Operations | Monitoring | ITSM | DevOps | Cloud

Graylog

Next-Level Threat Hunting: Shift Your SIEM from Reactive to Proactive

Threat hunting is proactively identifying and thwarting unusual network activity that could indicate an attempted security breach. It's a historically manual activity, making it time-intensive and arduous. It’s no wonder, then, why most organizations don’t have the time, budget, or resources to undertake it effectively…if at all.

Centralized Logging - Knowing When Less is More

A lot of firms collect massive amounts of data every day (up to billions of events) to improve their security efforts, enhance their business intelligence, and refine their marketing strategies. Their log storage drives are so big that some of them even brag about the size, to show their public and clients how advanced their technologies are.

How Graylog's Advanced Functionalities Help You Make Sense of All Your Data

The inherent limitations of most log managers and the need to work within the constraints of your current hardware may force your enterprise to make some hard choices. Less useful data may be left unchecked, old information will eventually get deleted, and the amount of data that is accessed in real-time is sacrificed to reduce excess workload.

Announcing Graylog v3.0 Beta 1

Today we are releasing the first public beta of Graylog v3.0. This release includes a whole new content pack system, an overhauled collector sidecar, new reporting capabilities, improved alerting with greater flexibility, support for Elasticsearch 6.x, a preview version of an awesome new search page called Views, and tons of other improvements and bug fixes.

Why Should You Bother With Information Technology Operations Analytics?

Your organization’s IT system is a complex network of intercommunicating devices that can provide you with an abundance of useful data - if you apply the right practices to gather and filter it. However, to realize how each of these sources interacts and interconnects with one another, you need will to master the art of Information Technology Operations Analytics.