Wazuh Logo

Wazuh

0
Free
Visit Website

Wazuh is an open-source security platform that provides unified XDR and SIEM protection for endpoints and cloud workloads. It offers: 1. Endpoint Security: Configuration assessment, malware detection, and file integrity monitoring. 2. Threat Hunting: Log data analysis and vulnerability detection. 3. Security Operations: Incident response and regulatory compliance. 4. Cloud Security: Container security, posture management, and workload protection. The platform integrates historically separate functions into a single agent and platform architecture, covering public clouds, private clouds, and on-premise data centers. Wazuh includes real-time correlation and context for analysts, with active response capabilities for on-device remediation. As a SIEM solution, Wazuh provides monitoring, detection, and alerting of security events and incidents. It is designed to be flexible, scalable, and free from vendor lock-in, with no license costs. The platform is supported by a large community and is widely used in enterprise environments.

FEATURES

ALTERNATIVES

A multi-platform open source tool for triaging suspect systems and hunting for Indicators of Compromise (IOCs) across thousands of endpoints.

A collection of Cyber Incident Response Playbook Battle Cards (PBC) for combating cyber threats and attacks, following a prescriptive approach inspired by CERT Societe Generale's IRM.

A Sysmon configuration repository for customizing Microsoft Sysinternals Sysmon configurations with modular setup.

Companion repository for deploying osquery in a production environment with tailored query packs.

Sample security playbooks for security automation, orchestration and response (SOAR) using Microsoft Sentinel trigger

Open source application to instantly remediate common security issues through the use of AWS Config.

Detect signed malware and track stolen code-signing certificates using osquery.

Dispatch helps manage security incidents by integrating with existing tools and automating incident response tasks.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved