat landscape analysis |
All API endpoints are accessible at https://api.vigil.gnsac.com.tr. Visit /docs for the interactive Swagger UI with OpenAPI 3.0 spec and code generation.
Each API key is subject to a per-minute request quota based on its plan tier. When exceeded, the API returns 429 Too Many Requests; the Retry-After header indicates the backoff period in seconds.
| Plan | Request Limit | Burst | WebSocket | Exports | Headers |
|---|---|---|---|---|---|
| Starter | 100 / min | 150 | 5 connections | 2 / hour | X-RateLimit-LimitX-RateLimit-RemainingX-RateLimit-Reset |
| Professional | 500 / min | 750 | 25 connections | 20 / hour | Same headers |
| Enterprise | 2,000 / min | 3,000 | Unlimited | Unlimited | Same headers |
| On-Premises | Unlimited (local) | โ | Unlimited | Unlimited | โ |
| Endpoint Group | Limit | Notes |
|---|---|---|
/v1/search/* | 30 / minute | Full-text and advanced search queries โ Elasticsearch load constrained |
/v1/findings/bulk | 10 / minute | Bulk create or update operations (max 100 records per request) |
/v1/reports/generate | 5 / hour | PDF/XLSX report generation โ processing time 30โ120 seconds |
/v1/ai/* | 50 / minute | AI analysis, prediction and insights endpoints |
/v1/webhooks/test | 10 / hour | Webhook connectivity test trigger |
/v1/assets/scan | 20 / day | Active asset scanning and vulnerability discovery operations |
| Code | Meaning | Description |
|---|---|---|
| 400 | Bad Request | Missing or invalid parameter |
| 401 | Unauthorized | Invalid or expired API key |
| 403 | Forbidden | Insufficient permissions for this resource (RBAC) |
| 404 | Not Found | Resource not found |
| 409 | Conflict | Resource already exists |
| 422 | Unprocessable Entity | Validation error (field details in response) |
| 429 | Too Many Requests | Rate limit exceeded; check Retry-After header |
| 500 | Internal Server Error | Server error; report request_id to support |
Vigil provides ready-made connectors and a robust webhook infrastructure for seamless integration with your enterprise security ecosystem.
| Attempt | Delay | Behaviour |
|---|---|---|
| 1st attempt | Immediate | Non-2xx โ retry |
| 2nd attempt | 30 seconds | Non-2xx โ retry |
| 3rd attempt | 5 minutes | Non-2xx โ dead-letter queue |
| Vigil Field | Jira Field | Mapping |
|---|---|---|
title | Summary | Direct copy |
severity: critical | Priority: Highest | Auto-matched |
severity: high | Priority: High | Auto-matched |
severity: medium | Priority: Medium | Auto-matched |
finding_url | Description (link) | Deep link to Vigil |
assigned_analyst | Assignee | Email match |
GNSAC Vigil is designed with defence-in-depth principles to meet enterprise security requirements.
AES-256-GCM encryption at rest; TLS 1.3 in transit. Customer-managed encryption keys (BYOK) and Hardware Security Module (HSM) support. Database columns are classified by sensitivity and encrypted with separate key sets.
Role-Based Access Control (RBAC) enforces least-privilege principles. MFA can be mandated; Single Sign-On via SAML 2.0 and OIDC. IP whitelisting and geo-restrictions supported. All sessions monitored in real-time with automatic session termination on suspicious access.
Every API call, user action and system event is written to an immutable audit log. Real-time SIEM forwarding; configurable retention from 1โ7 years. Reports required by regulatory authorities can be generated automatically.
Discovered credentials are never validated against target systems. Asset ownership is verified through DNS and document verification. Data minimisation principles applied; only organisation-relevant data is collected and processed.
EU General Data Protection Regulation โ Article 33 breach notification templates and DPA compliance support
Turkish Personal Data Protection Law โ data processing, storage and breach notification ready reports
Security, availability and confidentiality trust service criteria control evidence
Information security management system framework โ control implementations and risk treatment plan
California Consumer Privacy Act โ API support for data deletion and portability requests
UK Financial Conduct Authority guidelines โ sector-specific threat intelligence compliance support
Vigil is offered in three deployment models aligned with your organisation's infrastructure policies and data sovereignty requirements.
Get started immediately with no infrastructure management. All updates applied automatically.
Isolated tenant in your AWS, Azure or GCP environment. Ideal for organisations requiring data residency.
Full control in your own data centre. Air-gapped network support.
| Component | Minimum | Recommended |
|---|---|---|
| CPU | 4 cores | 8+ cores (Intel Xeon / AMD EPYC) |
| Memory | 8 GB RAM | 16+ GB DDR4 ECC |
| Storage | 100 GB SSD | 500+ GB NVMe SSD (RAID-1) |
| Network | 100 Mbps | 1 Gbps (outbound internet access required) |
| OS | Ubuntu 22.04 LTS or RHEL 8+ | Same + Kubernetes 1.27+ |
Requirements gathering, asset inventory, integration mapping, deployment architecture finalisation.
Platform deployment, SSO/SAML integration, RBAC role definitions, initial asset onboarding.
SIEM/SOAR connection, webhook configuration, alert threshold tuning, UAT (User Acceptance Testing).
SOC team training, playbook templates, runbook handover, go-live support and success metrics review.
GNSAC Vigil Local is shipped as a ready-to-deploy OVF template for VMware ESXi, vSphere or Workstation. No infrastructure expertise required โ average deployment time is 20 minutes.
Download the latest OVF package linked to your active licence from the GNSAC licence portal (license.gnsac.com.tr). Each package ships with a SHA-256 checksum โ verify before importing: sha256sum gnsac-vigil-vX.X.ovf
vSphere Client โ File โ Deploy OVF Template โ select the downloaded .ovf file. Minimum resource allocation: 4 vCPU, 8 GB RAM, 100 GB disk. The VM arrives in a powered-off state after import.
VM Settings โ Network Adapter โ assign to your VLAN/portgroup. Static IP, gateway and DNS are configured via the console during first boot. Required outbound connectivity: license.gnsac.com.tr:443 and update.gnsac.com.tr:443
Power on the VM and set the admin password and hostname via console. System services start automatically (vigil-api, vigil-frontend, postgresql). When ready, the console displays the IP address and management URL.
Open https://<VM_IP> in a browser โ Settings โ Licence โ enter your licence key โ click Activate. The system generates a hardware fingerprint, sends it to the GNSAC licence server, receives a signed token and completes activation automatically.
Dashboard access: https://<VM_IP> โ default login: admin@vigil.local. A password change is enforced on first login. Support: support@gnsac.com.tr
Vigil Local licences are bound to a single machine per installation. Activation is performed through cryptographic verification with the GNSAC licence server.
Recommended for environments with internet access. Completes automatically in under 10 seconds.
VIGIL-XXXX-XXXX-XXXX)Manual activation method for isolated networks with no internet access.
machine-id.txtactivation-token.sig fileTo move a licence to a different machine, first revoke the current activation: Settings โ Licence โ Deactivate. The licence server frees the slot; you can then repeat the activation process on the new machine. Annual licences permit up to 3 machine transfers per year.