Security Analytics

Alert level evolution, timestamp per hour. Line chart.

Wazuh is used to collect, aggregate, index and analyze security data, helping organizations detect intrusions, threats and behavioral anomalies.

As cyber threats are becoming more sophisticated, real-time monitoring and security analysis are needed for fast threat detection and remediation. That is why our light-weight agent provides the necessary monitoring and response capabilities, while our server component provides the security intelligence and performs data analysis.

Intrusion Detection

Top categories. Donut chart.

Wazuh agents scan the monitored systems looking for malware, rootkits and suspicious anomalies. They can detect hidden files, cloaked processes or unregistered network listeners, as well as inconsistencies in system call responses.

In addition to agent capabilities, the server component uses a signature-based approach to intrusion detection, using its regular expression engine to analyze collected log data and look for indicators of compromise.

Log Data Analysis

Events over time, timestamp per hour. Area chart.

Wazuh agents read operating system and application logs, and securely forward them to a central manager for rule-based analysis and storage.

The Wazuh rules help make you aware of application or system errors, misconfigurations, attempted and/or successful malicious activities, policy violations and a variety of other security and operational issues.

File Integrity Monitoring

Top modified files. Donut chart.

Wazuh monitors the file system, identifying changes in content, permissions, ownership, and attributes of files that you need to keep an eye on. In addition, it natively identifies users and applications used to create or modify files.

File integrity monitoring capabilities can be used in combination with threat intelligence to identify threats or compromised hosts. In addition, several regulatory compliance standards, such as PCI DSS, require it.

Vulnerability Detection

Vulnerabilities found over time, timestamp per hour. Area chart.

Wazuh agents pull software inventory data and send this information to the server, where it is correlated with continuously updated CVE (Common Vulnerabilities and Exposure) databases, in order to identify well-known vulnerable software.

Automated vulnerability assessment helps you find the weak spots in your critical assets and take corrective action before attackers exploit them to sabotage your business or steal confidential data.

Configuration Assessment

Failed checks per host. Bar chart.

Wazuh monitors system and application configuration settings to ensure they are compliant with your security policies, standards and/or hardening guides. Agents perform periodic scans to detect applications that are known to be vulnerable, unpatched, or insecurely configured.

Additionally, configuration checks can be customized, tailoring them to properly align with your organization. Alerts include recommendations for better configuration, references and mapping with regulatory compliance.

Incident Response

Blocked IP addresses. Donut chart.

Wazuh provides out-of-the-box active responses to perform various countermeasures to address active threats, such as blocking access to a system from the threat source when certain criteria are met.

In addition, Wazuh can be used to remotely run commands or system queries, identifying indicators of compromise (IOCs) and helping perform other live forensics or incident response tasks.

Regulatory Compliance

Alerts per PCI DSS control. Heat map.

Wazuh provides some of the necessary security controls to become compliant with industry standards and regulations. These features, combined with its scalability and multi-platform support help organizations meet technical compliance requirements.

Wazuh is widely used by payment processing companies and financial institutions to meet PCI DSS (Payment Card Industry Data Security Standard) requirements. Its web user interface provides reports and dashboards that can help with this and other regulations (e.g. GPG13 or GDPR).

Cloud Security Monitoring

Attacks per location. Worldwide map chart.

Wazuh helps monitoring cloud infrastructure at an API level, using integration modules that are able to pull security data from well known cloud providers, such as Amazon AWS, Azure or Google Cloud. In addition, Wazuh provides rules to assess the configuration of your cloud environment, easily spotting weaknesses.

In addition, Wazuh light-weight and multi-platform agents are commonly used to monitor cloud environments at the instance level.

Endpoint Detection and Response (EDR)

Wazuh addresses the need for continuous monitoring and response to advanced threats. It is focused on providing the right visibility, with the insights to help security analysts discover, investigate and response to threats and attack campaigns across multiple endpoints.

Wazuh helps detect hidden exploit processes that are more complex than a simple signature pattern, and that can be used to evade traditional antivirus systems. In addition, the Wazuh agent provides active response capabilities that can be used to block a network attack, stop a malicious process or quarantine a malware infected file.

Host-based Intrusion Detection System (HIDS)

Wazuh agent runs at a host-level, combining anomaly and signature based technologies to detect intrusions or software misuse. It can also be used to monitor user activities, assess system configuration and detect vulnerabilities.

Compliance & Security Management

Wazuh provides necessary security controls, required by standards such as PCI DSS, HIPAA, GDPR and others. The solution aggregates and analyzes data from multiple systems, mapping security alerts with compliance requirements.

A comprehensive SIEM solution

Wazuh is used to collect, analyze and correlate data, with the ability to deliver threat detection, compliance management and incident response capabilities. It can be deployed on-premises or in hybrid and cloud environments.

Wazuh as a Service

Wazuh SaaS (Software as a Service) centralizes threat detection, incident response and compliance management across your cloud and on-premises environments. It delivers a highly scalable, easy to deploy and cost-effective solution.

The Wazuh lightweight agents run on monitored systems, collecting events and forwarding them to the Wazuh cloud infrastructure, where data is analyzed, indexed and stored.

Wazuh SaaS uses Threat Intelligence (TI) sources, integrated with the data analysis engine, to improve detection of emerging threats and to enrich alert information.

Monitoring of cloud and on-premises environments using Wazuh as a service

Why everyone Open Source

Flexible, scalable, no vendor lock-in and no license cost. Free community support and trusted by thousands of enterprise users.

Integrations and OSSEC

Network IDS integration

OwlH is an open source project that was born to help you manage network IDS at scale. Now, you can integrate Suricata IDS and Bro IDS alerts in your Wazuh single pane of glass.

Learn more about OwlH

Migrating from OSSEC

Several years ago, the Wazuh team decided to fork the OSSEC project. The result is a much more comprehensive, easy to use, reliable, scalable, and free open source solution.

Why it’s time to upgrade
Get Wazuh 3.9.2

Download and deploy Wazuh easily.
Learn more in our documentation.