Skip to content

Case Study: How Kaizen Gaming Cut Log Latency 10x | See Full Story >>

Graylog logo blue
  • Solutions
    • Graylog Security
    • Graylog Enterprise
    • Graylog Open
    • Graylog API Security
    • Graylog Illuminate
    • Graylog Cloud

    Graylog Security

    Graylog Enterprise

    Graylog Open

    Graylog API Security

    Free Tools
    Open vs. Paid
    Features Deep Dive
    Use Cases
  • Learn
    • About
    • Resource Library
    • Events
    • Academy
    • Blog

    About Graylog

    Resource Library

    Events

    Academy

    Blog

  • Support
    • Customer Support
    • Documentation
    • Open Community

    Customer Support

    Cloud Platform

    Documentation

    Open Community

    Pro Services

  • Pricing
  • Why Graylog
Graylog logo blue
Contact Us
See Demo
Graylog logo blue
  • Solutions
    • Graylog Security
    • Graylog Enterprise
    • Graylog Open
    • Graylog API Security
    • Graylog Illuminate
    • Graylog Cloud

    Graylog Security

    Graylog Enterprise

    Graylog Open

    Graylog API Security

    Free Tools
    Open vs. Paid
    Features Deep Dive
    Use Cases
  • Learn
    • About
    • Resource Library
    • Events
    • Academy
    • Blog

    About Graylog

    Resource Library

    Events

    Academy

    Blog

  • Support
    • Customer Support
    • Documentation
    • Open Community

    Customer Support

    Cloud Platform

    Documentation

    Open Community

    Pro Services

  • Pricing
  • Why Graylog
Graylog logo blue
Free Tools
See Demo
Graylog logo blue
  • Solutions
    • Graylog Security
    • Graylog Enterprise
    • Graylog Open
    • Graylog API Security
    • Graylog Illuminate
    • Graylog Cloud
  • Learn
    • About
    • Resource Library
    • Events
    • Academy
    • Blog
  • Support
    • Customer Support
    • Documentation
    • Open Community
  • Pricing
  • Why Graylog
  • Solutions
    • Graylog Security
    • Graylog Enterprise
    • Graylog Open
    • Graylog API Security
    • Graylog Illuminate
    • Graylog Cloud
  • Learn
    • About
    • Resource Library
    • Events
    • Academy
    • Blog
  • Support
    • Customer Support
    • Documentation
    • Open Community
  • Pricing
  • Why Graylog
Picture of Jeff Darrington

Jeff Darrington

Jeff Darrington is Graylog's Director, Technical Marketing. He is a long-time Graylog OS user with extensive experience in IT Operations, IT product solutions deployment in Firewalls, Networking, VOIP, Physical security Controls, and many others.
Understanding AI Compliance When Choosing AI-Enabled Solutions

Understanding AI Compliance When Choosing AI-Enabled Solutions

March 30, 2026
How to Gain Value from AI in Cybersecurity

How to Gain Value from AI in Cybersecurity

March 26, 2026
Cyber Resilience The Key to Maintaining Business Operations

Cyber Resilience: The Key to Maintaining Business Operations

March 24, 2026
The Essential Eight-The Foundation of Australian Compliance

The Essential Eight: The Foundation of Australian Compliance

March 18, 2026
The Stryker Cyberattack-Why Endpoint and Mobile Device Monitoring Matter

The Stryker Cyberattack: Why Endpoint and Mobile Device Monitoring Matter

March 13, 2026
Log Correlation for Security and Performance Monitoring

Log Correlation for Security and Performance Monitoring

March 11, 2026
Understanding the ENS Framework: A Guide to Spain’s National Security Framework

Understanding the ENS Framework: A Guide to Spain’s National Security Framework

March 6, 2026
Centralizing Docker Logs for Observability and Security

Centralizing Docker Logs for Observability and Security

March 4, 2026
What is OpenTelemetry and Why Do Organizations Use it

What is OpenTelemetry and Why Do Organizations Use it?

February 19, 2026
What is the Model Context Protocol

What is the Model Context Protocol (MCP)

February 17, 2026
Detect CVE-2025-49144 Using Sysmon Logs

Detecting Notepad++ CVE-2025-49144 Using Sysmon Logs

February 12, 2026
Anomaly Detection With Machine Learning To Improve Security

Anomaly Detection with Machine Learning to Improve Security

February 4, 2026
« Previous Page1 Page2 Page3 Page4 Page5 Page6 Page7 Page8 Page9 Page10 Page11 Page12 Page13 Page14 Page15 Next »

Products

Graylog Security
Graylog Enterprise
Graylog Open
Graylog API Security
Graylog Cloud
Graylog Illuminate
Graylog Small Business
Pricing

Features

AI
Access Control & Audit Logs
UEBA Anomaly Detection
Graylog Content: Illuminate
Data Collection
Data Enrichment
Data Management
Events & Alerts
Investigations
Reports & Dashboards
Risk Management
Scalable Architecture
Search
SOAR

LEARN

Resource Hub
Blog
Videos
Events
Community

SUPPORT

Customer Support
Documentation
Graylog Academy
Open Community

Company

About
Why Graylog
Leadership
Partners
Careers
News & Awards
Contact

[email protected]

Follow Us:

Linkedin Reddit-alien Youtube Github Facebook-f
Graylog Available in AWS Marketplace

GRAYLOG HEADQUARTERS

1301 Fannin St, Ste. 2000
Houston, TX 77002

GRAYLOG COLORADO

1919 14th Street, Suite 700, Office 18
Boulder, CO 80302

GRAYLOG UNITED KINGDOM

34-37 Liverpool Street, 7th Floor
London, EC2M 1PP
United Kingdom

GRAYLOG GERMANY GMBH

Poolstraße 21
20355 Hamburg, Germany

© 2026 Graylog, Inc. All rights reserved

Privacy Policy | Legal | Sitemap