CyberWave / WatchWave Overview

CyberWave / WatchWave is an advanced cyber log monitoring and alerting platform that provides security visibility, compliance and infrastructure monitoring capabilities. The platform was born as a fork of latest on the market HIDS and has evolved into a comprehensive solution by implementing new functionalities and integrating additional tools.

The CyberWave / WatchWave is based on a suite of applications where each application or component is designed to accomplish a certain task. These components work together to:

  • Analyze data received from various logs
  • Trigger alerts when a log event matches a rule
  • Register new clients/agents
  • Send data to the manager server

CyberWave / WatchWave Features

CyberWave / WatchWave is a full platform to monitor and control your systems. It mixes all the aspects of HIDS (host-based intrusion detection) together, log monitoring and SIM/SIEM together in a simple and powerful and open source solution. It is also backed and fully supported by Trend Micro.

GDPR, PCI DSS, Cyber and ISO Compliance Requirements

CyberWave / WatchWave helps customers meet specific compliance requirements such as GDPR, PCI DSS, Cyber and ISO etc. It allows customers detect and alert on unauthorized file system modifications and malicious behavior embedded in the log files of COTS products as well as custom applications. For PCI, it covers the sections of file integrity monitoring (PCI 10, 11.5, 10.5), log inspection and monitoring (section 10) and policy enforcement/checking.

Support Multi platform

CyberWave / WatchWave allows customers implement a comprehensive host-based intrusion detection system with fine grained application/server specific policies across multiple platforms such as Linux, Solaris, AIX, HP-UX, BSD, Windows, Mac and VMware ESX.

Real-time and Configurable Alerts

CyberWave / WatchWave allows customers configure incidents they want to be alerted on which let them focus on raising the priority of critical incidents over the regular noise on any system. Integration with smtp, SMS and syslog allows customers to be on top of alerts by sending these on to E-mail and handheld devices such as cell phones and pagers. Active response options to block an attack immediately is also available.

CyberWave / WatchWave Managed Services

CyberWave / WatchWave solution upon agreement include resources onsite to manage policies across multiple operating systems and monitor reports and alerts. Additionally, it’s also allowed customers define server specific overrides for finer grained policies.

Agent & Agentless monitoring

CyberWave / WatchWave offers the flexibility of agent based and agentless monitoring of systems and networking components such as routers and firewalls. It allows customers who have restrictions on software being installed on systems (such as FDA approved systems or appliances) meet security and compliance needs.

File Integrity checking

There is one thing in common to any attack to your networks and computers: they change your systems in some way. The goal of file integrity checking (or FIM � file integrity monitoring) is to detect these changes and alert you when they happen. It can be an attack, or a misuse by an employee or even a typo by an admin, any file, directory or registry change will be alerted to you.

PCI DSS sections 10,11.5 and 10.5.5

Your operating system wants to speak to you, but do you know how to listen? Every operating system, application, and device on your network generate logs (events) to let you know what is happening. CyberWave / WatchWave collects, analyzes and correlates these logs to let you know if something wrong is going on (attack, misuse, errors, etc.). Do you want to know when an application is installed on your client box? Or when someone changes a rule in your firewall? By monitoring your logs, CyberWave / WatchWave will inform you that. Covers PCI DSS section 10 in a whole.