Trailbot tracks files and logs in your servers and triggers Smart Policies upon unwanted modification.
CoffeeScript JavaScript
Latest commit 2bdea85 Nov 17, 2016 Adán Sánchez de Pedro Crespo committed with aesedepece Update GETTING-STARTED.md
Permalink
Failed to load latest commit information.
src Expose eRequire Aug 13, 2016
.gitignore Update getting-started for magickeys Aug 29, 2016
CONTRIBUTING.md Add Contributing guide Jul 28, 2016
GETTING-STARTED.md Update GETTING-STARTED.md Nov 17, 2016
LICENSE Update LICENSE Aug 12, 2016
README.md fix Aug 24, 2016
icon.png App icon Aug 4, 2016
main.js Add all sources Jul 19, 2016
package.json v0.3.0 Aug 31, 2016
run.js Add run.js Aug 4, 2016

README.md

Trailbot Client DEVELOPER PREVIEW

Trailbot tracks your server's logs and files, triggers Smart Policies upon potentially unwanted modifications and generates a tamper-proof audit trail of everything happening in the system.

Smart Policies are simple scripts that get called every time a tracked file changes. They trigger actions such as emailing someone, rolling files back to a previous state or even shutting the system down. There are plenty of them ready to use, and you can even create your own.

Trailbot has three components:

  • Watcher: a server daemon that monitors your files and logs, registers file events and enforces smart policies.
  • Client: (this repository) desktop app for managing watchers, defining policies and reading file events.
  • Vault: a backend that works as a relay for the watcher's settings and the server events.

Why Trailbot?

Current security solutions are based on an obsolete paradigm: building walls and fences. Companies advertise their overcomplicated perimeter security systems as if they were impenetrable. But nevertheless we hear everyday about cyber security breaches at even the largest corporations.

In any case walls and fences will not protect you at all from internal breaches and insider threats. Furthermore, most data resides nowadays in the cloud, where walls, borders and fences fade and blur. It is not a matter of “if” but “when” the perimeter will get breached.

With Trailbot you can rest assured of the integrity of your data, being it a system log or any other important file. It doesn't matter if an outsider got access to your systems or an insider decided to go rogue—you are now in control.

Installation

Please refer to our Getting Started guide for detailed installation instructions.

Get Involved

We'd love for you to help us build Trailbot. If you'd like to be a contributor, check out our Contributing guide.

FAQ

Check out our FAQ at the wiki.

LICENSE

MIT