This session is a discussion on the three main strategies for SIEM optimization and the role of centralized log management within that optimization.
Use Syslog-ng to enable scaling, redundancy, and load balancing for Windows Event Forwarding
Learn how to use the Syslog-ng Azure Sentinel destination driver to ship logs directly into Sentinel via API
Some people think log collection and log management should be part of the SIEM toolkit. We beg to differ, and we have some good reasons to. Neil will introduce the concept of log management and how it completes the ecosystem around logs in an enterprise setting.
Watch this short video to hear how DT Asia found unexpected benefits from partnering with One Identity and syslog-ng, including delivering enhanced security solutions to its customers and receiving far-ranging benefits for its own business operations.
Whether it's user activity, performance metrics, network traffic or any other log data, syslog-ng can collect and centralize log data. You can remove data silos and gain full-stack visibility of your IT environment. Depending on its configuration, one syslog-ng server can collect more than half a million log message per second from thousands of log sources.
Learn more about using syslog-ng Premium Edition to efficiently feed your log data to Google Stackdriver. This video adds a little complexity to the configuration to highlight more of syslog-ng’s log management capabilities. Watch the video now.
Learn the basics of how to configure syslog-ng Premium Edition to work with Google Stackdriver. This high-level overview uses a simple configuration to show you how to collect and analyze log data, and forward it to Stackdriver. Watch the video now.