Technology

Unlike business applications, Cybersecurity intelligence solutions must essentially follow cyber criminals using the very tools and technologies they rely on.

Essentially, most tools are, or are based on, open source technologies – and range from dedicated Linux distributions, Python scripts, Tor browsers, Java utilities and many more – all loosely clubbed under OSINT tools (Open Source Intelligence).

There is a complete community of tool developers, white hat hackers, market places and thousands of experienced cybersecurity experts that are all baked into the technology platform that powers watchOUT.

As you will see from the Architecture notes the technology must essentially be extremely flexible to accommodate additions and changes on-the-fly. As the technology itself learns from the massive amount of data it ingests, and as the cybersecurity analysts keep nudging and tweaking the tool sets, we must use technology that supports this fluid nature.

tech-persistence-icon
Persistence

MySql, ElasticSearch, MongoDB

tech-languages-icon
Languages

Python, Java

tech-cloud-icon
Cloud

AWS, on-premise, co-located servers

tech-user-interface
User Interface

Django

tech-os-icon
Operating System

Kali Linux

tech-tor-browser
Browser

Tor

tech-hacker-icon
Resources

Qualified and experienced Cybersecurity experts

tech-toolsets-icon
Toolset

OSINT and proprietary code

OSINT Framework

Interesting Reads!