The same security capabilities Fortune 500 companies rely on -- automated, affordable, and designed for teams without a dedicated security department.
Vigil scans your public-facing infrastructure the same way an attacker would -- then explains what it found in plain English.
Checks your SPF, DKIM, and DMARC records to ensure outgoing email is authenticated and protected against spoofing. Misconfigured email authentication is the #1 reason phishing succeeds.
Why it matters
Email impersonation is the most common attack vector for small businesses. Proper authentication stops attackers from sending email that looks like it came from you.
Included in: Free tier and above
Validates your certificates, checks expiration dates, cipher suites, and protocol versions. Alerts you before anything expires.
Why it matters
An expired or misconfigured certificate breaks customer trust and can expose data in transit.
Included in: Free tier and above
Evaluates HTTP security headers including Content-Security-Policy, X-Frame-Options, HSTS, and more. Provides exact header values to add.
Why it matters
Security headers are free to implement and block entire categories of attacks like clickjacking and cross-site scripting.
Included in: Free tier and above
Identifies the software, frameworks, and services running on your infrastructure, then cross-references them against known vulnerability databases.
Why it matters
You can't patch what you don't know is running. Technology fingerprinting gives you visibility into your actual attack surface.
Included in: Visibility tier and above
Identifies your email provider (Microsoft 365, Google Workspace, on-premises Exchange, etc.) and tailors remediation guidance to your specific platform.
Why it matters
Generic security advice wastes time. Platform-specific guidance means you can fix issues in minutes, not hours.
Included in: Visibility tier and above
Your productivity suite is your most sensitive system. Vigil scans internal configurations that external scanners miss entirely.
Reviews Entra ID settings, conditional access policies, MFA enrollment, mailbox forwarding rules, admin role assignments, and SharePoint/OneDrive sharing permissions.
Why it matters
Most M365 tenants have dozens of misconfigurations out of the box. A single forwarding rule to an external address can exfiltrate months of email silently.
Included in: Management tier and above
Evaluates 2-Step Verification enforcement, app passwords, third-party app access, Drive sharing settings, Gmail routing rules, and admin privileges.
Why it matters
Google Workspace defaults favor collaboration over security. Understanding what's shared externally is the first step to controlling data exposure.
Included in: Management tier and above
For supported configurations, Vigil can automatically fix misconfigurations with a single click -- no manual PowerShell or admin console changes needed.
Why it matters
Knowing about a problem is only half the battle. Automated fixes close the gap between detection and resolution from days to seconds.
Included in: Compliance tier and above
Vigil re-checks your posture automatically and alerts you when something changes. Think of it as a security system that never sleeps.
Your external security posture is continuously monitored. DNS changes, certificate expirations, new vulnerabilities, and configuration drift are caught automatically.
Why it matters
Security is not a one-time event. Configurations change, certificates expire, and new vulnerabilities are discovered daily.
Included in: Management tier and above
Checks employee email addresses against known breach databases and dark web marketplaces. Alerts you when credentials appear in new data dumps.
Why it matters
Reused passwords from breached sites are the easiest way into your systems. Early detection lets you force password resets before attackers strike.
Included in: Management tier and above
Monitors Certificate Transparency logs for certificates issued to domains that look like yours. Catches phishing sites and impersonation attempts early.
Why it matters
Attackers register look-alike domains to phish your customers and employees. Catching these early protects your brand and your people.
Included in: vCISO tier
Vigil maps your security posture to industry frameworks and tells you exactly what's missing. No spreadsheets, no guesswork.
Your scan results are automatically mapped to compliance framework controls. See which controls you satisfy, which need work, and exactly what to do.
Why it matters
Compliance frameworks are complex documents written for auditors. Vigil translates them into actionable tasks for your team.
Included in: Compliance tier and above
A real-time view of your compliance posture across every framework. Filter by status, priority, or framework. Track progress over time.
Why it matters
When an auditor or customer asks about your compliance status, you need an answer in minutes, not weeks.
Included in: Compliance tier and above
Securely store compliance evidence (policies, screenshots, configurations) in Azure Blob Storage. Organized by framework and control for easy retrieval during audits.
Why it matters
Audit preparation is 80% evidence gathering. A pre-organized evidence locker turns a painful process into a simple export.
Included in: Compliance tier and above
Generate professional compliance reports that auditors expect to see. Includes control mappings, evidence references, and gap analysis.
Why it matters
Professional documentation signals maturity and reduces back-and-forth with auditors, saving time and money.
Included in: Compliance tier and above
Risk management is about making informed decisions. Vigil helps you identify, score, and track risks so you can prioritize what matters most.
Maintain a living inventory of security risks with likelihood, impact, and composite risk scores. Track risk treatment decisions and residual risk over time.
Why it matters
Not all risks are equal. A risk register helps you invest your limited security budget where it will have the greatest impact.
Included in: Compliance tier and above
Inventory your third-party vendors, track their security posture, and manage risk questionnaires. Surface hidden supply chain risks before they become incidents.
Why it matters
Your security is only as strong as your weakest vendor. Tracking vendor risk is essential for any compliance framework.
Included in: Management tier and above
A composite score across email security, infrastructure security, and website security. Track your score over time like a credit score for cybersecurity.
Why it matters
A single number makes it easy to communicate security posture to leadership, boards, and customers.
Included in: Free tier and above
Vigil uses Azure OpenAI to generate policies, roadmaps, and remediation guidance tailored to your specific business and scan results.
Generate industry-specific security policies in minutes: Acceptable Use, Incident Response, Data Retention, Remote Work, BYOD, Password Policy, Vendor Management, and Data Classification.
Why it matters
Writing security policies from scratch takes weeks and usually requires a consultant. AI-generated policies give you a professional starting point instantly.
Included in: Management tier and above
Based on your scan results, Vigil generates a prioritized 90-day security improvement plan with specific tasks, timelines, and expected impact.
Why it matters
Knowing your problems is only useful if you know what to fix first. A prioritized roadmap turns findings into action.
Included in: Management tier and above
Get a realistic 12-month security budget based on your organization size, industry, and current maturity level. Includes tool recommendations and ROI projections.
Why it matters
Security spending without a plan is guesswork. A data-driven budget helps you justify investment to leadership.
Included in: vCISO tier
For every finding, Vigil provides exact configuration snippets you can copy and paste -- DNS records, PowerShell commands, admin console settings, and more.
Why it matters
Generic advice like 'enable DMARC' wastes time. Exact configs like 'add this TXT record' save hours of research.
Included in: Management tier and above
Whether you're reporting to your team, your board, or your customers, Vigil generates the right report for the right audience.
Professional, branded PDF reports summarizing your security posture, findings, and recommendations. Perfect for sharing with leadership or clients.
Why it matters
A professional report communicates competence. It shows you take security seriously and have a system in place.
Included in: Management tier and above
A high-level view designed for non-technical leadership. Key metrics, trends, risk summary, and compliance status at a glance.
Why it matters
Executives don't need technical details -- they need to know if the organization is getting more or less secure over time.
Included in: vCISO tier
Every scan is saved. Compare results over time to see progress, catch regressions, and demonstrate continuous improvement.
Why it matters
Trends matter more than snapshots. Showing improvement over time is the strongest evidence of a maturing security program.
Included in: Visibility tier and above
If you manage security for multiple clients, Vigil gives you the tools to scale your practice without scaling your team.
Manage all your clients from a single dashboard. Switch between organizations, compare postures, and identify which clients need attention.
Why it matters
MSPs need efficiency. Managing clients one at a time doesn't scale. A unified view lets you prioritize across your entire portfolio.
Included in: vCISO tier
Generate professional reports branded with your MSP's logo and identity. Deliver them to clients as your own work product.
Why it matters
White-label reports let you offer a premium security service without building the tooling yourself.
Included in: vCISO tier
Extend scanning beyond domains and workspaces into cloud infrastructure. Check IAM policies, storage permissions, network configurations, and more.
Why it matters
As businesses move to the cloud, misconfigured infrastructure becomes a major risk. Cloud scanning covers the full picture.
Included in: vCISO tier
Start with a free scan. No credit card required, no commitment. In under two minutes you'll know exactly where you stand.