Cost-effective solution for medium-sized businesses

Watchdog by TEN IM is our managed SIEM (Security Incident & Event Management) solution that makes automated detection of attacks and vulnerabilities accessible to SMEs. We are often asked: how does it actually work? And what technologies are behind it?

Watchdog by TEN IM is based on open source technologies

Simply explained: Watchdog by TEN IM is based entirely on widely used open source technologies. The platform itself is based on the open source variant of Wazuh, one of the leading platforms in the SIEM field. Wazuh itself is completely based on the so-called ELK stack (Elastic Search – Logstash – Kibana), three components that orchestrate the search (Elastic Search), the merging of logs from different sources (Logstash) and the graphical visualisation (Kibana). These three components are the basis of numerous tools – both commercial and non-commercial – and form the de factor standard in the SIEM field as well as in the handling of log files.

Data protection-compliant platform with expert know-how

And what is special about Watchdog by TEN IM? We operate the platform in Germany in compliance with data protection laws and enrich the functionalities with our own specialist know-how and adaptations that are specifically aimed at medium-sized organisations. Customers of Watchdog by TEN IM can thus concentrate on the essentials: managing their own environment and reducing the attack surface, for which Watchdog by TEN IM provides the relevant information.

Tags

Share post

More articles

Instant 27001 is a solution that saves an enormous amount of time and money when setting up and operating an ISMS according to ISO 27001. Users benefit not only from the fact that Instant 27001...
Privilege escalations in applications – often referred to as privilege escalation – are vulnerabilities that allow attackers or even regular users to access data, information or system functions for which they have no authorization. Attackers...
Are you already familiar with our SCOD consulting service? SCOD stands for Security Consultant on Demand – and for being available to you at short notice at any time for all your information security questions....