Log ingestion to Splunk with syslog-ng

Presented by

Istvan Molnar, Richard Hosgood

About this talk

Splunk is a popular security event search and analysis platform. Many enterprises use syslog-ng to improve the performance and reduce the data load of their Splunk deployment. In a survey of Balabit customers, we found that: - Half of organizations who send logs to Splunk reduced troubleshooting/forensics time by more than 50% by using syslog-ng - Organizations using syslog-ng significantly reduced their Splunk data load by filtering out the irrelevant logs Join our webinar to learn the benefits of using syslog-ng with Splunk.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (30)
Subscribers (2264)
syslog-ng delivers log data critical to understanding what is happening in your IT environment. Whether it's user activity, performance metrics, Windows Event logs, network traffic or any other type of log data, syslog-ng can collect, process and centralize it in real time, and forward it to your analytics tool. You can remove data silos and gain full-stack visibility of your IT environment. With syslog-ng, you can build a one-stop log data shop, find the logs you need in seconds and greatly enhance your SIEM efficiency. For more information, visit syslog-ng.com About One Identity One Identity helps organizations optimize identity and access management. For more information, visit http://www.oneidentity.com. Short Copyright & Trademark: © 2018 One Identity LLC. ALL RIGHTS RESERVED. One Identity’s privacy policy: https://www.oneidentity.com/legal/privacy.aspx To unsubscribe: https://www.oneidentity.com/unsubscribe