Cost-effective solution for medium-sized businesses

Watchdog by TEN IM is our managed SIEM (Security Incident & Event Management) solution that makes automated detection of attacks and vulnerabilities accessible to SMEs. We are often asked: how does it actually work? And what technologies are behind it?

Watchdog by TEN IM is based on open source technologies

Simply explained: Watchdog by TEN IM is based entirely on widely used open source technologies. The platform itself is based on the open source variant of Wazuh, one of the leading platforms in the SIEM field. Wazuh itself is completely based on the so-called ELK stack (Elastic Search – Logstash – Kibana), three components that orchestrate the search (Elastic Search), the merging of logs from different sources (Logstash) and the graphical visualisation (Kibana). These three components are the basis of numerous tools – both commercial and non-commercial – and form the de factor standard in the SIEM field as well as in the handling of log files.

Data protection-compliant platform with expert know-how

And what is special about Watchdog by TEN IM? We operate the platform in Germany in compliance with data protection laws and enrich the functionalities with our own specialist know-how and adaptations that are specifically aimed at medium-sized organisations. Customers of Watchdog by TEN IM can thus concentrate on the essentials: managing their own environment and reducing the attack surface, for which Watchdog by TEN IM provides the relevant information.

Tags

Share post

More articles

Cybercrime only affects the big players? Certainly not! Last week, we witnessed live how an attacker – unfortunately successfully – defrauded the customers of a retailer and stole a considerable amount of money in the...
Conversion to the latest version of the standard Companies that are certified according to the international standard ISO 27001 will have to think about converting their ISMS to the latest version of the standard in...
In recent weeks, I have heard the same thing repeatedly in conversations with customers: The industry surrounding NIS-2 and ISO 27001 is currently a gold mine, and many are acting accordingly. The general sentiment can...