Graylog

Houston, TX, USA
2013
  |  By Jeff Darrington
Linux, Debian, and Ubuntu are the Kirk, Spock, and McCoy of modern application development. The Captain Kirk, Linux, is the open-source central code for directing and talking to hardware. Debian sits as the trio’s Spock, the original distro that can be seen as more complex to install and use. As a Debian child distro, Ubuntu is the McCoy, helping to heal the challenges that people have when trying to use Debian.
  |  By Jeff Darrington
Internet of Things (IoT) devices are everywhere you look. From the smartwatch on your wrist to the security cameras protecting your offices, connected IoT devices transmit all kinds of data. However, these compact devices are different from the other technologies your organization uses. Unlike traditional devices, IoT devices lack a standardized set of security capabilities, making them easier for attackers to exploit.
  |  By The Graylog Product Team
Migrating your data infrastructure can sound daunting, especially when you’re dealing with complex systems like OpenSearch. But what if it could be easier—almost ridiculously easy? If you’re thinking, “Hey, wait a second—could this be as seamless as it sounds?” You’re in for a pleasant surprise. In this blog, we’re diving into how moving and Simplifying Your Data Node Migration with Graylog makes the process smooth, secure, and efficient.
  |  By Jeff Darrington
Logs are the notetakers for your Java application. In a meeting, you might take notes so that you can remember important details later. Your Java logs do the same thing for your application. They document important information about the application’s ability to function and problems that keep it from working as intended. Logs give you information to help fix coding errors, but they also give your end users information that helps them monitor performance and security.
  |  By Jeff Darrington
When DNS Says: Talk to the Hand! What? This started with a post on social media, which created a discussion among us industry professionals. The following conversation happened when I got to talk to my coworkers about some interesting things regarding DNS responses. Putting us gearheads in a room always results in an interesting comment or two!
  |  By Jeff Darrington
While “America runs on Dunkin”, IT increasingly runs on Linux. Between being open-source and highly customizable, everything from video games to enterprise servers can run on Linux. When cloud services took over the corporate IT environment, they brought Linux with them in the form of virtual servers and containers. Meanwhile, developers increasingly use Linux-based Docker to containerize applications and Kubernetes to manage the deployments.
  |  By Jeff Darrington
Imagine living in a world without caller ID, which is easy if you grew up in the “late 1900s.” Every time someone called, you had a conversation that followed this pattern: Hi! Who’s this? It’s Jeff! Hi Jeff! How’s it going? Today, most people already know who’s calling when they answer the phone because caller ID is built into smartphones and communications apps. As a developer, your Python logging is your application’s caller ID.
  |  By Ethan C. Keaton
In today’s distributed work environment, understanding the geographic origin of network traffic has become more crucial than ever. As organizations adapt to remote work, IT teams face the challenge of monitoring and analyzing an expanding array of IP addresses from various locations. Graylog’s geolocation feature offers a powerful solution to this challenge, allowing teams to extract and visualize geographic information from IP addresses in their logs.
  |  By The Graylog Team
For a lot of organizations, APIs are almost like a digital baseball card collection. You keep adding to it, and some of them can be monetized. Just as you need to organize and protect your most valuable cards, you need to implement the appropriate security measures around your APIs. Your API gateway is like having a dedicated binder or box just so you can access your cards and share them without exposing them to people’s hands in a way that can devalue them.
  |  By The Graylog Product Team
We are excited to announce the release of Graylog 6.0, which brings updates across our entire product line!
  |  By Graylog
Follow Carla Garcia Content Development Engineer at Graylog as she walks you through: Capture your Windows Logs!!
  |  By Graylog
Explore the new feature Data Routing in Graylog. This new feature allows you to route your data into Data Tiers for lower cost storage. Storing logs into Data Warehouse where ingestion does not count towards your licensing costs. Bring in those logs when required in an investigation or some other purpose.
  |  By Graylog
Step through a quick tour of the features and functionality in Graylog.
  |  By Graylog
Follow Ethan Keaton Manager of Technical Marketing as he walks you through installing Graylog V6.1 with Graylog Data Node. Graylog Data Node is a Graylog managed OpenSearch Service.
  |  By Graylog
Ethan Keaton Sr. Technical Marketing Manager highlights all the new things Graylog has added to V6.1.
  |  By Graylog
Have a quick look at the new Threat Coverage Radar Chart for tracking your threat coverage with MITRE ATT&CK. Step through the new interface for building Reports as well as new views for Security Investigation features.
  |  By Graylog
Have a look at some of the new features in Graylog.
  |  By Graylog
A Webinar discussing the new features in Graylog V6 and question and answers at the end.
  |  By Graylog

Watch this video for a quick look at Graylog V6.0
https://docs.grayog.org

  |  By Graylog
When it comes to security data enrichment, it's helpful to think beyond threat intelligence. This white paper explores viable standard and advanced third-party intelligence enrichment sources that are often overlooked.
  |  By Graylog
In this guide, what to consider when selecting a source of threat intelligence and how to make threat intelligence work for your organization.
  |  By Graylog
When alerts go unheeded or don't deliver next steps on how to mitigate threats, SIEM can become an expensive and ineffective tool.
  |  By Graylog
This paper examines the critical criteria to consider when evaluating tools for managing your data. There are compelling reasons why Graylog is the best choice for log management and analysis.
  |  By Graylog
The previous data protection directive passed long before the Internet became the primary marketplace for businesses. In light of recent data and privacy issues, consumers demand higher standards for more security.

Graylog is a leading centralized log management solution built to open standards for capturing, storing, and enabling real-time analysis of terabytes of machine data. We deliver a better user experience by making analysis ridiculously fast and efficient using a more cost-effective and flexible architecture. Thousands of IT professionals rely on Graylog's scalability, comprehensive access to complete data, and exceptional user experience to solve security, compliance, operational, and DevOps issues every day.

Purpose-built for modern log analytics, Graylog removes complexity from data exploration, compliance audits, and threat hunting so you can find meaning in data more easily and take action faster.