For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Descubre cómo Optimizar tu SIEM con syslog-ng

We are sorry, the event "Descubre cómo Optimizar tu SIEM con syslog-ng" has already expired.

You may also be interested in.

Storing logs in Elasticsearch using syslog-ng
White Paper
Storing logs in Elasticsearch using syslog-ng
Storing logs in Elasticsearch using syslog-ng
syslog-ng is a single, high-performance log collector for all of your device-, system-, and application logs, giving you the ability to greatly simplify your logging architecture.
Read White Paper
Logging in Docker using syslog-ng
White Paper
Logging in Docker using syslog-ng
Logging in Docker using syslog-ng
syslog-ng is a log management application that enables you to collect logs from multiple platforms in a central space. Whether it's user activity, performance metrics, network traffic or any other log data, syslog-ng can collect and centralize log data
Read White Paper
Log Management Essentials
White Paper
Log Management Essentials
Log Management Essentials
Most log messages traditionally come from three types: system logs of servers, network devices, and applications.
Read White Paper
Log message classification with syslog-ng
White Paper
Log message classification with syslog-ng
Log message classification with syslog-ng
Operating systems, applications, and network devices generate text messages of the events that happen to them: a user logs in, a file is created, a network connection is opened to a remote host.
Read White Paper
OTP Banka Slovenia Unifies IAM with One Identity
On Demand Webcast
OTP Banka Slovenia Unifies IAM with One Identity
Come PAM e IGA collaborano per rilevare e rispondere in tempo reale a minacce basate sulle identità?
On Demand Webcast
Come PAM e IGA collaborano per rilevare e rispondere in tempo reale a minacce basate sulle identità?
Come PAM e IGA collaborano per rilevare e rispondere in tempo reale a minacce basate sulle identità?
Come PAM e IGA collaborano per rilevare e rispondere in tempo reale a minacce basate sulle identità?
Watch Webcast
Use Case – Optimizing SIEM
Technical Brief
Use Case – Optimizing SIEM
Use Case – Optimizing SIEM
Security Information and Event Management (SIEM) solutions form the core of many organizations’ security strategy, but SIEMs can be expensive, eat up storage and get overwhelmed by the amount and number of formats of log data that they need to process.
Read Technical Brief
Emperors New Currency: Is crytocurrency actually anonymous?
On Demand Webcast
Emperors New Currency: Is crytocurrency actually anonymous?
Emperors New Currency: Is crytocurrency actually anonymous?
Emperors New Currency: Is crytocurrency actually anonymous?
Watch Webcast