ContactSupportPartner Portal

The Graylog Blog

Sec Ops

Using Event Logs To Tighten Up Security

August 6, 2020

A huge volume of our personal and financial data depends on software code and databases. All of this information is stored in event logs, which is why having a dedicated log management tool is so important to IT security.

The Importance of Historical Log Data

May 21, 2020

Centralized log management brings valuable information to one place. See how Graylog helps you use historical data to get more concrete insights.

Strengthening cybersecurity with log forensic analysis

April 20, 2020

Forensic analysis is a highly reliable approache to enforce a strong cybersecurity posture, and can be made even more scientific when coupled with wise log management.

Improving IoT security with log management

December 6, 2019

We know we can strengthen IoT security with a wise log management strategy. But how can we leverage these event logs to improve the cybersecurity of these often extremely vulnerable access points to our systems?

Reporting Up: Recommendations for Log Analysis

March 25, 2019

This post covers useful categories of information to monitor and report that indicate potential security issues.

How Can the Right Log Aggregator Help Your Enterprise?

January 28, 2019

The right log aggregation tools can go a long way towards maintaining and improving an existing system easily and efficiently.

Top Use Cases for Log Analysis

November 29, 2018

There is a wide scope of use cases for log analysis - from tackling security and performance issues head-on to enhancing the quality of your services. This post discusses these use cases in more detail.

Why is Log Management Important?

November 15, 2018

Today, every important action that occur on our computers, mobile phones, and tablets is logged somewhere, so employing a proper log management solution is now more crucial than ever before.

Investigating the RCE attack that knocked out 900,000 German routers on Sunday

November 28, 2016

900,000 Deutsche Telekom customers recently suffered repetitive network outages. Could this be a mass-scanning attack similar to how the Mirai botnet was formed?

Ready to get started?

Get Graylog
Contact Sales
Contact Sales