Graylog

2013
Houston, TX, USA
Jul 2, 2020   |  By Graylog
The first thing we tell Graylog users is, “Monitor your disk space.” The core set of metrics discussed below should always be in acceptable parameters and never grow over extended periods without going back to normal levels. This is why it is critical to monitor metrics that come directly from the hosts running your Graylog infrastructure.
Jun 8, 2020   |  By Graylog
Graylog Illuminate for authentication is a brand new offering designed by our Enterprise Intelligence team. It eliminates the manual setup necessary to detect, monitor, and analyze authentication activities and issues across your IT infrastructure by providing pre-built Dashboards, Alerts, and data enrichment. Initially, Graylog Illuminate for Authentication will address Windows authentication issues and activities. We will release additional data sources in the coming weeks so stay tuned!
Jun 8, 2020   |  By Nick Carstensen
Graylog is an advanced log management system, capable of ingesting all of your corporate logs into a central repository for easy searching and analysis of your data.
May 20, 2020   |  By Graylog
Today we are officially releasing Graylog v3.3 This release includes enhancements to search, events, and alerts that introduce greater efficiencies to your daily log management efforts and strengthen your audit and compliance capabilities. Please read on for detailed descriptions of each feature.
May 8, 2020   |  By Lennart Koopmann
Monitoring all DNS requests in your network, including those that were blocked by (e.g., by a firewall) is a great way to increase visibility, enforce compliance and detect threats. A common problem with collecting DNS logs is that DNS server logs are notoriously hard to parse. Also, parsing only the logs of your DNS servers leaves a blind spot when it comes to usage of, or the attempt to use, an external DNS server like Google's 8.8.8.8.
Jan 18, 2019   |  By Graylog
When it comes to security data enrichment, it's helpful to think beyond threat intelligence. This white paper explores viable standard and advanced third-party intelligence enrichment sources that are often overlooked.
Jan 1, 2019   |  By Graylog
In this guide, what to consider when selecting a source of threat intelligence and how to make threat intelligence work for your organization.
Jan 1, 2019   |  By Graylog
When alerts go unheeded or don’t deliver next steps on how to mitigate threats, SIEM can become an expensive and ineffective tool.
Dec 1, 2018   |  By Graylog
This paper examines the critical criteria to consider when evaluating tools for managing your data. There are compelling reasons why Graylog is the best choice for log management and analysis.
Dec 1, 2018   |  By Graylog
The previous data protection directive passed long before the Internet became the primary marketplace for businesses. In light of recent data and privacy issues, consumers demand higher standards for more security.
May 7, 2020   |  By Graylog
Tech Talk 1 VPN & Firewall Logs
May 7, 2020   |  By Graylog
Tech Talk 2 Authentication Dashboard
May 7, 2020   |  By Graylog
Tech Talk 3 Monitoring for Insider Threats
Oct 16, 2019   |  By Graylog
Java Heap Settings in Graylog 3.1.
Sep 10, 2019   |  By Graylog
Graylog 3.1.1 AWS Integration Video