Audience
Security Analysts, SOC Managers, IT Admins, SIEM Admins, CISOs
About Graylog
Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can:
1. Decrease risk and metrics like mean time to detect (MTTD) by aligning threat detection coverage to meet your security objectives
2. Reduce TCO with native data routing and data tiering functionality
3. Reduce key metrics like mean time to respond (MTTR) by quickly resolving the alerts that matter.
Graylog Security is a robust, scalable solution that empowers analysts to detect and respond to cybersecurity threats efficiently. With integrated SOAR functionality, it automates repetitive tasks, orchestrates workflows, and accelerates incident response.
Pricing
Product Details
Graylog Frequently Asked Questions
Graylog Product Features
Log Management
SIEM
Graylog Verified User Reviews
Write a Review-
Probability You Would Recommend?1 2 3 4 5 6 7 8 9 10
"Open source project with lot of implications" Posted 2021-05-28
Pros: Once it is set up, if done correctly, it requires minimum supervision to maintain, adding different channels to receive information from is easy, since it is an open source project, there is a lot of info. the Graylog web page is a good to start checking info, if you see any problems a simple question in stack overflow might send you to the right direction
Cons: Takes a lot of time to properly set up, when an error happens there is no person that you can go to to properly guide you, you need to look for information in the web and check the one that properly fits for you.
Overall: It is a good open source project, the learning curve is quite high, but as soon as you get the hang of it, it becomes a very powerful tool.
Read More...
- Previous
- You're on page 1
- Next