Endpoint Monitoring
Made in Germany

Proactive availability monitoring of your HTTP and TCP endpoints from globally distributed PoPs. With optional security assessments based on industry standards. Your sovereign alternative to Datadog, Cloudflare, and UptimeRobot.

Learn More

Leading companies trust our technology ↘

Monitoring that never sleeps

Our Endpoint Monitoring is part of the Polycrate Software Security Framework and is automatically provided to customers of our Managed Services. Monitor the availability of your endpoints from numerous Points of Presence worldwide – with lightning-fast detection and minimal false positives.

HTTP/TCP Monitoring

Protocol-agnostic monitoring

Monitor HTTP endpoints with detailed response code checks or TCP ports for critical infrastructure services. Automatic detection from Kubernetes Ingresses available.
HTTP TCP Kubernetes Ingress

Global PoPs

Globally distributed checkpoints

Checks are executed from numerous Points of Presence in Europe, America, and Asia – for realistic reachability measurement from your end users’ perspective.
Global EU Latency Geo-Redundant

Security Assessments

Automated security checks

Optionally, your endpoints are periodically checked for vulnerabilities – based on OWASP Top 10, OSINT methods, and other industry standards. With concrete recommendations.
OWASP OSINT Vulnerability Compliance

Flexible Alerting

Notification across all channels

Integrations for Slack, Microsoft Teams, email, and webhooks. Escalation rules, maintenance windows, and alert grouping for enterprise requirements.
Slack Teams Email Webhooks

Mean Time to Detection

5 minutes MTTD

Average detection time of only 5 minutes. Your downtime is detected before your customers notice – around the clock, 365 days a year.
MTTD 24/7 Real-time SLA

Prometheus Metrics

Native observability integration

All monitoring data is exported as Prometheus metrics and available in your APM Stack – for seamless integration into your dashboards.
Prometheus Grafana Metrics APM

Numbers that convince

Our Endpoint Monitoring has been running in production for years, monitoring thousands of our customers’ critical endpoints.

5,000,000

Checks per day

More than 5 million availability checks daily across all monitored endpoints.
Scalable Highly Available

5 minutes

Mean Time to Detection

Average time to detect downtime – faster than most alternatives.
MTTD Real-time

< 3%

False Positives

Less than 3% false alarms through intelligent multi-PoP validation and retry mechanisms.
Precision Reliable

Security Assessments

Optionally, your endpoints can be automatically checked for vulnerabilities. Our Security Assessments are based on established industry standards and provide concrete recommendations.

OWASP Top 10

The most common vulnerabilities

Automated checking for the 10 most critical web application vulnerabilities according to OWASP – from injection to security misconfiguration.
OWASP Web Security Vulnerabilities

OSINT Analysis

Open Source Intelligence

Detection of exposed information, forgotten subdomains, and publicly accessible sensitive data through OSINT methods.
OSINT Reconnaissance Exposure

TLS/SSL Checks

Certificate monitoring

Monitoring of certificate expiration, cipher suites, and TLS configuration. Alerting before expiration and for insecure configurations.
TLS SSL Certificates Cipher

Header Analysis

Security headers check

Verification of critical HTTP security headers like HSTS, CSP, X-Frame-Options, and more. With hardening recommendations.
Headers HSTS CSP Hardening

Comparison with Alternatives

Our Endpoint Monitoring is the sovereign alternative to US-based SaaS providers – with focus on data protection, transparency, and local support.

vs. Datadog

Kriterium ayedo Datadog
Jurisdiction
EU / GDPR compliant
US / Cloud Act
Support
German
English only
Security Assessments
Integrated
Not available
On-Premise
Optional
Not possible

vs. UptimeRobot

Kriterium ayedo UptimeRobot
Jurisdiction
EU / GDPR compliant
US-based
Security Scans
OWASP, OSINT
Uptime only
Prometheus Export
Native
Not available
Integration
Polycrate Framework
Standalone

vs. Pingdom

Kriterium ayedo Pingdom
Jurisdiction
EU / GDPR compliant
US (SolarWinds)
Pricing
Transparent
Complex
Security Assessments
Integrated
Not available
Vendor Lock-in
Open Standards
Proprietary

Pricing

Transparent pricing with no hidden costs.

Included

For Kubernetes customers

€0 /month

  • Unlimited Endpoints
  • 1-minute check interval
  • HTTP/HTTPS + TCP Monitoring
  • Slack, Teams, Email Alerting
  • Prometheus Metrics
  • Global PoPs
  • Support included

Endpoint Monitoring

Pay-as-you-go

€4.95 /Endpoint/month

  • €4.95/Endpoint/month
  • +€5/Endpoint/month Security Checks
  • 1-minute check interval
  • HTTP/HTTPS + TCP Monitoring
  • Slack, Teams, Email Alerting
  • Prometheus Metrics
  • Global PoPs
  • EU Infrastructure

Enterprise

For large organizations

Custom

  • Volume Discounts
  • 30-second check interval
  • Dedicated PoPs
  • Custom Integrations
  • On-Premise Option
  • Premium Support
  • Custom SLAs

Compliance & Regulatory Requirements

The ayedo Software Delivery Platform meets the requirements of current EU regulations. From GDPR to NIS-2 to DORA – our platform is designed for regulated industries and critical infrastructures.

GDPR-Compliant Data Processing

Privacy by Design & Default.

EU data residency (Germany), Customer-Managed Keys (BYOK/BYOHSM), encryption at rest/in transit. ISO 27001-certified data protection management. Support for data subject rights, DPA, incident response. More about GDPR.

NIS-2-Compliant Operations

Resilience for critical infrastructures.

24/7 monitoring, incident response, BCP/DR processes, supply chain transparency (SBOM). EU-based operations, MFA/PAM, vulnerability management, patch processes. Ideal for essential/important entities. More about NIS-2.

DORA-Ready for Financial Institutions

ICT resilience tailored.

ICT risk management framework, documented exit strategies, third-party risk management, TLPT readiness. Structured incident reporting chains, continuous resilience testing, ISO 27001-certified. More about DORA.

CRA-Compliant Software Supply Chain

Security by Design across the entire lifecycle.

SBOM generation, CVE scanning, vulnerability disclosure processes, update management. Signed container images, GitOps-based audit trails, transparent supply chain. More about CRA.

Cloud Sovereignty Framework

Digital sovereignty made measurable.

EU-based operations, open standards, exit capability without lock-in. Designed for SEAL-4 (Full Digital Sovereignty) across all eight sovereignty objectives. No dependencies on non-EU control. More about the Framework.

Data Act-Compliant Portability

Switching without barriers.

Open APIs (OpenAPI), standardized formats (YAML/JSON/OCI), complete exit runbooks, Infrastructure-as-Code portability. Multi-cloud capable, no egress fees, functional equivalence. More about Data Act.

Integrated Compliance Roadmap

Holistic approach.

How ayedo systematically addresses GDPR, NIS-2, DORA, CRA, Data Act, Cloud Sovereignty Framework, ISO 27001/9001. Certifications, processes, technical measures, audit readiness. To overview.

Integration with Polycrate

Endpoint Monitoring is an integral part of the Polycrate Software Security Framework and is provided through the Polycrate API.

Polycrate Operator

Automatic endpoint discovery

The Polycrate Operator automatically detects Ingress resources in your Kubernetes clusters and registers them for monitoring.
Kubernetes Operator Auto-Discovery

Polycrate API

Central management

Manage all endpoints, alerting rules, and security assessments through the Polycrate API web interface or REST API.
API Web-UI REST

Managed Services

Included for customers

Customers of our Managed Kubernetes and Platform services automatically receive Endpoint Monitoring as part of their package.
Managed Included Platform

You build it. We run it.

Excellent performance and maximum uptime - that’s what we wake up for. And sometimes even in the middle of the night.

270 Million End Users

per month

More than 9 million end users use software we deploy every day, on the internet or on-premise.
User Endanwender Software

99.99% Uptime

annual average

Our managed services are unavailable for less than 1 hour per year on average.
Uptime Verfügbarkeit SLA

MTTD < 5 Minutes

on average

Our granular alerting system detects errors and outages faster than you can say ‘Service Level Agreement’.
MTTD Monitoring Detection

15 Billion Logs

per month

More than 2000 logs per second are collected by our collectors and stored GDPR-compliant.
Logs Observability Ingestion

46 Million Active Timeseries

per month

1.7 million datapoints are measured per second by our monitoring systems.
Monitoring Metrics Datapoints

50 TB Backups

per month

More than 2000 backups are stored daily on our encrypted long-term storage.
Backup Storage Sicherheit