Houston, TX, USA
Jun 7, 2022   |  By Jeff Darrington
Cyber resiliency is the new norm in cybersecurity. Nothing can be 100% secure, and you’re looking for a cost-effective solution to enhance your security posture. At the same time, the rapidly expanding cybersecurity technology market makes it hard to find something that best fits your needs. Most people looking at Security Information and Event Management (SIEM) platforms want a tool that gives them high fidelity alerts to prevent their security analysts from drowning in false positives.
Jun 1, 2022   |  By Jeff Darrington
It’s been a really long few years in IT. You’ve been working nearly ‘round the clock. First, it was “get everyone remote and productive!” Then it was, “make sure everything is secured!” Now, it’s “we need to document everything with all the new security and privacy compliance requirements!” It’s easy to feel like you’re stuck in a perpetual hamster wheel, running continuously and going nowhere.
Jun 1, 2022   |  By Jeff Darrington
You’re reading the handwriting on the wall. Your company expanded its cloud infrastructure over the last few years, adding more and more Software-as-a-Service (SaaS) applications to its stack in response to remote work. Like 86% of other companies, you expect that this will continue at the same or an accelerated pace. In response to these IT changes, new laws and industry standards expect you to move toward a zero trust architecture.
May 25, 2022   |  By Alexis Horn
Did you hear the news? Graylog is on a mission to help make your IT environment and data more efficient and secure by making it super easy to uncover the answers stored in your machine data. At Graylog, coming up with solutions to problems faced by IT and Security professionals is what drives us. Our teams are always working on ways to add meaningful functionality that increases productivity so you can focus your resources on the innovation and core competencies that you’re known for.
May 10, 2022   |  By Jeff Darrington
It’s 3pm on a Wednesday, and you’re really just done with the week already. You hear that “ping” from your Slack and know that you set notifications for direct messages only, which means, ugh, you have to pay attention to this one. It’s your boss, and she’s telling you to check your email. Then you see it, the dreaded audit documentation request. This will take you the rest of today and most of tomorrow.
Apr 26, 2022   |  By The Graylog Team
When security analysts choose technology, they approach the process like a mechanic looking to purchase a car. They want to look under the hood and see how the product works. They need to evaluate the product as a technologist. On the other hand, the c-suite has different evaluation criteria. Senior leadership approaches the process like a consumer buying a car.
Apr 25, 2022   |  By Jeff Darrington
The phone rings. Your email pings. Your marketing team just told you about a flood of messages on social media and through live chat that there’s a service outage. You thought your Monday morning would be calm and relaxed since people are just returning from the weekend. How do you start researching all of these incoming tickets? How do you know which ones to handle first? Is this just a hardware failure, or are you about to embark on a security incident investigation like Log4j?
Apr 19, 2022   |  By Jeff Darrington
Cybersecurity can often seem intimidating for IT teams. After all, things like “threat hunting,” “red teaming,” and “blue teaming” are not used in IT operations. On the other hand, just because these words are terms of art doesn’t mean that they’re activities you don’t do already. You’re probably already using log data as part of your IT operations incident response.
Apr 13, 2022   |  By Jeff Darrington
As an IT operations manager, you spend a lot of your time mitigating service outages and service level risks. You worked diligently to get the right people, products, processes, and partners in place to meet your goals. You managed to ensure continued uptime. You’ve reduced the number of tickets and the cost per ticket. And for your efforts, you’re rewarded with managing your company’s cybersecurity program. The problem? You’re not a security specialist.
Apr 7, 2022   |  By Graylog Security Team
With the rising tide of data breach awareness, your senior leadership is asking you to mitigate cybersecurity risk with security analytics. You’ve built up the use cases and started researching different platforms. Then, you realized: you’re not sure you have the budget. The typical security analytics platforms come with upfront technology costs as well as the “hidden fees” associated with training your team members. You know you need to use analytics to help mitigate risk.
May 25, 2022   |  By Graylog
Jeff Darrington is back with a tour of the latest Graylog version.
May 25, 2022   |  By Graylog
Download Graylog Graylog on Social Media
May 17, 2022   |  By Graylog
In this video senior technical marketing manager, Jeff Darrington, takes you through logging call detail records.
Feb 8, 2022   |  By Graylog
In today's video Jeff Darrington shows you how to upgrade Graylog from V3 to V4.2. Download Graylog Graylog on Social Media Graylog
Jan 21, 2022   |  By Graylog
In today's video senior solutions engineer, Simon Huber, explains how Graylog is helping NHS Trusts: achieve their cyber essentials plus certification and meet their DSPT obligations.
Jan 13, 2022   |  By Graylog
In today's video Jeff Darrington takes you through the new Illuminate features as well as showing you how to upgrade to the newest version (V2).
Dec 15, 2021   |  By Graylog
Graylog experts Abe Abernethy and Jeff Darrington show you how to find the Log4j or Log4Shell with Graylog and integration with GreyNoise. #logmanagement #logmanagementdoneright Download Graylog Graylog on Social Media Graylog
Dec 14, 2021   |  By Graylog
Today Graylog Solution engineer, Simon Huber. Talks you through installing the process of installing a forwarder in the on premise environment.
Dec 6, 2021   |  By Graylog
Jeff is here once again, this time he is going through the new Graylog 4.2 features.
Sep 23, 2021   |  By Graylog
In this video Jeff Darrington gives you a tour of our awesome Graylog Community. The community is a great place to get your Graylog questions answered.
Jan 18, 2019   |  By Graylog
When it comes to security data enrichment, it's helpful to think beyond threat intelligence. This white paper explores viable standard and advanced third-party intelligence enrichment sources that are often overlooked.
Jan 1, 2019   |  By Graylog
In this guide, what to consider when selecting a source of threat intelligence and how to make threat intelligence work for your organization.
Jan 1, 2019   |  By Graylog
When alerts go unheeded or don't deliver next steps on how to mitigate threats, SIEM can become an expensive and ineffective tool.
Dec 1, 2018   |  By Graylog
This paper examines the critical criteria to consider when evaluating tools for managing your data. There are compelling reasons why Graylog is the best choice for log management and analysis.
Dec 1, 2018   |  By Graylog
The previous data protection directive passed long before the Internet became the primary marketplace for businesses. In light of recent data and privacy issues, consumers demand higher standards for more security.

Graylog is a leading centralized log management solution built to open standards for capturing, storing, and enabling real-time analysis of terabytes of machine data. We deliver a better user experience by making analysis ridiculously fast and efficient using a more cost-effective and flexible architecture. Thousands of IT professionals rely on Graylog's scalability, comprehensive access to complete data, and exceptional user experience to solve security, compliance, operational, and DevOps issues every day.

Purpose-built for modern log analytics, Graylog removes complexity from data exploration, compliance audits, and threat hunting so you can find meaning in data more easily and take action faster.