Graylog

2013
Houston, TX, USA
Oct 15, 2019   |  By Graylog
Graylog’s log aggregation features are useful for a lot of tasks, ranging from regular troubleshooting to detecting issues as soon as they become manifest. Optimizing log management by aggregating all meaningful data is a quick and efficient way to isolate any problem to root causes and solve it with minimal impact on services. Aggregated data is easier to parse and analyze – you can reduce the number of data points in a meaningful way and obtain the answer you need from them.
Oct 10, 2019   |  By Graylog
The constant evolution of security threats has long-since made preventing cyber-attacks and network intrusion attempts a nearly impossible task. Real threats are often hard to identify among a multitude of false alarms, and many experts understand that a well-integrated and fully-automated threat intelligence strategy is the best approach. Nevertheless, 70% of security industry professionals still believe threat intelligence to be too complex and bulky to provide actionable insights.
Oct 1, 2019   |  By Graylog
‍ Log file parsing is the process of analyzing log file data and breaking it down into logical syntactic components. In simple words - you’re extracting meaningful data from logs that can be measured in thousands of lines. There are multiple ways to perform log file parsing: you can write a custom parser or use parsing tools and/or software.
Sep 30, 2019   |  By Graylog
Every log management solution out there has its own alerting feature. Alerts are a critical component of every logging tool. They can tell you whether an event is something you want to check out rather than just normal everyday activity you want to ignore. Graylog’s simplified interface is incredibly accessible to assist you with all the information you need in real-time, yet scalable enough to never compromise the level of detail provided.
Sep 18, 2019   |  By Graylog
The Graylog ExtendedLog Format (GELF) is a uniquely convenient log format created to deal with allthe shortcomings of classic plain Syslog. This enterprise feature allows you tocollect structured events from anywhere, and then compress and chunk them inthe blink of an eye.
Jan 18, 2019   |  By Graylog
When it comes to security data enrichment, it's helpful to think beyond threat intelligence. This white paper explores viable standard and advanced third-party intelligence enrichment sources that are often overlooked.
Jan 1, 2019   |  By Graylog
In this guide, what to consider when selecting a source of threat intelligence and how to make threat intelligence work for your organization.
Jan 1, 2019   |  By Graylog
When alerts go unheeded or don’t deliver next steps on how to mitigate threats, SIEM can become an expensive and ineffective tool.
Dec 1, 2018   |  By Graylog
This paper examines the critical criteria to consider when evaluating tools for managing your data. There are compelling reasons why Graylog is the best choice for log management and analysis.
Dec 1, 2018   |  By Graylog
The previous data protection directive passed long before the Internet became the primary marketplace for businesses. In light of recent data and privacy issues, consumers demand higher standards for more security.
Oct 16, 2019   |  By Graylog
Java Heap Settings in Graylog 3.1.
Sep 10, 2019   |  By Graylog
Graylog 3.1.1 AWS Integration Video
Aug 2, 2019   |  By Graylog
Graylog 3.1 Correlation Engine Feature Video
Jul 11, 2019   |  By Graylog
How to use a JSON Extractor
Jul 11, 2019   |  By Graylog
How to backup your Graylog configuration information.