Cost-effective solution for medium-sized businesses

Watchdog by TEN IM is our managed SIEM (Security Incident & Event Management) solution that makes automated detection of attacks and vulnerabilities accessible to SMEs. We are often asked: how does it actually work? And what technologies are behind it?

Watchdog by TEN IM is based on open source technologies

Simply explained: Watchdog by TEN IM is based entirely on widely used open source technologies. The platform itself is based on the open source variant of Wazuh, one of the leading platforms in the SIEM field. Wazuh itself is completely based on the so-called ELK stack (Elastic Search – Logstash – Kibana), three components that orchestrate the search (Elastic Search), the merging of logs from different sources (Logstash) and the graphical visualisation (Kibana). These three components are the basis of numerous tools – both commercial and non-commercial – and form the de factor standard in the SIEM field as well as in the handling of log files.

Data protection-compliant platform with expert know-how

And what is special about Watchdog by TEN IM? We operate the platform in Germany in compliance with data protection laws and enrich the functionalities with our own specialist know-how and adaptations that are specifically aimed at medium-sized organisations. Customers of Watchdog by TEN IM can thus concentrate on the essentials: managing their own environment and reducing the attack surface, for which Watchdog by TEN IM provides the relevant information.

Tags

Share post

More articles

Risk precautions are supposedly just as unwelcome as health precautions. But they are just as important! Various studies prove: Attacks on IT systems and applications are increasing significantly. The consequences are financially devastating. At the...
The following report is so unbelievable that it could have come from the famous Paulaner garden – if I hadn’t known the person concerned for over 10 years. That’s how I know that what I’ve...
One of the core competences of cloud service providers is the safeguarding of infrastructures with regard to IT security. But what should be taken into account when using the cloud? The cloud has many advantages:...