BlogSupportContact

Illuminate

Our expertise. Your success.

See Illuminate in action

Contact sales for Illuminate

Graylog Illuminate:
The Story
Graylog Illuminate for
Authentication
Graylog
Illuminate

Start fast with pre-built content

Authentication
  • Easily correlate authentication data across different types of data sources.
  • Gain visibility into who is trying to log into what throughout your IT environment.
Networks
  • Monitor and analyze the data, identify any malicious activity occurring within your network.
  • Isolate the source of the activity, and quickly respond to the threats.
Coming soon
Applications
  • Eliminate the manual set up necessary to detect, monitor, and analyze application issues across your IT infrastructure.
  • Visualize all of your application data in pre-built dashboards and drill-down for details and deeper insights.

Help me see my data

Interactive dashboards

Combine widgets to build customized data displays and automate the delivery of reports to your inbox.

Dynamic Lookup Tables

Perform faster research by adding WHOIS, IP Geolocation, threat intelligence, or other structured data.

Streams & Pipelines

Route log messages into categories in real time and control data processing by tying streams to your pipelines.

Scheduled Reports

Enter one or more criteria for a more comprehensive search. Easily save and share regularly run searches.

Search Templates

Enter one or more criteria for a more comprehensive search. Easily save and share regularly run searches.

Automatic alerts

Receive alerts via email, text, Slack, and more. Update alert criteria based on a dynamic list in a lookup table.

See Illuminate in action

Contact sales for Illuminate

Contact Sales