Cost-effective solution for medium-sized businesses

Watchdog by TEN IM is our managed SIEM (Security Incident & Event Management) solution that makes automated detection of attacks and vulnerabilities accessible to SMEs. We are often asked: how does it actually work? And what technologies are behind it?

Watchdog by TEN IM is based on open source technologies

Simply explained: Watchdog by TEN IM is based entirely on widely used open source technologies. The platform itself is based on the open source variant of Wazuh, one of the leading platforms in the SIEM field. Wazuh itself is completely based on the so-called ELK stack (Elastic Search – Logstash – Kibana), three components that orchestrate the search (Elastic Search), the merging of logs from different sources (Logstash) and the graphical visualisation (Kibana). These three components are the basis of numerous tools – both commercial and non-commercial – and form the de factor standard in the SIEM field as well as in the handling of log files.

Data protection-compliant platform with expert know-how

And what is special about Watchdog by TEN IM? We operate the platform in Germany in compliance with data protection laws and enrich the functionalities with our own specialist know-how and adaptations that are specifically aimed at medium-sized organisations. Customers of Watchdog by TEN IM can thus concentrate on the essentials: managing their own environment and reducing the attack surface, for which Watchdog by TEN IM provides the relevant information.


Share post

More articles

ISO 27001 requires you to conduct an internal audit of your ISMS on a regular basis to verify conformity with the standard. Although it is called an “internal audit”, you can – and should –...
This question is often asked by novices who are dealing with ISO 27001 for the first time. What is an Internal Audit? An internal audit is a self-audit to verify three key points by an...
Detect threats with a SIEM system A security information and event management (SIEM) system is a powerful solution that helps organisations detect, monitor and respond to threats to their information security. It enables the centralised...