Graylog

Houston, TX, USA
2013
  |  By The Graylog Team
In cybersecurity, “Load Balancing Graylog with Nginx: The Ultimate Guide” is your reference guide. This guide helps to install Nginx. Imagine your Graylog, already proficient at managing vast log data, now enhanced with the Nginx load balancing capability to ensure peak performance. NGINX ensures your Graylog cluster isn’t over-taxed, similar to a well-organized team where work is evenly distributed.
  |  By Graylog
Graylog announces Ross Brewer's appointment as Vice President and Managing Director in EMEA, based in the company's London office. This strategic executive appointment will help the Hamburg-born company build upon its strong momentum across the EMEA region.
  |  By The Graylog Team
When people bemoan the complexity of interconnected IT environments, they usually mean that an organization has a lot of applications that all share data with each other. As your organization adds more applications, you need to make sure that they securely share data with each other. In short, security and development teams find themselves working to deploy and protect the Application Programming Interfaces (APIs) that enable applications to talk to each other.
  |  By The Graylog Team
In the log aggregation game, the biggest difficulty you face can be setting up parsing rules for your logs. To qualify this statement: simply getting log files into Graylog is easy. Graylog also has out-of-the-box parsing of a wide variety of common log sources, so if your logs fall into one of the many categories of log for which there is either a dedicated Input; a dedicated Illuminate component; or that uses a defined Syslog format; then yes, parsing logs is also easy.
  |  By The Graylog Team
As the person on the front lines, you know that providing the best service possible can be what makes your ITSM organization succeed. Every day, you work to build the relationships that help your organization create value for end-users. However, when you have inefficient processes, you end up having to be the person responding to an upset user.
  |  By Jeff Darrington
If you’ve ever watched one of those rehabilitating a business show like Kitchen Nightmares, you know that the advice is often the same, “Don’t try to be everything to everyone. Pick what you’re good at and stick with it.” Essentially, the message is to pick your niche and be the best within it.
  |  By The Graylog Team
Businesses are generating vast amounts of data from various sources, including applications, servers, and networks. As the volume and complexity of this data continue to grow, it becomes increasingly challenging to manage and analyze it effectively. Centralized logging is a powerful solution to this problem, providing a single, unified location for collecting, storing, and analyzing log data from across an organization’s IT infrastructure.
  |  By Ethan C. Keaton
As data-rich solutions are important for many businesses, technical information can become overwhelming, especially regarding shared environments and multi-tenancy. In the world of Graylog, we understand these challenges and present the tools you need to keep your cluster running smoothly. Let’s dive into how you can effectively manage shared Graylog clusters.
  |  By Jeff Darrington
Your networks are the highways that enable data transfers and cloud-based collaboration. Like highways connect people to physical locations, networks connect people to applications and databases. As you would look up the fastest route between two physical locations, your workforce members need the fastest connectivity between two digital locations. Network load balancers enable you to prevent and identify digital “traffic jams” by redistributing incoming network requests across your servers.
  |  By The Graylog Team
Business intelligence (BI) is all about making sense of huge amounts of data to extract meaningful and actionable insights out of it. Log management tools such as Graylog, instead, are the perfect solution to streamline data collection and analysis, so it’s easy to understand how these two technologies can make sense when they’re coupled together.
  |  By Graylog
Take a 20 Minute demo tour of Graylog and see some of it's features and capabilities in action. View insights on how Graylog can help your IT Operations and IT Security.
  |  By Graylog
Joel from the Solution Engineering team at Graylog discusses ways to deploy Graylog in a multi-tenant or shared environment and the challenges involved. He dives into the architecture of Graylog, explaining how to use streams, indexes, and permissions. The video focuses on running Graylog in shared capacities, depending on the diverse needs of various departments. Moreover, Joel also talks about traffic accounting and methods to extract data from Graylog. The video is loaded with useful insights from real-world customer experiences, making it a resourceful guide for anyone looking to optimize their Graylog setup.
  |  By Graylog
Senior Sales Engineer Chris Black enlightens users on 'Log Wrangling’. Utilizing his expertise, Chris compares logs to livestock and provides strategies to manage them effectively, just like a wrangler would handle livestock. Topics discussed include ways to understand and maximize the utility of logs, the complexities of log wrangling, how to simplify the process, and the significance of data normalization. He also touches on organizational policies, the importance of feedback mechanisms in resource management, and key considerations when choosing your log priorities.
  |  By Graylog
Ethan Keaton Sr. Technical Marketing Manager walks you through how Sigma Rules are used in Graylog.
  |  By Graylog
Here is a peek at some of the new features included in Graylog V5.1. You will see many enhancements as well as new features in this video.
  |  By Graylog
Ethan Keaton, Sr. Technical Marketing Manager walks you through the Investigations Feature in Graylog V5.1.
  |  By Graylog
When it comes to security data enrichment, it's helpful to think beyond threat intelligence. This white paper explores viable standard and advanced third-party intelligence enrichment sources that are often overlooked.
  |  By Graylog
In this guide, what to consider when selecting a source of threat intelligence and how to make threat intelligence work for your organization.
  |  By Graylog
When alerts go unheeded or don't deliver next steps on how to mitigate threats, SIEM can become an expensive and ineffective tool.
  |  By Graylog
This paper examines the critical criteria to consider when evaluating tools for managing your data. There are compelling reasons why Graylog is the best choice for log management and analysis.
  |  By Graylog
The previous data protection directive passed long before the Internet became the primary marketplace for businesses. In light of recent data and privacy issues, consumers demand higher standards for more security.

Graylog is a leading centralized log management solution built to open standards for capturing, storing, and enabling real-time analysis of terabytes of machine data. We deliver a better user experience by making analysis ridiculously fast and efficient using a more cost-effective and flexible architecture. Thousands of IT professionals rely on Graylog's scalability, comprehensive access to complete data, and exceptional user experience to solve security, compliance, operational, and DevOps issues every day.

Purpose-built for modern log analytics, Graylog removes complexity from data exploration, compliance audits, and threat hunting so you can find meaning in data more easily and take action faster.