Latest from syslog-ng

Boost productivity on all levels with AI

Looking to empower your employees, streamline team workflows, and elevate leadership insights? Discover how RingCentral’s AI solutions can improve productivity across personal, team, and leadership levels. Download the datasheet to explore: • Common challenges faced by employees, teams, and leaders. • Practical examples of how AI-powered tools solve these challenges. • Success stories, such as […]

Read →

Leveraging AI KPIs

New technology brings new opportunities. It also brings hype,”fear of missing out,” and disappointment. AI is proving to be no exception to this rule. So the questions that many of us are currently considering include “What is AI really?”, “Can it help us succeed?” and “Are we missing out?” Download this guide from author and […]

Read →
article

High Level Splunk Use-Case Webcast

In today’s heterogeneous environments, you collect logs from a variety of sources and forward them to multiple destinations, which often requires special purpose agents. The need to maintain a large number of logging agents creates operational complexity and costly overhead, and updating, maintaining and configuring these agents is a time-consuming activity. View this webcast to […]

Read →
article

White Paper: How to Configure Syslog-Ng™ PE to Cooperate With Splunk

Splunk is a popular search and analysis platform. Many users of Splunk also have syslog-ng™ deployed in their environments. This guideline describes scenarios in which Splunk users can benefit from syslog-ng™ Premium Edition features and offers some technical guidance to optimize the syslog-ng™ configuration. Read this guide to see five use cases, including:• Collecting logs […]

Read →

The 1m+ EPS UDP Ingestion Challenge

Even in 2019, many organizations rely on UDP to ship syslog messages from endpoints to Splunk where TCP transport is either not feasible or desirable. Scaling UDP ingestion with no message loss is far from a trivial task. Join us for our on-demand webcast which will showcase how you can achieve 1m+ EPS UDP ingestion […]

Read →
article

NIST Cybersecurity Framework

The second function within the framework entitled “Protect”, places great emphasis on managing privileged authorized user access to critical assets. In order to manage and supervise connections to critical assets, organizations commonly invest in some form of access monitoring technology. This paper describes: • How to secure critical assets from unauthorized users and access control […]

Read →
article

Optimizing SIEM

Security Information and Event Management (SIEM) solutions form the core of many organizations’ security strategy, but SIEMs can be expensive, eat up storage and get overwhelmed by the amount and number of formats of log data that they need to process. But there is a way to optimize the performance of your SIEM solution that […]

Read →
article

Upgrade to State-of-the-Art Log Management

MAKE THE MOST OF YOUR INVESTMENT Most log messages traditionally come from three types: system logs of servers, network devices, and applications. To derive actionable, valuable business information from this vast amount of raw log data, it is necessary to collect, filter, and normalize messages from various sources and store them centrally so that they […]

Read →
25,000+
Articles
500K+
Monthly Readers
300+
Sponsors
15+
Years of Insights