Demo  Arrow | GitHub | Docs | API reference | Contact | Resources
tirreno - Open-source security framework Home Use cases How it works Pricing About
Arrow Download

tirreno » .com/bat » User activity monitoring on-premises






Resources

tirreno
.com/bat




User activity monitoring on-premises

September 22, 2025 · 4 min read

Every meaningful interaction in a digital product leaves a trace. A login, a registration, a profile change, a page visit, a failed authentication attempt: each of these events carries information about whether the person behind it is who they claim to be and whether their behavior is consistent with legitimate intent. User activity monitoring is the practice of collecting those traces systematically and evaluating them against patterns that distinguish normal use from something that warrants attention.

The concept is simple. The implementation is where it gets interesting, because the data required to monitor user activity effectively is among the most sensitive data a product generates. It records what users do, when, from where, and on what devices. It builds behavioral profiles over time.

Most teams reach for a SaaS monitoring platform when they need this capability. That decision deserves more scrutiny than it usually gets, because it determines where the most detailed record of your users' behavior will live, who can access it, and how much you will pay for the privilege of analyzing your own product's data.

What activity monitoring actually covers

User activity monitoring spans the full lifecycle of an account, from the moment of registration through every subsequent interaction.

At registration, the signals are about identity quality. Is the email address disposable or from a recently registered domain? Is the connection coming through infrastructure associated with fraud operations? Does the IP address appear across other recent registrations? These signals help distinguish genuine signups from automated bulk creation, synthetic identities, and stolen credential abuse.

At login, monitoring shifts to authentication behavior and session context. Failed login attempts, especially in volume or from unfamiliar devices and locations, are credential stuffing indicators. A successful login from a device and location the account has never used before, followed by immediate account changes, is a takeover signal. The pattern matters more than any individual event.

During active sessions, behavioral signals accumulate. Pages visited, actions taken, the rhythm and depth of the session all contribute to a profile that distinguishes a real user from automation. Sessions with a single event and no further interaction are consistent with bots or credential testing. Sessions where the user's IP or device changes mid-session suggest something other than normal use.

Account changes are particularly informative. An email address change, a password reset, a modification to payment or contact details: these are the actions an attacker takes after gaining access to lock the legitimate user out. When these changes happen shortly after a login from unfamiliar infrastructure, the combination is a strong takeover signal.

Field-level changes matter for compliance as well as security. Products that need to maintain an audit trail of what was modified, by whom, and when need monitoring that captures change events with full context: the old value, the new value, the device, the IP, the timestamp.

The data problem is harder to undo than the cost problem

SaaS monitoring platforms receive a continuous stream of behavioral events from your product. For that stream to be useful, it needs to include user identifiers, IP addresses, device characteristics, session behavior, and account history. This is personal data by any regulatory definition.

Under GDPR, sending this data to an external processor requires documented legal basis, a data processing agreement, and potentially transfer mechanism compliance if the processor operates outside your jurisdiction. The volume matters: monitoring every login, every session, every account change means a continuous and substantial outbound flow of behavioral data to a third party.

Beyond compliance, there is a control problem. The behavioral profiles built from your users' activity exist on infrastructure you do not control, under retention policies you did not set. Self-hosted monitoring keeps the data where it was generated. The behavioral profiles, risk scores, and detection records live in your database, governed by your retention policies, protected by your access controls. The answer to "where does this data go" is simple: nowhere.

What open source means in practice

The difference between open-source and proprietary monitoring is not ideological. It is practical, and it shows up in specific situations that every team running activity monitoring will eventually encounter.

When a legitimate user is flagged as risky, someone needs to understand why. With proprietary monitoring, the answer is a risk score and possibly a category label. The logic behind the score is the vendor's intellectual property. With open-source monitoring, the answer is a set of specific rules, each with a readable definition and a configurable weight, that fired on specific signals in the user's session. You can trace the score to its inputs and decide whether the assessment is correct.

When a new threat pattern targets your product, someone needs to respond. With proprietary monitoring, you report the pattern to the vendor and wait for their model to incorporate it or not. With open-source monitoring, you write a rule, assign it a weight, and deploy it the same day.

These are not hypothetical scenarios. They are the recurring operational reality of running activity monitoring on a product with real users.

Why on-premises from day one

Your product is unique. The fraud targeting it is unique too. The patterns that matter, the thresholds that make sense, the user behaviors that are normal for your specific application and abnormal for someone else's: these are things you discover as you go deeper into your account data.

Every team that takes activity monitoring seriously eventually arrives at the same conclusion: they need their own procedures, their own rules, their own definitions of what constitutes risk. A SaaS vendor offers a general model that works adequately across many products but adapts to none of them. When your fraud patterns shift, you wait for the vendor. When your product changes, you hope the vendor's model still fits. When you need a rule that reflects something specific to your business logic, you cannot write one.

An open-source security framework adapts because you control it. The rules are yours to write. The thresholds are yours to set. The detection logic evolves alongside your product because the same team that understands the product is the team that configures the monitoring.

Starting on-premises from the beginning means you never have to migrate away from a vendor later or untangle a data flow you should not have created. You keep your behavioral baselines intact. The investment compounds from day one: every event you collect, every rule you tune, every pattern you learn about your users stays on your systems and keeps getting more valuable.

The administration guide covers installation and configuration. The developer guide covers event API integration and field history tracking. Download at tirreno.com/download.







tirreno

Security framework

Use cases

How it works

Pricing

About

Download

Live demo

GitHub

Dockerhub

Documentation

Resource center

Learn

Account takeovers

Insider threat detection

Login & activity monitoring

Field audit trails

API abuse

Bonus abuse

Chargeback management

Fake accounts

Threat hunting

Transaction abuse

HIPAA monitoring

tirreno is an open-source security
framework that embeds protection
against threats, fraud and abuse
right into your product.

General team@tirreno.com
Support ping@tirreno.com
Security atdt@tirreno.com

Terms & conditions
Privacy policy
Imprint | Contact

Rue Galilée 7
1400 Yverdon-les-Bains
Switzerland Switzerland

©2026, tirreno. tirreno© is a trademark of Tirreno Technologies Sàrl. All rights reserved.

Valid HTML 4.01 (1999 specification)



Open-source security framework