Ferenc Sipos, Director of Sales Engineering - Log management
Even in 2019, many organizations rely on UDP to ship syslog messages from endpoints to Splunk where TCP transport is either not feasible or desirable. Scaling UDP ingestion with no message loss is far from a trivial task.
Join us for our live webcast which will showcase how you can achieve 1m+ EPS UDP ingestion with a single syslog-ng instance and single UDP listening port using no external load balancer leveraging socket level load balancing.
James Bonamico, systems engineer/syslog-ng product specialist
Watch our on-demand webcast in which James Bonamico, senior sales engineer at One Identity, shows you how to leverage Cisco’s NetFlow and Verizon Digital’s vFlow technologies to better monitor network traffic.
Learn how to collect, parse and analyze this data for better security and enhanced visibility into your network performance.
Webcast topics include:
•How to use NetFlow network traffic monitoring for availability, capacity planning and security detection
•Understand the value of vFlow, an open source, high-performance enterprise network flow collector developed by Verizon Digital
•Learn how syslog-ng PE can ingest decoded NetFlow traffic directly from vFlow.
•See how you can efficiently parse, filter, and route NetFlow traffic along with other log traffic
Craig Finnan, systems engineer/syslog-ng product specialist
Google Stackdriver is a flexible and convenient way to monitor and manage your cloud-based assets, regardless of where they are located or how they are configured. If your organization is completely in the cloud, has apps on Google Cloud or Amazon Web Services, or if you manage a hybrid environment, Stackdriver is a terrific solution.
Join this live webinar, hosted by syslog-ng’s - Craig Finnan, systems engineer and product specialist, to learn how to set up and use the new syslog-ng PE Google Stackdriver destination.
Topics discussed in the webinar include how to:
•Send on-prem log messages collected and processed by syslog-ng PE to GCP
•Browse and search syslog-ng log messages using the Stackdriver Log Viewer
•Enhance log-search capabilities by leveraging name-value pairs automatically parsed by syslog-ng
•Collect and monitor syslog-ng statistics using Stackdriver Monitoring
Ferenc Sipos, Director of Sales Engineering - Log management
Please join us to explore the various ways syslog-ng can help bridge the gap between the cloud and on-premises resources with custom integrations built using syslog-ng’s Python API.
•Fetching log messages from Azure Event Hub and feeding them to an on-premises log management/SIEM solution.
•Forwarding on-premises log data to Google Pub/Sub for cloud-based processing.
James Bonamico, Senior Engineer (syslog-ng product specialist)
We can help eliminate your struggle to reliably collect and send your log data to Splunk.
Register for our free webinar to learn how you can easily manage and scale log ingestion across your whole enterprise environment.
In this webinar we will demonstrate:
•syslog-ng Premium Edition’s high-performance Splunk HTTP Event Collector (HEC) destination
•How to batch and send messages to multiple Splunk HEC nodes
•How to eliminate the need for forwarders and external load balancers
syslog-ng can collect and centralize log data whether it's user activity, performance metrics, network traffic or any other log data.
Remove data silos and gain full-stack visibility of your IT environment - one syslog-ng server can collect more than half a million log message per second from thousands of log sources.
Attend this webinar to learn how your organization can reliably send and receive log messages via the TCP transport layer.
Never lose log data by using the new Advanced Log Transfer Protocol (ALTP), which is a proprietary transport protocol that prevents message loss – even during connection breaks.
See how syslog-ng Premium Edition leverages this new technology to communicate and manage log messages. Along with features such as flow-control and reliable disk-buffer, it is the best way to prevent log message loss.
This webinar will highlight features, including:
•Message send/receive acknowledgement
•Automatic resends of missing/lost messages
•TLS compression option
Organizations heavily invest in log analytics and event management. That is why many of them consider SPLUNK as a viable solution. Yet that is only half of the solution as analytics are only as good as the data feed into it. Centralized log management technologies enable organizations to collect and distribute log reliability while guaranteeing optimal performance for SPLUNK.
From this 60-minutes webinar session you will learn the benefits of front-ending Splunk with syslog-ng central log management solution.
István Molnár, Prooduct Marketing Manager and James Bonamico, presales- engineer.
Hadoop is one of the most popular MapReduce solutions. Many organizations choose Hadoop as their big data store. syslog-ng Store Box allows seamless integration with Hadoop Distributed File System (HDFS), providing high performance log collection, distribution and pre processing.
In our upcoming webinar, we will demonstrate how to directly stream any text-based log into HDFS while keeping a high performance rate using syslog-ng Store Box.
Parsing a specific log message for one specific use case is usually simple and the tools associated with it are widely understood.
Parsing a broad set of messages for a broad set of use cases is much more complicated. Adding in performance requirements of tens or hundreds of thousands of messages per second only makes things even more difficult to accomplish.
In our upcoming webinar the creator of syslog-ng, Balázs Scheidler, will showcase how to address these challenges with the latest syslog-ng Premium Edition 7.0.9.
The webinar will focus on:
- Taking raw system logs and turning them into more useful and structured logs.
- Retaining performance and turning the end result into dashboards for reliable log analysis and incident response.
Our webinar focuses on how to fine tune syslog-ng for peak performance.
The session will touch on topics such as:
- Do's and don'ts when setting up and running syslog-ng
- How to tweak syslog-ng to manage higher log volumes
- Tips and tricks on optimizing your logging infrastructure
- Troubleshooting best practices
Balabit, a One Identity business,will present some shocking research statistics and instructive breach stories involving the misuse of privileged credentials.
Balabit’s recent global research showed that 4 in 5 companies were hit by a breach in 2017. In this kind of landscape, with both cyber-attacks and privileged users proliferating simultaneously – and with the GDPR re-framing our relationship with data security – now’s the time for IT teams to get better control of their networks.
In our 45-minute webinar session, you’ll hear about our key research findings and recommendations to reduce your risks related to privileged accounts. The webinar will be held by Csaba Krasznay, PhD., CISSP,
Security Evangelist and Program Director of Cybersecurity Academy at the National University of Public Service in Hungary.
As GDPR is coming into force on the 25th of May, Balabit, a One Identity business, is launching a webinar session for both existing customers and to organizations facing difficulties in terms of managing privileged user access to personal data storages units.
When it comes to managing privileged access and users there is more to it than preventing unauthorized access to Personal Data. Compliance to the GDPR is heavily dependent on monitoring workflows and ensuring that all processes align with the requirements.
Join us on our 30 minute webinar session where you can find out how to manage privileged access and operations to ensure GDPR compliance with the help of Balabit's Privileged Session Management.
With syslog-ng Premium Edition, you can collect Windows event logs without installing any third party application on your Windows-based computer.
The benefits are obvious:
- You don’t need to install any additional application (reducing administrative overhead and possible security risk).
You can manage the subscription from Windows Group Policy (permission, certificates, destination).
- The Windows Event Collector (WEC) acts as a log collector and forwarder tool for the Microsoft Windows platform. Unlike the syslog-ng Agent for Windows, WEC is a standalone tool that does not require installing on the Windows-based host itself. This can be an advantage when your organization's policies restrict or do not allow the installation of third-party tools.
Splunk is a popular security event search and analysis platform. Many enterprises use syslog-ng to improve the performance and reduce the data load of their Splunk deployment. In a survey of Balabit customers, we found that:
- Half of organizations who send logs to Splunk reduced troubleshooting/forensics time by more than 50% by using syslog-ng
- Organizations using syslog-ng significantly reduced their Splunk data load by filtering out the irrelevant logs
Join our webinar to learn the benefits of using syslog-ng with Splunk.
Many big data projects run into the 80/20 rule. 80% of resources is spent getting data into their analytic tools and only 20% on analyzing the data. Syslog-ng functions as an universal log ingestion tool which can deliver data from a wide variety of sources to Hadoop, Elasticsearch, MongoDB, and Kafka as well as many others.
Streamline your log collection and enhance SIEM efficiency
syslog-ng delivers log data critical to understanding what is happening in your IT environment. Whether it's user activity, performance metrics, Windows Event logs, network traffic or any other type of log data, syslog-ng can collect, process and centralize it in real time, and forward it to your analytics tool. You can remove data silos and gain full-stack visibility of your IT environment.
With syslog-ng, you can build a one-stop log data shop, find the logs you need in seconds and greatly enhance your SIEM efficiency.