Skip to main content
UTMStack Logo

What is UTMStack?

Welcome to the UTMStack open-source project! UTMStack is a unified threat management platform that merges SIEM (Security Information and Event Management) and XDR (Extended Detection and Response) technologies. Our unique approach allows real-time correlation of log data, threat intelligence, and malware activity patterns from multiple sources, enabling the identification and halting of complex threats that use stealthy techniques.

Quick Start

Get started with UTMStack in minutes - from installation to first login

Installation Guide

Detailed installation instructions for both installer and ISO options

System Requirements

Hardware and resource requirements for different deployment sizes

Official Documentation

Access the complete UTMStack documentation

Key Features

Log Management and Correlation

Analyze log data before ingestion to identify and halt threats in real-time

Threat Detection and Response

Extended detection and response capabilities across your digital infrastructure

Threat Intelligence

Real-time correlation with threat intelligence from multiple sources

Alert Investigation

Comprehensive tools for investigating and responding to security alerts

File Classification

Analyze and classify files for malware activity patterns

SOC AI-Powered Analysis

Leverage artificial intelligence for advanced security operations

Security Compliance

Meet compliance requirements with comprehensive security controls

Why UTMStack?

UTMStack stands out in threat prevention by surpassing the boundaries of traditional systems. Our software platform can swiftly analyze log data to identify and halt threats at their source in real-time, even if the threat was not directly detected on the server itself. This seamless integration of SIEM and XDR capabilities sets UTMStack apart from competitors, providing organizations with an effective, holistic cybersecurity suite that enhances threat detection, response, and remediation across clients’ valuable digital infrastructure.
Key Differentiator: Correlation happens before data ingestion, reducing workload and improving response times.

Security

UTMStack is built with security at its core:
  • Daily Code Reviews: UTMStack code is reviewed daily for vulnerable dependencies
  • Penetration Testing: Performed yearly and after every major release
  • Encrypted Data Transit: All data between agents and UTMStack servers uses TLS encryption
  • Service Isolation: Services are isolated by containers and microservices with strong authentication
  • Secure Authentication: Connections authenticated with +24 character unique keys
  • Credential Protection: User credentials encrypted in database and protected by fail2ban and 2FA

Try UTMStack

Live Demo

Experience UTMStack with our online demo

Advanced Persistent Threats

Watch our video on APT detection

Features Overview

Comprehensive overview of UTMStack features

GitHub Repository

Explore the open-source code

Open Source License

UTMStack is open-source software licensed under the AGPL version 3, ensuring transparency and community collaboration.
The enterprise version includes additional features that benefit enterprises and MSPs, such as support, faster correlation, frequent threat intelligence updates, and Artificial Intelligence capabilities.

Build docs developers (and LLMs) love