Hi [[ session.user.profile.firstName ]]

One Identity

  • Date
  • Rating
  • Views
  • Log ingestion to Splunk HEC
    Log ingestion to Splunk HEC
    Balázs Scheidler, creator of syslog-ng Recorded: Nov 6 2018 42 mins
    Organizations heavily invest in log analytics and event management. That is why many of them consider SPLUNK as a viable solution. Yet that is only half of the solution as analytics are only as good as the data feed into it. Centralized log management technologies enable organizations to collect and distribute log reliability while guaranteeing optimal performance for SPLUNK.

    From this 60-minutes webinar session you will learn the benefits of front-ending Splunk with syslog-ng central log management solution.
  • High performance log streaming to HDFS with syslog-ng
    High performance log streaming to HDFS with syslog-ng
    István Molnár, Prooduct Marketing Manager and James Bonamico, presales- engineer. Recorded: Sep 25 2018 37 mins
    Hadoop is one of the most popular MapReduce solutions. Many organizations choose Hadoop as their big data store. syslog-ng Store Box allows seamless integration with Hadoop Distributed File System (HDFS), providing high performance log collection, distribution and pre processing.

    In our upcoming webinar, we will demonstrate how to directly stream any text-based log into HDFS while keeping a high performance rate using syslog-ng Store Box.
  • Logging in docker with syslog-ng
    Logging in docker with syslog-ng
    István Molnár, Product Marketing Manager and Craig Finnan, presales- engineer. Recorded: Aug 30 2018 64 mins
    Containerization, and Docker in particular, changed the way we distribute and run applications with conflicting dependencies.

    Thanks to syslog-ng, setting up a centralized log management infrastructure in Docker is as simple as issuing the “docker run” command.

    In our upcoming webinar, we will demonstrate how to set up and manage a syslog-ng Docker network.
  • Supercharge your syslog-ng parsing
    Supercharge your syslog-ng parsing
    Balázs Scheidler, the creator of syslog-ng Recorded: Jul 26 2018 34 mins
    Parsing a specific log message for one specific use case is usually simple and the tools associated with it are widely understood.

    Parsing a broad set of messages for a broad set of use cases is much more complicated. Adding in performance requirements of tens or hundreds of thousands of messages per second only makes things even more difficult to accomplish.

    In our upcoming webinar the creator of syslog-ng, Balázs Scheidler, will showcase how to address these challenges with the latest syslog-ng Premium Edition 7.0.9.

    The webinar will focus on:

    - Taking raw system logs and turning them into more useful and structured logs.

    - Retaining performance and turning the end result into dashboards for reliable log analysis and incident response.
  • How to get the most out of your syslog-ng installation
    How to get the most out of your syslog-ng installation
    Istvan Molnar, Mario Perozo Recorded: Jun 28 2018 61 mins
    Our webinar focuses on how to fine tune syslog-ng for peak performance.

    The session will touch on topics such as:

    - Do's and don'ts when setting up and running syslog-ng
    - How to tweak syslog-ng to manage higher log volumes
    - Tips and tricks on optimizing your logging infrastructure
    - Troubleshooting best practices
  • How can you regain the control of your privileged accounts?
    How can you regain the control of your privileged accounts?
    Csaba Krasznay, PhD. Recorded: Jun 13 2018 57 mins
    Balabit, a One Identity business,will present some shocking research statistics and instructive breach stories involving the misuse of privileged credentials.

    Balabit’s recent global research showed that 4 in 5 companies were hit by a breach in 2017. In this kind of landscape, with both cyber-attacks and privileged users proliferating simultaneously – and with the GDPR re-framing our relationship with data security – now’s the time for IT teams to get better control of their networks.

    In our 45-minute webinar session, you’ll hear about our key research findings and recommendations to reduce your risks related to privileged accounts. The webinar will be held by Csaba Krasznay, PhD., CISSP,
    Security Evangelist and Program Director of Cybersecurity Academy at the National University of Public Service in Hungary.
  • How can you ensure that your logging infrastructure is GDPR compliant?
    How can you ensure that your logging infrastructure is GDPR compliant?
    Istvan Molnar, John Murdoch Recorded: May 17 2018 60 mins
    Watch this on-demand webinar to learn how syslog-ng can help your organization fine tune its log management infrastructure to get GDPR compliant.
  • Managing privileged access and operations and ensuring GDPR compliance
    Managing privileged access and operations and ensuring GDPR compliance
    Istvan Molnar, Ronald Schmid Recorded: May 16 2018 46 mins
    As GDPR is coming into force on the 25th of May, Balabit, a One Identity business, is launching a webinar session for both existing customers and to organizations facing difficulties in terms of managing privileged user access to personal data storages units.

    When it comes to managing privileged access and users there is more to it than preventing unauthorized access to Personal Data. Compliance to the GDPR is heavily dependent on monitoring workflows and ensuring that all processes align with the requirements.

    Join us on our 30 minute webinar session where you can find out how to manage privileged access and operations to ensure GDPR compliance with the help of Balabit's Privileged Session Management.
  • Agentless Windows logging
    Agentless Windows logging
    Istvan Molnar, Craig Finnan Recorded: Apr 26 2018 57 mins
    With syslog-ng Premium Edition, you can collect Windows event logs without installing any third party application on your Windows-based computer.

    The benefits are obvious:

    - You don’t need to install any additional application (reducing administrative overhead and possible security risk).
    You can manage the subscription from Windows Group Policy (permission, certificates, destination).

    - The Windows Event Collector (WEC) acts as a log collector and forwarder tool for the Microsoft Windows platform. Unlike the syslog-ng Agent for Windows, WEC is a standalone tool that does not require installing on the Windows-based host itself. This can be an advantage when your organization's policies restrict or do not allow the installation of third-party tools.
  • Log ingestion to Splunk with syslog-ng
    Log ingestion to Splunk with syslog-ng
    Istvan Molnar, Richard Hosgood Recorded: Mar 20 2018 49 mins
    Splunk is a popular security event search and analysis platform. Many enterprises use syslog-ng to improve the performance and reduce the data load of their Splunk deployment. In a survey of Balabit customers, we found that:

    - Half of organizations who send logs to Splunk reduced troubleshooting/forensics time by more than 50% by using syslog-ng
    - Organizations using syslog-ng significantly reduced their Splunk data load by filtering out the irrelevant logs

    Join our webinar to learn the benefits of using syslog-ng with Splunk.

Embed in website or blog