The Graylog Blog

Log Management

Centralized Log Management for Multi-Cloud Strategies

April 28, 2021

Using centralized log management for multi-cloud strategies gives you more visibility into your complex ecosystem.

Root Cause Analysis in IT: Collaborating to Improve Availability

April 21, 2021

Cloud IT stacks are more important to business operations than ever before. With Graylog, IT teams can collaborate when engaging in root cause analysis to ensure continued productivity. 

Threat Hunting with Threat Intelligence

April 6, 2021

Threat hunting that uses threat intelligence strengthens your incident response team’s ability to detect, investigate, and mitigate risk.

Monitoring Logs for Insider Threats During Turbulent Times

March 24, 2021

In these turbulent times, IT teams leverage centralized log management solutions for making decisions. As the challenges change, the way you’re monitoring logs for insider threats needs to change, too. 

How Are Dashboards and Reports Related?

March 19, 2021

Every week we get a lot of great questions through support, the community, social media, and on our weekly demo. On Friday, you can find here the most common questions and answers, tips, insights, a closer look at Graylog, interviews, etc.

VPN and Firewall Log Management

March 10, 2021

VPN and firewall log management can help detect and mitigate security risks for a hybrid workforce.

Centralized Log Management for Cloud Streamlines Root Cause Analysis

March 4, 2021

Centralized log management solutions aggregate logs, standardize formatting, and filter event logs by type to stream root cause analysis.

Centralized Log Management and Cloud Environments

January 27, 2021

A centralized log management solution for cloud environment can help manage performance, availability, security, and ultimately IT costs amongst other things. In this blog post, we look at 5 key benefits that come from using log management to manage log data in cloud environments. 

The Importance of Log Management and Cybersecurity

October 1, 2020

Struggling with the evolving cybersecurity threat landscape often means feeling one step behind cybercriminals. Interconnected cloud ecosystems expand your digital footprint and this increases the attack surface. More users, data, and devices connected to your networks mean more monitoring for cyber attacks. Detecting suspicious activity before or during the forensic investigation is how centralized log management supports cybersecurity.

Ready to get started?

Get Graylog