Skip to content
Data security is everything to us

Your data is treated with trust

As a watchdog user, you know where your data is, who has access to it and how it's being used - without ambiguity.

Hero photos Hubspot-4

Guard looks at security - not the content of your business.

What does Watchdog do?

  • Analyse security settings and events
  • Identify risks and anomalies
  • Clearly shows you what to fix

What does Watchdog not do?

  • Does not read your emails
  • Does not handle the content of your documents
  • Does not make changes to M365 configurations for you

Where is the data and who controls it?

All customer data is processed and stored in the EU/EEA. Data is isolated on a client-by-client basis and is never combined with data from other clients.

You decide what Vahti gets access to and what integrations are used. You can control access rights and cut off access at any time. At the end of your subscription, your data will be deleted.

What data does Watchdog need for what it is used for?

Vahti only uses the data to provide the service. We do not use customer data for other purposes and do not pass it on without justification.

The analysis performed by Vahti is based on security metadata from the Microsoft 365 environment. In practice, this means information such as logins, access rights, application permissions and security settings - not the content of messages or files.

  • Access rights are limited to the least privilege (LPR)
  • Data is only used to identify security risks
  • All activities are traceable and verifiable

Data is protected throughout its lifecycle

All data is encrypted during transmission

Data is stored in encrypted form

Access to data is restricted and controlled

Artificial intelligence in Vahd

AI helps you understand the impact of security threats on your business, but it doesn't make decisions.
Actual risk perceptions and the actions derived from them are always based on rule-based analysis - not AI estimates. This ensures that the measures proposed by the Watch are always based on real findings and risks that are traceable.

What does AI do?

  • Explains security threats in plain language and answers your questions
  • Helps you understand the importance of threats to your business
  • Suggests next steps

What doesn't AI do?

  • Does not identify or form risks
  • Does not decide on the severity of risks
  • Does not work without rule-based analysis

Contracts and data protection

The use of the watch is based on clear and transparent contracts.