Graylog

2013
Houston, TX, USA
Dec 6, 2019   |  By Graylog
The Internet of Things (IoT) revolution has set the beginning of a new age of data transfer. Each day, a massive number of new devices get added to all kinds of network infrastructures, transferring gargantuan amounts of data back and forth. In the next decade, we expect the number of IoTs to grow to a staggering 80 billion connected devices – practically outnumbering the human population tenfold.
Dec 3, 2019   |  By Graylog
We’ve already covered why log management is important, but we’ve only briefly touched upon one of the best ways that managing your log files can help you and your enterprise, which is, namely – with troubleshooting.
Nov 29, 2019   |  By Graylog
In this log management guide, we will cover all the aspects of log management and talk about the benefits of using logging tools to improve security, troubleshoot issues, and monitor your system.
Nov 26, 2019   |  By Graylog
If you’re handling sensitive information, dealing with data loss can be more than just a headache. Log management tools such as Graylog can enhance your incident response and management strategies, and help you mitigate the damage when a breach occurs in your database. Minimizing data loss with a fast and scalable logging solution is key if you want to bring your cybersecurity to the next level.
Nov 22, 2019   |  By Graylog
O365beat is an exceptionally useful open-source log shipping tool created by counteractive. With a few simple tweaks, it can be used to fetch Office 365 audit logs from the Office 365 Management Activity API and forward them to Graylog. The best part of this tool is that it leverages all the flexibility and power of the beats platforms such as libbeat.
Jan 18, 2019   |  By Graylog
When it comes to security data enrichment, it's helpful to think beyond threat intelligence. This white paper explores viable standard and advanced third-party intelligence enrichment sources that are often overlooked.
Jan 1, 2019   |  By Graylog
In this guide, what to consider when selecting a source of threat intelligence and how to make threat intelligence work for your organization.
Jan 1, 2019   |  By Graylog
When alerts go unheeded or don’t deliver next steps on how to mitigate threats, SIEM can become an expensive and ineffective tool.
Dec 1, 2018   |  By Graylog
This paper examines the critical criteria to consider when evaluating tools for managing your data. There are compelling reasons why Graylog is the best choice for log management and analysis.
Dec 1, 2018   |  By Graylog
The previous data protection directive passed long before the Internet became the primary marketplace for businesses. In light of recent data and privacy issues, consumers demand higher standards for more security.
Oct 16, 2019   |  By Graylog
Java Heap Settings in Graylog 3.1.
Sep 10, 2019   |  By Graylog
Graylog 3.1.1 AWS Integration Video
Aug 2, 2019   |  By Graylog
Graylog 3.1 Correlation Engine Feature Video
Jul 11, 2019   |  By Graylog
How to Enrich your log data with Graylog's Processing Pipeline, Lookup Tables
Jul 11, 2019   |  By Graylog
How to monitor your Graylog deployment