Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Log Management, Log Analytics and related technologies.

Sponsored Post

5 Security Logging and Monitoring Mistakes to Avoid

As cybersecurity attack vectors evolve, security logging and monitoring are becoming even more important. Effective logging and monitoring enables organizations to detect and investigate security incidents quickly. Cloud-based attackers are getting more sophisticated, and often rely on stolen credentials to escalate privileges and move laterally within corporate IT networks. Many do so undetected, which is why modern IT systems require a watchful eye on log data to detect suspicious activity and inform incident response efforts.

Unlocking the Power of OpenSearch Alerting

OpenSearch Alerting enables you to manage and respond to critical events and anomalies quickly in your OpenSearch environment, making it crucial for maintaining the health and performance of your system. With OpenSearch alerting you can enhance security by monitoring for suspicious activities or security breaches in real-time. This helps improve the security posture of your organization's data infrastructure.

Data Privacy Takeaways from Gartner Security & Risk Summit

A couple of weeks back, I had the opportunity to participate in the Gartner Security and Risk Summit held in National Harbor, MD. While my colleague, April Yep, has already shared insights on the sessions she attended, this blog will delve into the emerging data privacy concerns and explore how telemetry pipelines can effectively tackle these challenges. Two key drivers behind current privacy concerns are the adoption of Gen AI and increasing government regulations.

Resilience Talks with Orange Business: Counting the Cost of Downtime

Disruption in business is inevitable. In partnership with Oxford Economics, Splunk quantified the total cost of downtime for the Global 2000 to be $400 billion per year. But that’s only the tip of the iceberg. Our latest research revealed that hidden costs may deal an even larger economic blow to companies.

Mastering Fortinet FortiGate Firewall Logs - Part 1 Overview

Fortinet FortiGate firewalls are crucial network security devices that help manage and protect your network by monitoring and controlling incoming and outgoing traffic. They do this based on a set of predetermined security rules. The logs generated by FortiGate firewalls are rich with information about network activities and security events, making them indispensable for both security and DevOps teams in enterprises.

GenAI for customer support - Part 1: Building our proof of concept

Welcome to the Inside Elastic blog series, where we showcase Elastic's internal operations solving real-world business challenges. This specific series will shed light on our journey to integrate generative AI into our customer success and support operations, providing you with a behind-the-scenes look at our process. We’re blogging about this capability as we’re building it, and we’re excited for you to join the ride!

Top 11 Splunk Alternatives in 2024 [Includes Free & Open-Source Tools]

Splunk is a powerful unified security and observability tool that analyzes data and logs. Splunk allows you to monitor and visualize data in real-time. It analyzes machine-generated data and logs through a web interface. It was acquired by Cisco in a $28 billion deal. While Splunk is a powerful platform, it might not suit your needs. In this post, we discuss 11 top Splunk alternatives that you can consider. Splunk provides a wide range of tools for analyzing and visualizing your data fast and at scale.

Centralized Log Management: Unlocking Efficiency and Security

Monitoring all of your organization’s logs can be challenging particularly when these logs are generated by various systems, applications, and devices, often in a variety of different formats. As well as this, the sheer amount of logs produced can be overwhelming, sifting through vast amounts of log data to find relevant information becomes time-consuming and inefficient. This highlights the need for a centralized log management that can alleviate these difficulties.

Redis is No Longer Open Source. Is Valkey the Successor?

Redis is no longer open source. In March 2024 the project was relicensed, leaving its vast community confused. But the community did not give up, and started work to fork Redis to keep it open. On my recent OpenObservabilty Talks episode, I delved into Valkey, a prominent fork of Redis.