Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Reference Architecture Series: Scaling Syslog

Join Ed Bailey and Ahmed Kira as they go into more detail about the Cribl Stream Reference Architecture, with a focus on scaling syslog. In this live stream discussion, Ed and Ahmed will explain guidelines for how to handle high volume UDP and TCP syslog traffic. They will also share different use cases and talk about the pros and cons for using different approaches to solve this common and often painful challenge.

Empowering Security Observability: Solving Common Struggles for SOC Analysts and Security Engineers

Join Ed Bailey and GreyNoise founder Andrew Morris as they share insights on how Cribl and GreyNoise help SOC analysts overcome common struggles and improve security detections and incident resolution. Through personal stories and real customer use cases, they'll demonstrate how combining these solutions can make a real difference in the day-to-day lives of SOC analysts. You'll also gain valuable insights into data flow and architecture, and learn how GreyNoise can drive outsized value. Don't miss this opportunity to enhance your security observability skills.

Industry Experts Discuss Cybersecurity Trends and a New Fund to Shape the Future

Cribl's Ed Bailey and Angel Investor Ross Haleliuk discuss trends in the CyberSecurity industry and Ross will be making a big announcement about his new fund to shape the future of the cybersecurity industry. Ross is a big believer in focusing on the security practitioner to provide practical solutions to common issues by early investment in companies he thinks will promote these values. Ed and Ross will discuss trends in the industry and common struggles that both Cribl and his new fund seek to address by adding value and giving security practitioners choice and control over how they run their security program.

Using Cribl Search for Anomaly Detection: Finding Statistical Outliers in Host CPU Busy Percentage

In this video, we'll demonstrate how to use Cribl Search for anomaly detection by finding statistical outliers in host CPU usage. By monitoring the "CPU Busy" metric, we can identify unusual spikes that may indicate malware penetration or high load/limiting conditions on customer-facing hosts. The best part? This simple but powerful analytic is easily adaptable to other metrics, making it a versatile tool for any data-driven organization.

How the All in One Worker Group Fits Into the Cribl Stream Reference Architecture

Join Ed Bailey and Eugene Katz as they go into more detail about the Cribl Stream Reference Architecture, designed to help observability admins achieve faster and more valuable stream deployment. In this live stream discussion, Ed and Eugene will explain guidelines for deploying all in one worker group. They will also share different use cases and talk about the pros and cons for using the all in one worker group.

Fixing Security's Data Problem: Strategies and Solutions with Cribl and CDW

Cribl's Ed Bailey and CDW's Brenden Morgenthaler discuss a foundational issue with many security programs that lack the right data to detect issues and make fast decisions. Data drives every facet of security and bad data/incomplete data weakens your overall program. Ed and Brenden will discuss common issues and strategies for solving security's data problem.