István Molnár, Prooduct Marketing Manager and James Bonamico, presales- engineer.
Hadoop is one of the most popular MapReduce solutions. Many organizations choose Hadoop as their big data store. syslog-ng Store Box allows seamless integration with Hadoop Distributed File System (HDFS), providing high performance log collection, distribution and pre processing.
In our upcoming webinar, we will demonstrate how to directly stream any text-based log into HDFS while keeping a high performance rate using syslog-ng Store Box.
Parsing a specific log message for one specific use case is usually simple and the tools associated with it are widely understood.
Parsing a broad set of messages for a broad set of use cases is much more complicated. Adding in performance requirements of tens or hundreds of thousands of messages per second only makes things even more difficult to accomplish.
In our upcoming webinar the creator of syslog-ng, Balázs Scheidler, will showcase how to address these challenges with the latest syslog-ng Premium Edition 7.0.9.
The webinar will focus on:
- Taking raw system logs and turning them into more useful and structured logs.
- Retaining performance and turning the end result into dashboards for reliable log analysis and incident response.
Our webinar focuses on how to fine tune syslog-ng for peak performance.
The session will touch on topics such as:
- Do's and don'ts when setting up and running syslog-ng
- How to tweak syslog-ng to manage higher log volumes
- Tips and tricks on optimizing your logging infrastructure
- Troubleshooting best practices
Balabit, a One Identity business,will present some shocking research statistics and instructive breach stories involving the misuse of privileged credentials.
Balabit’s recent global research showed that 4 in 5 companies were hit by a breach in 2017. In this kind of landscape, with both cyber-attacks and privileged users proliferating simultaneously – and with the GDPR re-framing our relationship with data security – now’s the time for IT teams to get better control of their networks.
In our 45-minute webinar session, you’ll hear about our key research findings and recommendations to reduce your risks related to privileged accounts. The webinar will be held by Csaba Krasznay, PhD., CISSP,
Security Evangelist and Program Director of Cybersecurity Academy at the National University of Public Service in Hungary.
Since the GDPR is just around the corner, Balabit, a One Identity business, is holding a webinar session for facing difficulties fine-tuning their log management infrastructure to become compliant.
The GDPR mandates that Personal Data should be secured at all times, stored in an encrypted format, and only available to authorized personnel. As log messages can contain personal data they fall under the scope of the regulation.
In our 30 minute webinar session, you can find out how to make your logging infrastructure GDPR compliant with the use of syslog-ng.
As GDPR is coming into force on the 25th of May, Balabit, a One Identity business, is launching a webinar session for both existing customers and to organizations facing difficulties in terms of managing privileged user access to personal data storages units.
When it comes to managing privileged access and users there is more to it than preventing unauthorized access to Personal Data. Compliance to the GDPR is heavily dependent on monitoring workflows and ensuring that all processes align with the requirements.
Join us on our 30 minute webinar session where you can find out how to manage privileged access and operations to ensure GDPR compliance with the help of Balabit's Privileged Session Management.
With syslog-ng Premium Edition, you can collect Windows event logs without installing any third party application on your Windows-based computer.
The benefits are obvious:
- You don’t need to install any additional application (reducing administrative overhead and possible security risk).
You can manage the subscription from Windows Group Policy (permission, certificates, destination).
- The Windows Event Collector (WEC) acts as a log collector and forwarder tool for the Microsoft Windows platform. Unlike the syslog-ng Agent for Windows, WEC is a standalone tool that does not require installing on the Windows-based host itself. This can be an advantage when your organization's policies restrict or do not allow the installation of third-party tools.
Splunk is a popular security event search and analysis platform. Many enterprises use syslog-ng to improve the performance and reduce the data load of their Splunk deployment. In a survey of Balabit customers, we found that:
- Half of organizations who send logs to Splunk reduced troubleshooting/forensics time by more than 50% by using syslog-ng
- Organizations using syslog-ng significantly reduced their Splunk data load by filtering out the irrelevant logs
Join our webinar to learn the benefits of using syslog-ng with Splunk.
Many big data projects run into the 80/20 rule. 80% of resources is spent getting data into their analytic tools and only 20% on analyzing the data. Syslog-ng functions as an universal log ingestion tool which can deliver data from a wide variety of sources to Hadoop, Elasticsearch, MongoDB, and Kafka as well as many others.
Cyber attackers use privileged identity theft, the compromise of credentials to privileged accounts, to steal massive amounts of data. To protect themselves, organizations need to understand the threat and how to implement the right security measures.
From this 55-minutes on-demand webinar session you will learn about the methods used to compromise privileged accounts, why hackers target privileged accounts, why current security measures fail, and what steps you can take to stop these threats.
Following an incident, the simple question “Who did what?” is one of the most critical, yet most difficult, questions to answer.
From this 52-minutes on-demand webinar session, you will learn incident investigation best practices. We present a real-life incident investigation scenario and show how advanced privileged access management tools can help you in the forensics process related to privileged account misuse.
About syslog-ng: We help you get log management and IAM right.
You’ve got a job to do. And that job involves helping your organization achieve its mission and deliver on its promises securely and efficiently. At One Identity, our job — our mission — is to help you succeed in yours. That’s why we offer syslog-ng as well as a comprehensive family of identity and access management (IAM) solutions designed to solve today’s challenges, and address tomorrow’s as they arise. We help you get log management and IAM right.
We believe that security is much more than the practice of denial and restriction. That’s why One Identity’s design and integration philosophy is that our solutions must add agility and efficiency to an organization – regardless of size or market – as well as secure its digital assets.
One Identity now delivers log management as part of its acquisition of Balabit, who has been leading the log management market since 1998. In addition One Identity offers identity governance, access management, and privileged account management solutions that facilitate and secure your digital transformation. Let us help you get log management and IAM right.