{"id":7933,"date":"2025-05-12T13:22:47","date_gmt":"2025-05-12T11:22:47","guid":{"rendered":"https:\/\/swissmakers.ch\/?p=7933"},"modified":"2025-05-12T13:44:55","modified_gmt":"2025-05-12T11:44:55","slug":"siem-child-protection","status":"publish","type":"post","link":"https:\/\/swissmakers.ch\/en\/siem-kinderschutz\/","title":{"rendered":"SIEM in child protection: a new way to protect our children"},"content":{"rendered":"<div class=\"gb-container gb-container-b1a18277\">\n\n<p><strong>Children and young people deserve our comprehensive protection<\/strong> - especially in educational institutions such as schools, boarding schools, kindergartens, daycare centres or competence centres. Many institutions are already prepared for external threats and use firewalls, virus scanners or access restrictions. Nevertheless, a sensitive gap arises as soon as potential <strong>Threats within<\/strong> emerge within the organisation: Assaults by employees, radicalisation, cyberbullying or the unauthorised consumption of illegal content often remain undetected for a long time.<\/p>\n\n\n<div class=\"gb-grid-wrapper gb-grid-wrapper-879a557a\">\n<div class=\"gb-grid-column gb-grid-column-69647def\"><div class=\"gb-container gb-container-69647def\">\n\n<p>As the father of a three-year-old son, I can only imagine what it means when your own child gets into such a situation. The number of unreported cases is still high and many cases go undetected.  Based on the conviction that we all have a responsibility to protect our children in the best possible way, we at the <strong>Swissmakers GmbH<\/strong> decided to utilise our technological expertise in the field of cyber security and Elasticsearch and use it specifically for child protection. In this blog post, we would therefore like to provide an initial overview, <strong>like a classic SIEM system<\/strong> through minimal adjustments to the school and childcare environment, <strong>be used efficiently to protect children<\/strong> can.&nbsp;<\/p>\n\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-77dd6410\"><div class=\"gb-container gb-container-77dd6410\">\n<style>.kb-image7933_33e140-da .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<figure class=\"wp-block-kadence-image kb-image7933_33e140-da size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"505\" src=\"https:\/\/swissmakers.ch\/wp-content\/uploads\/2025\/04\/Statistik-Kinderschutz-e1743943351680-1024x505.png\" alt=\"\" class=\"kb-img wp-image-7950\" srcset=\"https:\/\/swissmakers.ch\/wp-content\/uploads\/2025\/04\/Statistik-Kinderschutz-e1743943351680-1024x505.png 1024w, https:\/\/swissmakers.ch\/wp-content\/uploads\/2025\/04\/Statistik-Kinderschutz-e1743943351680-300x148.png 300w, https:\/\/swissmakers.ch\/wp-content\/uploads\/2025\/04\/Statistik-Kinderschutz-e1743943351680-768x379.png 768w, https:\/\/swissmakers.ch\/wp-content\/uploads\/2025\/04\/Statistik-Kinderschutz-e1743943351680-18x9.png 18w, https:\/\/swissmakers.ch\/wp-content\/uploads\/2025\/04\/Statistik-Kinderschutz-e1743943351680.png 1034w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n<\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-f2f0c508\">\n\n<h2 class=\"gb-headline gb-headline-57ffc961 gb-headline-text\">What is a SIEM system and why is it ideal for child protection?<\/h2>\n\n\n\n<p>A <strong>SIEM system<\/strong> (Security Information and Event Management System) <strong>collects and analyses in real time<\/strong> the log data of all applications and end devices within an organisation. In contrast to seamless monitoring of all content, a SIEM primarily processes metadata (e.g. time of a communication, deviations from usual usage behaviour) in order to <strong>Recognising anomalies at an early stage<\/strong>. This offers teachers and social pedagogues an opportunity to identify the first warning signs of problematic behaviour before anything worse happens - and without unnecessarily violating the privacy of children and young people.<\/p>\n\n\n\n<p>Especially in an educational context, the topic of \"digital surveillance\" understandably causes scepticism. However, a modern SIEM concept can effectively allay fears of total control because it does not carry out a complete check of all chats or documents. Instead, the system monitors basic parameters (such as the frequency with which files are exchanged) and only triggers an alarm if certain previously defined patterns occur. This keeps the <strong>Personal communication largely protected<\/strong>while potentially critical events come to light in good time.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-0f7efc60\">\n\n<h2 class=\"gb-headline gb-headline-40d8d511 gb-headline-text\">How a SIEM can help: practical examples<\/h2>\n\n\n<div class=\"gb-grid-wrapper gb-grid-wrapper-08a8b835\">\n<div class=\"gb-grid-column gb-grid-column-63642fbf\"><div class=\"gb-container gb-container-63642fbf\">\n\n<p>Schools, boarding schools and other childcare facilities combine a wide range of digital activities: chats, emails, online learning platforms, learning apps, network storage and much more. What's more, many children and young people are already surfing the internet independently at a very young age - sometimes on private devices, sometimes on school tablets or computers in the school network. Especially in this complex environment, it is crucial, <strong>Recognising early warning signals<\/strong>before abuse takes place.<\/p>\n\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-86f20d49\"><div class=\"gb-container gb-container-86f20d49\">\n<style>.kb-image7933_00532d-12 .kb-image-has-overlay:after{opacity:0.3;border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kb-image7933_00532d-12 img.kb-img, .kb-image7933_00532d-12 .kb-img img{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}<\/style>\n<figure class=\"wp-block-kadence-image kb-image7933_00532d-12 size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"749\" src=\"https:\/\/swissmakers.ch\/wp-content\/uploads\/2025\/04\/Kindschutz-2-e1743941937632-1024x749.png\" alt=\"\" class=\"kb-img wp-image-7945\" srcset=\"https:\/\/swissmakers.ch\/wp-content\/uploads\/2025\/04\/Kindschutz-2-e1743941937632-1024x749.png 1024w, https:\/\/swissmakers.ch\/wp-content\/uploads\/2025\/04\/Kindschutz-2-e1743941937632-300x220.png 300w, https:\/\/swissmakers.ch\/wp-content\/uploads\/2025\/04\/Kindschutz-2-e1743941937632-768x562.png 768w, https:\/\/swissmakers.ch\/wp-content\/uploads\/2025\/04\/Kindschutz-2-e1743941937632-16x12.png 16w, https:\/\/swissmakers.ch\/wp-content\/uploads\/2025\/04\/Kindschutz-2-e1743941937632.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n<\/div><\/div>\n<\/div>\n\n\n<p>A SIEM system helps to register these incidents at an early stage. Instead of only being able to react after serious incidents, the school management or a dedicated security team can intervene preventively and hold clarifying discussions as soon as <strong>Conspicuous anomalies<\/strong> appear in behaviour.<\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items7933_9baa0e-7f:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items7933_9baa0e-7f ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:var(--global-kb-spacing-sm, 1.5rem);margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;column-gap:20px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items7933_9baa0e-7f ul.kt-svg-icon-list{grid-row-gap:20px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items7933_9baa0e-7f .kb-svg-icon-wrap{font-size:40px;color:var(--accent-2);}.wp-block-kadence-iconlist.kt-svg-icon-list-items7933_9baa0e-7f ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:20px;}.kt-svg-icon-list-items7933_9baa0e-7f ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items7933_9baa0e-7f kt-svg-icon-list-columns-1 alignnone kt-list-icon-aligntop\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-7933_be3858-f5 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-7933_be3858-f5\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertTriangle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M10.29 3.86L1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z\"\/><line x1=\"12\" y1=\"9\" x2=\"12\" y2=\"13\"\/><line x1=\"12\" y1=\"17\" x2=\"12\" y2=\"17\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong><strong>Recognising bullying at an early stage<\/strong><\/strong><br>If offensive terms or an unusually high number of negative keywords repeatedly appear in chat messages, the system can register this accumulation and inform those responsible. Educational professionals can then take timely countermeasures and help those affected.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-7933_3820bc-a0 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-7933_3820bc-a0\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertTriangle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M10.29 3.86L1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z\"\/><line x1=\"12\" y1=\"9\" x2=\"12\" y2=\"13\"\/><line x1=\"12\" y1=\"17\" x2=\"12\" y2=\"17\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong><strong>Prevention of abuse<\/strong><\/strong><br>If there is a sudden and atypically intensive exchange of data between employees and individual students (e.g. a large number of private messages or an above-average number of images or files), the SIEM sounds the alarm. This enables line managers or a crisis team to quickly find out whether there is a harmless explanation or a real threat of abuse.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-7933_a2b69a-d8 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-7933_a2b69a-d8\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertTriangle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M10.29 3.86L1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z\"\/><line x1=\"12\" y1=\"9\" x2=\"12\" y2=\"13\"\/><line x1=\"12\" y1=\"17\" x2=\"12\" y2=\"17\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Calling up illegal content or content harmful to minors<\/strong><br>A group of pupils repeatedly access websites during the breaks that are linked to drug offences or depictions of violence. The SIEM reports this and informs the responsible office of the exact devices from which the content was accessed and which student or teacher account was involved. In this way, a dialogue can be held promptly before further problematic actions can arise.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-7933_ad03d7-bf .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-7933_ad03d7-bf\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertTriangle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M10.29 3.86L1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z\"\/><line x1=\"12\" y1=\"9\" x2=\"12\" y2=\"13\"\/><line x1=\"12\" y1=\"17\" x2=\"12\" y2=\"17\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Radicalisation tendencies<\/strong><br>A young person researches extremist content conspicuously often and communicates with radical groups in forums. The system recognises repeated access to listed sites, informs the school social work department and thus enables early action to be taken - e.g. educational or counselling services.<\/span><\/li>\n<\/ul><\/div>\n\n<\/div>\n\n<div class=\"gb-container gb-container-a27875cb\">\n\n<h2 class=\"gb-headline gb-headline-7ed28eaf gb-headline-text\">Advantages and challenges<\/h2>\n\n\n<style>.kt-tabs-id7933_536557-34 > .kt-tabs-content-wrap > .wp-block-kadence-tab{border-top:3px solid var(--contrast);border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-right:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);padding-left:var(--global-kb-spacing-sm, 1.5rem);min-height:250px;background:var(--base);}.wp-block-kadence-tabs .kt-tabs-id7933_536557-34 > .kt-tabs-title-list li{margin-top:0px;margin-right:8px;margin-bottom:0px;margin-left:0px;margin-right:0px;margin-left:0px;}.wp-block-kadence-tabs .kt-tabs-id7933_536557-34 > .kt-tabs-title-list li:last-child{margin-right:0px;}.wp-block-kadence-tabs .kt-tabs-id7933_536557-34 > .kt-tabs-title-list{margin-right:-15px;}.wp-block-kadence-tabs .kt-tabs-id7933_536557-34 > .kt-tabs-title-list li .kt-tab-title{margin-right:15px;}.wp-block-kadence-tabs .kt-tabs-id7933_536557-34 > .kt-tabs-title-list li .kt-tab-title, .wp-block-kadence-tabs .kt-tabs-id7933_536557-34 > .kt-tabs-content-wrap > .kt-tabs-accordion-title .kt-tab-title{line-height:1.4em;letter-spacing:0.6px;font-weight:regular;font-style:normal;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;padding-top:5px;padding-right:10px;padding-bottom:10px;padding-left:10px;border-color:var(--contrast);color:var(--contrast);background:var(--base-2);}.wp-block-kadence-tabs .kt-tabs-id7933_536557-34 > .kt-tabs-content-wrap > .kt-tabs-accordion-title .kt-tab-title{margin-top:0px;margin-right:8px;margin-bottom:0px;margin-left:0px;}.wp-block-kadence-tabs .kt-tabs-id7933_536557-34 > .kt-tabs-title-list li .kt-tab-title:hover, .wp-block-kadence-tabs .kt-tabs-id7933_536557-34 > .kt-tabs-content-wrap > .kt-tabs-accordion-title .kt-tab-title:hover{border-color:var(--contrast);color:var(--accent);background:var(--accent-3);}.wp-block-kadence-tabs .kt-tabs-id7933_536557-34 > .kt-tabs-title-list li.kt-tab-title-active .kt-tab-title, .wp-block-kadence-tabs .kt-tabs-id7933_536557-34 > .kt-tabs-content-wrap > .kt-tabs-accordion-title.kt-tab-title-active .kt-tab-title{border-color:var(--contrast);color:var(--base-2);background:var(--contrast);}@media all and (max-width: 1024px){.kt-tabs-id7933_536557-34 > .kt-tabs-content-wrap > .wp-block-kadence-tab{border-top:3px solid var(--contrast);}}@media all and (max-width: 1024px){.wp-block-kadence-tabs .kt-tabs-id7933_536557-34 > .kt-tabs-title-list li .kt-tab-title{margin-right:3px;}}@media all and (max-width: 767px){.kt-tabs-id7933_536557-34 > .kt-tabs-content-wrap > .wp-block-kadence-tab{border-top:3px solid var(--contrast);}}<\/style>\n<div class=\"wp-block-kadence-tabs alignnone\"><div class=\"kt-tabs-wrap kt-tabs-id7933_536557-34 kt-tabs-has-2-tabs kt-active-tab-2 kt-tabs-layout-tabs kt-tabs-tablet-layout-tabs kt-tabs-mobile-layout-accordion kt-tab-alignment-left kt-create-accordion\"><ul class=\"kt-tabs-title-list kb-tabs-list-columns kb-tab-title-columns-2\"><li id=\"tab-strongherausforderungenstrong\" class=\"kt-title-item kt-title-item-1 kt-tabs-svg-show-always kt-tabs-icon-side-left kt-tab-title-inactive\"><a href=\"#tab-strongherausforderungenstrong\" data-tab=\"1\" class=\"kt-tab-title kt-tab-title-1\"><span class=\"kt-title-text\"><strong>The challenges<\/strong><\/span><\/a><\/li><li id=\"tab-strongvorteilestrong\" class=\"kt-title-item kt-title-item-2 kt-tabs-svg-show-always kt-tabs-icon-side-left kt-tab-title-active\"><a href=\"#tab-strongvorteilestrong\" data-tab=\"2\" class=\"kt-tab-title kt-tab-title-2\"><span class=\"kt-title-text\"><strong>Advantages<\/strong><\/span><\/a><\/li><\/ul><div class=\"kt-tabs-content-wrap\">\n<div class=\"wp-block-kadence-tab kt-tab-inner-content kt-inner-tab-1 kt-inner-tabe90dce-33\"><div class=\"kt-tab-inner-content-inner\"><style>.wp-block-kadence-iconlist.kt-svg-icon-list-items7933_3c7a85-3d:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items7933_3c7a85-3d ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items7933_3c7a85-3d ul.kt-svg-icon-list{grid-row-gap:10px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items7933_3c7a85-3d .kb-svg-icon-wrap{font-size:25px;color:var(--accent-2);}.wp-block-kadence-iconlist.kt-svg-icon-list-items7933_3c7a85-3d ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items7933_3c7a85-3d ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items7933_3c7a85-3d kt-svg-icon-list-columns-1 alignnone kt-list-icon-aligntop\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-7933_437538-06 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-7933_437538-06\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><line x1=\"12\" y1=\"8\" x2=\"12\" y2=\"12\"\/><line x1=\"12\" y1=\"16\" x2=\"12\" y2=\"16\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Metadata instead of full monitoring<\/strong>Content details such as chat histories or video recordings are not recorded by default. As a rule, only key data (time, users involved, number of files sent) is saved.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-7933_555f0a-95 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-7933_555f0a-95\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><line x1=\"12\" y1=\"8\" x2=\"12\" y2=\"12\"\/><line x1=\"12\" y1=\"16\" x2=\"12\" y2=\"16\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Strict access controls<\/strong>Only a small, authorised team (school management, IT officer, school social worker if applicable) has access in the event of an alarm. Every access is logged to prevent misuse.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-7933_38c4c8-f9 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-7933_38c4c8-f9\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><line x1=\"12\" y1=\"8\" x2=\"12\" y2=\"12\"\/><line x1=\"12\" y1=\"16\" x2=\"12\" y2=\"16\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Legal protection<\/strong>Anyone using a SIEM system must fulfil legal data protection requirements (e.g. the <a href=\"https:\/\/www.fedlex.admin.ch\/eli\/cc\/2022\/491\/de\" target=\"_blank\" rel=\"noopener\">DSG<\/a> in Switzerland or the GDPR in the EU) as well as guidelines for the protection of children and young people.<\/span><\/li>\n<\/ul><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-tab kt-tab-inner-content kt-inner-tab-2 kt-inner-tab1473a7-a8\"><div class=\"kt-tab-inner-content-inner\"><style>.wp-block-kadence-iconlist.kt-svg-icon-list-items7933_1268a7-4a:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items7933_1268a7-4a ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items7933_1268a7-4a ul.kt-svg-icon-list{grid-row-gap:10px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items7933_1268a7-4a .kb-svg-icon-wrap{font-size:25px;color:var(--accent-2);}.wp-block-kadence-iconlist.kt-svg-icon-list-items7933_1268a7-4a ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items7933_1268a7-4a ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items7933_1268a7-4a kt-svg-icon-list-columns-1 alignnone kt-list-icon-aligntop\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-7933_9e738e-a7 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-7933_9e738e-a7\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkSquare kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"9 11 12 14 22 4\"\/><path d=\"M21 12v7a2 2 0 0 1-2 2H5a2 2 0 0 1-2-2V5a2 2 0 0 1 2-2h11\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Less uncertainty<\/strong>A SIEM system recognises risks before they develop into tangible problems. Educational professionals gain security and can focus their energy on the essentials: looking after and supporting the children.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-7933_4b3b94-20 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-7933_4b3b94-20\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkSquare kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"9 11 12 14 22 4\"\/><path d=\"M21 12v7a2 2 0 0 1-2 2H5a2 2 0 0 1-2-2V5a2 2 0 0 1 2-2h11\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Early intervention instead of crisis management<\/strong>Instead of only reacting when it is already too late, SIEM offers points of reference for early discussions or counselling services.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-7933_87e91c-13 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-7933_87e91c-13\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_checkSquare kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"9 11 12 14 22 4\"\/><path d=\"M21 12v7a2 2 0 0 1-2 2H5a2 2 0 0 1-2-2V5a2 2 0 0 1 2-2h11\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Simple reasoning<\/strong>If incidents do occur, the logging provides structured information that enables a transparent and fair approach.<\/span><\/li>\n<\/ul><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div>\n\n<\/div>\n\n<div class=\"gb-container gb-container-0aa6b770\">\n\n<h2 class=\"gb-headline gb-headline-c0f35c2d gb-headline-text\">Why many schools are still lagging behind<\/h2>\n\n\n\n<p>Although IT equipment in schools is constantly growing, the <strong>Security infrastructure often outdated<\/strong>. Firewalls and virus scanners are relatively easy to set up, but analysing internal data flows is more complex. A lack of specialised personnel, unclear responsibilities and a reluctance to carry out supposed monitoring mean that a large proportion of problems remain undetected. This is precisely where SIEM solutions come in: They analyse data automatically, sound the alarm reliably and make it possible to intervene in good time. In this way, technology becomes a valuable aid for more security in everyday educational work. In other words: <strong>When danger doesn't call out loudly, you need systems that recognise quiet signals.<\/strong> <\/p>\n\n\n<style>.kb-image7933_36600a-f4 .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<figure class=\"wp-block-kadence-image kb-image7933_36600a-f4 size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"456\" src=\"https:\/\/swissmakers.ch\/wp-content\/uploads\/2025\/04\/Schritt-fuer-Schritt-e1745059587708-1024x456.png\" alt=\"\" class=\"kb-img wp-image-7978\" srcset=\"https:\/\/swissmakers.ch\/wp-content\/uploads\/2025\/04\/Schritt-fuer-Schritt-e1745059587708-1024x456.png 1024w, https:\/\/swissmakers.ch\/wp-content\/uploads\/2025\/04\/Schritt-fuer-Schritt-e1745059587708-300x133.png 300w, https:\/\/swissmakers.ch\/wp-content\/uploads\/2025\/04\/Schritt-fuer-Schritt-e1745059587708-768x342.png 768w, https:\/\/swissmakers.ch\/wp-content\/uploads\/2025\/04\/Schritt-fuer-Schritt-e1745059587708-1536x683.png 1536w, https:\/\/swissmakers.ch\/wp-content\/uploads\/2025\/04\/Schritt-fuer-Schritt-e1745059587708-18x8.png 18w, https:\/\/swissmakers.ch\/wp-content\/uploads\/2025\/04\/Schritt-fuer-Schritt-e1745059587708.png 1798w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n<\/div>\n\n<div class=\"gb-container gb-container-98e9fb96\">\n\n<h2 class=\"gb-headline gb-headline-71cd32b6 gb-headline-text\">Why Swissmakers GmbH?<\/h2>\n\n\n\n<p>The <strong>Swissmakers GmbH<\/strong> has been a reliable Swiss partner for years. <strong>Partner of Elasticsearch<\/strong> and has <strong>Extensive experience<\/strong> in the area of cyber security and <a href=\"https:\/\/swissmakers.ch\/en\/siem-elasticsearch\/\">SIEM implementations<\/a>. Our primary goal in this project is to support the well-being of the children while respecting the privacy of pupils and staff.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Technical expertise<\/strong>We have many years of experience in the technical implementation of SIEM solutions and IT security concepts - even in sensitive areas of application.<\/li>\n\n\n\n<li><strong>Customised solutions<\/strong>Every institution is unique. We develop customised concepts that seamlessly complement your existing processes.<\/li>\n\n\n\n<li><strong>Data protection expertise<\/strong>Thanks to our many years of experience, we can integrate the applicable requirements of the Data Protection Act and child protection regulations to ensure safe and legally compliant operation.<\/li>\n\n\n\n<li><strong>Holistic approach<\/strong>From design, implementation and training to operation and ongoing audits - we support you throughout.<\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-b0848255\">\n\n<h2 class=\"gb-headline gb-headline-475411fe gb-headline-text\">Conclusion: Technology to protect our children<\/h2>\n\n\n\n<p>The idea that our children are victims of abuse is almost unbearable for many parents. Nevertheless, it is important to face up to this reality and actively do something about it. Through the targeted use of a <strong><a href=\"https:\/\/swissmakers.ch\/en\/siem-elasticsearch\/\">SIEM Systems<\/a><\/strong> based on Elasticsearch can be <strong>eye-catching patterns<\/strong>recognise risky interactions and dangerous online activities at an early stage - <strong>without<\/strong> to disclose all data indiscriminately or the <strong>Privacy<\/strong> of the pupils <strong>to injure<\/strong>.&nbsp;<\/p>\n\n\n\n<p>No technological tool can guarantee 100 per cent protection or completely replace the human eye and face-to-face dialogue. But the better we use our digital tools, the sooner we can recognise potential dangers before irreparable damage is done.<\/p>\n\n\n\n<p>If you <strong><a href=\"https:\/\/swissmakers.ch\/en\/contact\/\">learn more about it<\/a><\/strong> If you would like to know how such a SIEM solution can be implemented technically and organisationally in your institution, we will be happy to help. <strong>Our experts will advise you<\/strong> on the topics of data security, data protection and process integration - so that together we can take an important step towards <strong>Protecting our children<\/strong> can go.&nbsp;<\/p>\n\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Children and young people deserve our comprehensive protection - especially in educational institutions such as schools, boarding schools, kindergartens, ... <\/p>\n<p class=\"read-more-container\"><a title=\"SIEM in child protection: a new way to protect our children\" class=\"read-more button\" href=\"https:\/\/swissmakers.ch\/en\/siem-kinderschutz\/#more-7933\" aria-label=\"Read more about SIEM in child protection: A new way to protect our children\">Read more<\/a><\/p>","protected":false},"author":2,"featured_media":7957,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","footnotes":""},"categories":[15,16],"tags":[],"class_list":["post-7933","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-itsecurity","category-monitoring","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-50"],"taxonomy_info":{"category":[{"value":15,"label":"IT-Security"},{"value":16,"label":"Monitoring"}]},"featured_image_src_large":["https:\/\/swissmakers.ch\/wp-content\/uploads\/2025\/04\/Blogheader-SIEM-Kinderschutz-1024x512.png",1024,512,true],"author_info":{"display_name":"Michael Reber","author_link":"https:\/\/swissmakers.ch\/en\/author\/michael\/"},"comment_info":32,"category_info":[{"term_id":15,"name":"IT-Security","slug":"itsecurity","term_group":0,"term_taxonomy_id":15,"taxonomy":"category","description":"","parent":0,"count":9,"filter":"raw","cat_ID":15,"category_count":9,"category_description":"","cat_name":"IT-Security","category_nicename":"itsecurity","category_parent":0},{"term_id":16,"name":"Monitoring","slug":"monitoring","term_group":0,"term_taxonomy_id":16,"taxonomy":"category","description":"","parent":0,"count":8,"filter":"raw","cat_ID":16,"category_count":8,"category_description":"","cat_name":"Monitoring","category_nicename":"monitoring","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/swissmakers.ch\/en\/wp-json\/wp\/v2\/posts\/7933","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swissmakers.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/swissmakers.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/swissmakers.ch\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/swissmakers.ch\/en\/wp-json\/wp\/v2\/comments?post=7933"}],"version-history":[{"count":47,"href":"https:\/\/swissmakers.ch\/en\/wp-json\/wp\/v2\/posts\/7933\/revisions"}],"predecessor-version":[{"id":8022,"href":"https:\/\/swissmakers.ch\/en\/wp-json\/wp\/v2\/posts\/7933\/revisions\/8022"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swissmakers.ch\/en\/wp-json\/wp\/v2\/media\/7957"}],"wp:attachment":[{"href":"https:\/\/swissmakers.ch\/en\/wp-json\/wp\/v2\/media?parent=7933"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/swissmakers.ch\/en\/wp-json\/wp\/v2\/categories?post=7933"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swissmakers.ch\/en\/wp-json\/wp\/v2\/tags?post=7933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}