XEDR
Per-host detail with one-click isolation, malware scans, autoruns inspection, and a process tree that survives reboots.
The Datatrek platform is where every signal converges — endpoints, network metadata, logs, vulnerabilities, backups, and identity events. One login for your team, one interface for our analysts, and a clear audit trail for your compliance.
Every screen of the platform is shaped by what the NightWatch team needs — fast filters and navigation, alert lists, and consistent info from our services.
Per-host detail with one-click isolation, malware scans, autoruns inspection, and a process tree that survives reboots.
Search across years of logs in seconds. Save queries as detections. Correlations show provenance — every match links back to the underlying event.
Topology map with port-drift highlights and persistence audits. Click any node to see who's logged in and what's running.
Severity-bucketed list with one-click patch dispatch. Scan history shows what was found, fixed, and verified — every cycle.
Restore single files or full snapshots. Folder Share with time-limited links. Object lock holds — visible and configurable.
Role-based access tied to organizations and accounts. Granular permissions per user.
TOTP and hardware security keys for every user.
Every action recorded with actor, target, and timestamp. Exportable on demand.
Customer data hosted on EU infrastructure. Operations, support, and invoicing all in Europe.
NightWatch operates every service below, 24/7. Mix and match based on your environment — all are NIS2-aligned and designed to work stronger together.
24/7 monitored dual-stack EDR with threat hunting. Two independent teams, two technologies — defense-in-depth for your critical endpoints.
Cloud-native SIEM with 5-month log retention and ML detections. Every event correlated and searchable in seconds.
Network behaviour analysis with 1000+ MITRE-mapped rules. Content filtering and DNS protection across every device.
Immutable, versioned, replicated cloud backup with full S3 API compatibility. Encrypted and ransomware-resistant.
Extended endpoint protection: ransomware shields, memory threat detection, and USB device control — for broader endpoint coverage.
Continuous CVE/NVD scans across your estate with one-click patch dispatch. Severity-bucketed findings, full audit trail — NIS2-aligned.
Identity threat detection for M365 and Google Workspace — catches session hijacking, privilege escalation, and leaked-credential alerts.
NIS2-aligned training topics with user certifications. Turns your team into the last line of defense.
Managed 1Password — end-to-end encrypted vault with vault-scoped sharing and Watchtower alerts for weak, reused, or breach-exposed credentials.
Public read-only dashboards with sample data — explore the same UI our SOC team uses every shift.
Explore the dual-EDR console — host isolation, process trees, and autoruns inspection.
Open demo ↗Browse the network topology map with port drift and lateral movement detection.
Open demo ↗Search across sample logs, saved queries, and alert correlations.
Open demo ↗Review severity-bucketed CVE findings and patch dispatch in one view.
Open demo ↗Inspect snapshot history, object lock status, and folder share links.
Open demo ↗Next step
We can spin up a demo tenant with synthetic events that match your environment shape — usually within 48 hours.