IT & Security
Infrastructure, deployment, and security architecture.
This section is for IT administrators and security teams responsible for deploying and maintaining Edison Watch.
Core Topics
Deployment
Deployment guidance and an operational checklist for enterprise environments.
Security Model
Architecture details and the "Lethal Trifecta" logic.
SIEM Integration
Stream events to Splunk HEC or any custom HTTP endpoint.
Insights Webhooks
Configure webhooks for automated security insights and anomaly alerts.
Architecture Overview
Edison Watch protects against data exfiltration by tracking:
- Private data access (Files, DBs).
- Untrusted content exposure (Web).
- External communication attempts (Slack, Email).
When all three occur in a session, the action is blocked or paused for human review.
Enterprise support: For deployment assistance, contact [email protected].

