Graylog

2013
Houston, TX, USA
Jan 15, 2020   |  By Graylog
Log management software operates on the basis of receiving, storing, and analyzing different types of log format files. There are several of these standardized log formats that are most commonly generated by a wide assortment of different devices and systems. As such, it is important to understand how they operate and differ from one another so that you can use them the right way, as well as avoid some common mistakes.
Jan 7, 2020   |  By Nick Carstensen
Gathering logs that contain IP addresses are quite common across your infrastructure. Your firewalls, web servers, wireless infrastructure and endpoints can contain IP addresses outside your organization. Having additional data on those logs that gives you the Geolocation of the IP address helps in your investigations and understanding of your traffic patterns. For Example, if you can see logs on a World Map, you know if you are communicating to a country you don’t normally talk to.
Jan 2, 2020   |  By Graylog
Cloud computing has changed the way we think about software, and opened up many new possibilities in both business and software development. Log management tools have also been affected by this, which begs the question – what are the pros and cons of cloud log management when compared to on-premises solutions? There are several key things you should consider before opting for either one, so here is a brief overview of the most important aspects that will help you make an informed decision.
Dec 27, 2019   |  By Nick Carstensen
AWS is a popular destination for IaaS that offers quickly saleable resources to meet even the largest customer demands. Cloud scalability like this can generate a large amount of logs you need to monitor to keep up with your cybersecurity goals. Getting those logs into a SIEM or centralized log management platform such as Graylog is key to have proactive monitoring and alerting.
Dec 20, 2019   |  By Nick Carstensen
Logs are a wealth of information containing meta-data from IP addresses, User Names, and error codes. While this is all extremely helpful, the task of understanding all this can seem overwhelming at times to an untrained eye. Other times, corporations might have additional resources they would like to enrich their logs with, i.e., adding a department name to a log message that depends on the username in the log.
Jan 18, 2019   |  By Graylog
When it comes to security data enrichment, it's helpful to think beyond threat intelligence. This white paper explores viable standard and advanced third-party intelligence enrichment sources that are often overlooked.
Jan 1, 2019   |  By Graylog
In this guide, what to consider when selecting a source of threat intelligence and how to make threat intelligence work for your organization.
Jan 1, 2019   |  By Graylog
When alerts go unheeded or don’t deliver next steps on how to mitigate threats, SIEM can become an expensive and ineffective tool.
Dec 1, 2018   |  By Graylog
This paper examines the critical criteria to consider when evaluating tools for managing your data. There are compelling reasons why Graylog is the best choice for log management and analysis.
Dec 1, 2018   |  By Graylog
The previous data protection directive passed long before the Internet became the primary marketplace for businesses. In light of recent data and privacy issues, consumers demand higher standards for more security.
Oct 16, 2019   |  By Graylog
Java Heap Settings in Graylog 3.1.
Sep 10, 2019   |  By Graylog
Graylog 3.1.1 AWS Integration Video
Aug 2, 2019   |  By Graylog
Graylog 3.1 Correlation Engine Feature Video
Jul 11, 2019   |  By Graylog
How to use a JSON Extractor
Jul 11, 2019   |  By Graylog
How to backup your Graylog configuration information.