ContactSupportPartner Portal

The Graylog Blog

Thought Leadership

Planning Your Log Collection

September 10, 2020

Whether you are planning to use Graylog for security and threat hunting, IT Operations analysis and reporting, or any other use case, getting your logs into Graylog is essential. The process of log collection is sometimes a daunting task, especially if you are planning to collect massive amounts of data. But if you take a minute to answer some key questions before you begin, you can transform the log collection task from daunting to smooth sailing. 

The Importance of Log Monitoring in Anomalous Behavior Analytics

August 12, 2020

What role does log monitoring have in intrusion detection and prevention and how does it work together with behavioral analytics?

Using Event Logs To Tighten Up Security

August 6, 2020

A huge volume of our personal and financial data depends on software code and databases. All of this information is stored in event logs, which is why having a dedicated log management tool is so important to IT security.

Cyber Security: Understanding the 5 Phases of Intrusion

July 26, 2020

Here at Graylog, we have recently had an increase in conversations with security teams from leading companies. We want to share our key findings with the Graylog community. In this blog post, we are going to review the 5 phases of intrusion and how to best combat attackers that are trying to infiltrate your networks and computer systems.

Aggregating, Managing and Centralizing Docker Container Logs With Graylog

July 13, 2020

Tools like Graylog are required for log management, aggregation, analysis, and monitoring in environments that make intensive use of Docker containers and Orchestration platforms.

How to Choose the Right Log Analysis Tool for Your Enterprise

May 28, 2020

Log management tools are a key element in any enterprise, but it’s hard to find the one that is responsive, scalable, and flexible enough for your specific ecosystem. Among the many log tools out there, how do you choose the right one for your business?

Server Log Files in a Nutshell

May 15, 2020

Where do server requests come from and why? You can find this information and more in server log files.

Strengthening cybersecurity with log forensic analysis

April 20, 2020

Forensic analysis is a highly reliable approache to enforce a strong cybersecurity posture, and can be made even more scientific when coupled with wise log management.

Cyber Security Mega Breaches: Best Practices & Log Management

February 14, 2020

Nick Carstensen of Graylog Outlines Lessons Learned from Recent Headline-Makers

Making data-driven decisions with log management software

February 11, 2020

Data-driven decisions certainly are more reliable than those based upon mere instinct, and logs are a fantastic source of information to fuel a company's business intelligence strategies.

Turning Unstructured Data Into Structured Data With Log Management Tools

February 5, 2020

What makes data structured or unstructured and how does that affect your logging efforts and information gain?

Improve Your Logging Efforts by Leveraging Your Search History

January 29, 2020

In this article, we will discuss some ways to get the best out of your saved searches and to speed up the search process.

Enhancing AWS security with Graylog centralized logging

December 27, 2019

Getting AWS logs into a SIEM or centralized log management platform such as Graylog is key to have proactive monitoring and alerting.

Improving IoT security with log management

December 6, 2019

We know we can strengthen IoT security with a wise log management strategy. But how can we leverage these event logs to improve the cybersecurity of these often extremely vulnerable access points to our systems?

Troubleshooting with Log Management - Best Practices

December 3, 2019

Troubleshooting is centered on first identifying and then rectifying problems within the system. Since logs record all kinds of event data, proper log management is a crucial step to figuring out exactly what went wrong - as well as when and how.

What Is Log Management? A Complete Logging Guide

November 29, 2019

In this log management guide, we will talk about the benefits of using log management tools to improve security, troubleshoot issues, and monitor your system as well as cover all the aspects of log collection.

Preventing and mitigating data loss with Graylog

November 26, 2019

Log management tools such as Graylog can enhance your incident response and management strategies, and help you mitigate the damage when a data loss or breach occur in your database.

Understanding Log Management: Issues and Challenges

November 15, 2019

Log messages – also known as event logs, audit records, and audit trails – are events as they pertain to computing. Let’s explore all the biggest log management challenges of modern IT, and the solutions for these problems.

Business Intelligence and Log management – Opportunities and challenges

November 11, 2019

Business intelligence (BI) is all about making sense of huge amounts of data to extract meaningful and actionable insights out of it. Log management tools such as Graylog are the perfect solution to streamline data collection and analysis.

The importance of event correlation techniques in SIEM

October 22, 2019

Event correlation tools are a fundamental instrument in your security information and event management (SIEM) toolbox to detect threats from all sources in real time.

Threat Intelligence And Log Management: Security Through Automation

October 10, 2019

A well-integrated and fully-automated threat intelligence requires a proper centralized log management tool to attain a strong cybersecurity posture.

Audit Log: Feature Guide for Security and Compliance

September 10, 2019

Audit Log: Feature Guide for Security and Compliance

10 Things To Look For In an MSSP

September 4, 2019

There are several must-have capabilities to look for in a Managed Security Service Provider (MSSP), and these are 10 of the most essential ones.

What is IT Operations Analytics (ITOA)?

August 29, 2019

IT Operations Analytics (ITOA) is a vital asset to extract those valuable insights buried in piles of highly articulated data, and a powerful asset to sift through all the complexities of the Big Data.

ITOps vs. DevOps: What Is the Difference?

June 5, 2019

ITOps vs. DevOps: where does one end and the other begin? What does each role encompass and how can you tell the difference between them?

How Big Data and Log Management Work Hand in Hand

May 3, 2019

Become the master of Big Data with the right log management tools to help you quickly get your answers.

Reporting Up: Recommendations for Log Analysis

March 25, 2019

This post covers useful categories of information to monitor and report that indicate potential security issues.

3 Steps to Structuring Logs Effectively

February 25, 2019

Often, logs from different sources label data fields differently and/or provide data that’s completely unstructured. In order to analyze logs efficiently, they must be structured effectively.

What Are the Benefits of Monitoring Event Logs?

January 31, 2019

By monitoring event logs, you can gain deeper insight into system metrics, localize process bottlenecks, and detect security vulnerabilities.

How Can the Right Log Aggregator Help Your Enterprise?

January 28, 2019

The right log aggregation tools can go a long way towards maintaining and improving an existing system easily and efficiently.

The Log Viewer – Your Window into Log Management

January 24, 2019

An immeasurable amount of data, in raw, unfiltered form, exists all around us. For most of us, to be able to properly categorize and “read” that data, we first must convert it into a format that we can understand – which is where the log viewer comes in.

E-Commerce and Log Management

January 21, 2019

Learn how log management helps you review and analyze customer behavior and security issues on your e-commerce website.

Next-Level Threat Hunting: Shift Your SIEM from Reactive to Proactive

January 18, 2019

Shift your SIEM from reactive to proactive to start leveling up your threat hunting capabilities.

Log File Parsing

January 17, 2019

Learn the difference between structured and unstructured logs, the basics of the JSON log format, what kind of information you can get when you parse log files, and which tools and utilities to use to perform log file parsing.

Centralized Logging – Knowing When Less is More

January 15, 2019

Centralized logging is critical to get the most out of your logs, and filter for only the most useful and interesting data because sometimes less is just more.

Why Should You Bother With Information Technology Operations Analytics?

January 6, 2019

Your organization’s IT system is a complex network of intercommunicating devices that can provide you with an abundance of useful data - if you apply the right practices to gather and filter it. See how ITOA can help.

Meeting Compliance Regulations with SIEM and Logging

December 18, 2018

Health, financial, and educational organizations often have standards and regulations that must be followed. See how SIEM and logging can help you gain compliance.

How to Read Log Files on Windows, Mac, and Linux

December 13, 2018

This post focuses on log files created by the three main operating systems--Windows, Mac, and Linux, and the main ways to access and read log files for each OS.

Log Analysis and the Challenge of Processing Big Data

December 11, 2018

Modern enterprises generate an immense volume of data, and Big Data increases the complexity with its high variety and velocity. But a robust log management solution can help you filter out the useful information in that vast pool.

Selecting SIEM Tools - Questions to Consider

December 4, 2018

Does your organization really need a SIEM tool? Read on for questions to ask when selecting this essential solution for your environment.

Top Use Cases for Log Analysis

November 29, 2018

There is a wide scope of use cases for log analysis - from tackling security and performance issues head-on to enhancing the quality of your services. This post discusses these use cases in more detail.

Must-Have Features for Your Log Management Software

November 21, 2018

With so many choices available to us today, knowing what you need in your log management software can be difficult. Here are some tips on what features you should look for.

Selling Stakeholders on Automated Threat Response

November 20, 2018

With automated blocking, analysts can focus on higher value activities than responding to obvious security threats that can be safely handled with an automated response.

SIEM, Simplified

November 19, 2018

Do you need better insight into the overall state of your network security? Take a step back and look through the larger lens of the SIEM solution.

Why is Log Management Important?

November 15, 2018

Today, every important action that occur on our computers, mobile phones, and tablets is logged somewhere, so employing a proper log management solution is now more crucial than ever before.

Improving the Signal-to-Noise Ratio in Threat Detection

November 8, 2018

It’s unrealistic and cost-prohibitive for analysts to spot every threat. To avoid becoming a statistic, improve your threat intelligence signal-to-noise ratio to ensure real threats get the most attention.

Using Trend Analysis for Better Insights

June 4, 2018

A centralized repository of logs generated by your devices and applications stores a wealth of data. Trend analysis of that data gives you rich insight into activity in your environment.

The Power of Centralized Logging

May 14, 2018

Log files give you information about your IT environment. Having those logs centralized is essential to understanding your whole environment.

Talk to Us (Berlin Edition) - OSDC and Open Source Camp

April 26, 2018

Join us for OSDC and Open Source Camp in Berlin 12-14 June 2018!

The Value of Threat Intelligence Automation

March 22, 2018

The news is full of stories about the talent shortage in IT, especially in IT security. This shortage has created pressure on organizations to grow IT operations and to do that securely, all while having too few staff.

The Data Explosion and its Effect on Security

March 20, 2018

The shift to digital business is driving a massive expansion in the volume of data that organizations produce, use, and store. It is also accelerating the velocity of data—that is, the data is changing more rapidly than ever before.

Gameforge Uses Graylog to Stay Ahead of Application Performance Issues and Keep Gamers Happy

December 14, 2015

After reading some of our case studies, Lead Windows System Administrator at Gameforge, Felix Oechsler, felt inspired to share his story of Graylog’s evolution at Gameforge and got in touch with us last month.

How a Healthcare Provider Automates IT Operations Management

September 9, 2015

Ever wonder how others in the wild are using Graylog? We’ve got another featured Graylog user story for you!

How a Marketing Intelligence Company Uses Log Intelligence

July 23, 2015

One of the cool things about working here at Graylog is learning how Graylog is being used by the community. We recently spoke with Wiland, a U.S. company that’s been working with large data sets for a long time.

Ready to get started?

Get Graylog
Contact Sales
Contact Sales