Graylog

2013
Houston, TX, USA
Mar 26, 2020   |  By Graylog
Graylog Enterprise v3.2 is out in the world, customers are using it and loving it, and we want to share with you what we've learned from them. Like most departments, IT is buried with day-to-day activities. Proverbial system and user fires that need extinguishing get in the way of that list of projects gathering dust because nobody has time to get to them. To ease this burden and give you back much needed time to tackle it all, Graylog focused the v3.2 release on usability and productivity.
Feb 20, 2020   |  By Graylog
Log management plays an important role in helping to debug Kubernetes clusters, improve their efficiency, and monitor them for any suspicious activity. Kubernetes is an open-source cluster management software designed for the deployment, scaling, and operations of containerized applications.
Feb 14, 2020   |  By Graylog
While the Capital One breach may have been jaw-dropping in its sheer scale, there are best practice lessons to be learned in its remediation response, says Nick Carstensen, technical product evangelist at Graylog.
Feb 11, 2020   |  By Graylog
Today, most enterprises rightfully think about their business strategies by leveraging available data. Data-driven decisions certainly are more solid and reliable than those based upon mere instinct, intuition or just plain mysticism. Logs, in particular, are a fantastic source of information from which a company can draw to fuel its business intelligence (BI) strategies. However, there’s a big and sometimes unbridgeable gap between theory and practice.
Feb 5, 2020   |  By Graylog
What makes data structured or unstructured and how does that affect your logging efforts and information gain? Below we've provided a comparison of structured, semi-structured, and unstructured data. Also below, we discuss ways to turn unstructured data into structured data.
Jan 18, 2019   |  By Graylog
When it comes to security data enrichment, it's helpful to think beyond threat intelligence. This white paper explores viable standard and advanced third-party intelligence enrichment sources that are often overlooked.
Jan 1, 2019   |  By Graylog
In this guide, what to consider when selecting a source of threat intelligence and how to make threat intelligence work for your organization.
Jan 1, 2019   |  By Graylog
When alerts go unheeded or don’t deliver next steps on how to mitigate threats, SIEM can become an expensive and ineffective tool.
Dec 1, 2018   |  By Graylog
This paper examines the critical criteria to consider when evaluating tools for managing your data. There are compelling reasons why Graylog is the best choice for log management and analysis.
Dec 1, 2018   |  By Graylog
The previous data protection directive passed long before the Internet became the primary marketplace for businesses. In light of recent data and privacy issues, consumers demand higher standards for more security.
Oct 16, 2019   |  By Graylog
Java Heap Settings in Graylog 3.1.
Sep 10, 2019   |  By Graylog
Graylog 3.1.1 AWS Integration Video
Aug 2, 2019   |  By Graylog
Graylog 3.1 Correlation Engine Feature Video
Jul 11, 2019   |  By Graylog
How to use a JSON Extractor
Jul 11, 2019   |  By Graylog
How to backup your Graylog configuration information.