Unlike business applications, Cybersecurity intelligence solutions must essentially follow cyber criminals using the very tools and technologies they rely on.
Essentially, most tools are, or are based on, open source technologies – and range from dedicated Linux distributions, Python scripts, Tor browsers, Java utilities and many more – all loosely clubbed under OSINT tools (Open Source Intelligence).
There is a complete community of tool developers, white hat hackers, market places and thousands of experienced cybersecurity experts that are all baked into the technology platform that powers watchOUT.
As you will see from the Architecture notes the technology must essentially be extremely flexible to accommodate additions and changes on-the-fly. As the technology itself learns from the massive amount of data it ingests, and as the cybersecurity analysts keep nudging and tweaking the tool sets, we must use technology that supports this fluid nature.
MySql, ElasticSearch, MongoDB
AWS, on-premise, co-located servers
Qualified and experienced Cybersecurity experts
OSINT and proprietary code