Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library

Graylog: Your Logs Are Talking. Are You Listening?

Truth in IT
05/09/2025
57
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data. We are here at RSAC 2025 live. We are looking at the latest and greatest cybersecurity vendors and the innovative features they're bringing to the cybersecurity space. I've got Graylog here. We're going to find out what a Graylog is because I'm sure it's not black and white, is it Seth? No, that's absolutely what we're doing is centralized log management security event information management and API security. All right. That's a that's a bundle of stuff. How does that work together. I mean some people might just do one of those things. Yeah. What we're able to do is collect logs from anything on the network and environment that generates the log. We're able to analyze those logs, look for evidence of intrusion, and then provide a workflow to be able to then be able to mitigate those threats that it's discovers with the API security product. Specifically, what we realized was that logs don't really tell the story. You know, if you're looking at your application logs, if you're looking at cloud provider logs, it didn't really help with what was happening in the API transactions. So we have a specialized tool that looks at the API request and responses to look for specific threats in that data set. Are you talking about APIs that you might offer and expose, or APIs that you use? Either or. But yeah, generally this is going to be for the applications that you're developing and the APIs that are in the endpoints that you have. What we find that a lot of a lot of environments don't even realize the API endpoints in their own environment. So we'll help with that API endpoint discovery. And then look at those transactions themselves to make sure that people aren't doing anything malicious against your APIs that you've exposed. I mean, everything comes built with API these days when you're doing that platform level coding, right? And you're trying to be useful, you're creating microservices, 10,000 microservices. Each one of them might have an API that gets really complex. Absolutely, exactly. And that's why API discovery is such a big component of that. Because if you think about it, you know, is your applications, your developers are building out your applications. What they're thinking about is how are these microservices going to talk to each other? And you might be thinking about, how are my customers or how are my partners, how are they going to develop off of these platforms? But you're not necessarily thinking about is how is a threat actor going to leverage those APIs for their own gains. And that's where we can come in and make sure that they're being used in the way that they were intended to be used. Okay. Looking at the show, one of the main themes, I'll just say it. Ai is out there. Ai is built on APIs as well. What kind of what do you kind of tell people that say like, oh, we've got not just APIs, but we've got a lot of AI projects out there that are exposing a lot of things. If your product is using AI, if your users are using AI and your SIM is using AI, we kind of have you covered. So we want to ensure that users are using AI in a responsible manner. That's something that we can help with, and we are using AI in our own product to help you get a second pair of eyes in terms of, hey, for these types of activities that we're seeing in my environment, how are these connected? Does this look malicious? What should be the next step in my investigation? We leverage AI to help you there, in order to make sure that you're comprehensively and conclusively being able to respond to the threats that are being discovered. All right. Looking at the RSA crowd, lots of people here. If you wanted to get the security crowd a single message about what Graylog is doing, particularly value proposition of having multiple parts of the puzzle brought together to do some additional value, that maybe doing those things in isolation, what would that be? You know, for Graylog, there's really two specific areas that I really like to focus on. The first is what Graylog does around our data management capabilities, being able to allow you to have a secondary data lake, that you can park data that maybe isn't being applied to your real time analytics isn't going to your dashboards, but if you drop that log, it's gone forever. So we give you a place to park. That data on the side doesn't count towards the Graylog license, but you can always fetch that if it ever does become important to you in the future. The second is our asset risk model. Instead of triaging each individual alert one at a time, taking 10 or 15 minutes to understand well, why did this alert fire? What did it fire on? We're bringing together the context of what? On a system, on a user level? What are all the activities that have targeted that system, including is that related to threat campaigns? As we think ransomware groups have campaigns that they're running, we can actually link together multiple activities from the same campaign that have targeted multiple systems grouped together at a system or at a user level. So you have all that context at one single point to now begin your investigation. And as you say, if there's smoke, there's fire. We can show you where there's actual smoke in your environment. I mean, that's great. So the Graylog is really kind of referring to that archive of, of log that's not counting against you, but you're not getting rid of it because you might have to drill back into it at some point. That's exactly right. And there's trade offs with traditional sims of, well, what data can I collect because it's going to go against my license, or what threat detections can I enable because I can have to triage those. I might overload the SOC. What we're looking to do is eliminate those trade offs with the way that we can help you collect all the data but in an appropriate, cost effective way. And I can turn on all the threat detections, but not overload my SOC, because we're going to collapse them to the assets that are at risk. I mean, that's so much better than statistically sampling or averaging or bringing things up to a bigger time interval, right? Or just even number of events that happened last hour. I love that perspective. You keep the details so you can always drill back into it. Um, if you, uh, wanted to tell someone who's thinking, oh, maybe this is something I need to go look at. Uh, obviously you have a website, but is there some place specific for the security crowd you would point them at to get started? Yeah. So on our website, what I would take a look at, of course, we could give you a personalized demo. You want to see how this product is going to interact with your types of logs with your types of use cases. And we'll be introducing a way that you can on your own trial out Graylog with real world attack data in Graylog, so you won't have to provide your own log data. You can actually see what it's going to look like, how you investigate these things all on your own without a salesperson over your shoulder. Well there's not. Salespeople aren't all bad. We talk about that. But no, I appreciate that kind of offer, because there's really a lot of people here who might just prefer to look at things before going too far. Very cautious crowd, it turns out, on stuff. Um, no. That's great. Um, what? Just looking around at RCC, what do you think is coming next? What do you think's going to happen here? You know, I think what we're seeing is with I, as you talked about before, the practical uses of AI. So we still see a lot of AI being splashed around from a marketing perspective. But as we are looking at AI, what are the true pragmatic, practical uses? And we're going to start to see the hype fall down to true application. All right. Thank you so much, Seth, for for giving us that information. Thank you very much as well. All right. Check it out. That's Graylog with an A. It's GRAY Graylog. Take care.

At RSAC 2025, Mike Matchett speaks with Seth Goldhammer of Graylog about unified log management, SIM, and API security. Graylog provides detailed threat insights through contextual asset-level risk modeling and secondary data lake storage—preserving logs without bloating the SOC. With AI-assisted investigation tools and discovery of hidden API endpoints, Graylog helps security teams reduce alert fatigue and gain actionable insights, all while maintaining visibility across modern microservice architectures.

Categories:
  • » Small World Big Data
  • » Cybersecurity Webinars
  • » Cybersecurity Webinars » Zero Trust
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • matchett
  • graylog
  • cybersecurity
  • log
  • management
  • siem
  • api
  • security
  • threat
  • detection
  • soc
  • optimization
  • microservices
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Graylog: Your Logs Are Talking. Are You Listening?

              Upcoming Webinar Calendar

              • 11/12/2025
                12:00 PM
                11/12/2025
                Zendesk Customer Spotlight [Pure Insurance]: How to Scale Employee Service from IT to HR
                https://www.truthinit.com/index.php/channel/1545/zendesk-customer-spotlight-pure-insurance-how-to-scale-employee-service-from-it-to-hr/
              • 11/12/2025
                10:00 PM
                11/12/2025
                Transforming AI Buzz into Real Business Value with Druva
                https://www.truthinit.com/index.php/channel/1555/transforming-ai-buzz-into-real-business-value-with-druva/
              • 11/13/2025
                05:00 AM
                11/13/2025
                Transforming AI Buzz into Tangible Business Value with Druva
                https://www.truthinit.com/index.php/channel/1554/transforming-ai-buzz-into-tangible-business-value-with-druva/
              • 11/13/2025
                12:30 PM
                11/13/2025
                Insights from a Certified CMMC Assessor: Sidestepping Common Assessment Pitfalls
                https://www.truthinit.com/index.php/channel/1536/insights-from-a-certified-cmmc-assessor-sidestepping-common-assessment-pitfalls/
              • 11/13/2025
                01:00 PM
                11/13/2025
                Advancements in Click Fraud Defense: Insights from LinkedIn and HUMAN for Budget and Campaign Protection
                https://www.truthinit.com/index.php/channel/1583/advancements-in-click-fraud-defense-insights-from-linkedin-and-human-for-budget-and-campaign-protection/
              • 11/13/2025
                01:00 PM
                11/13/2025
                Partner Sales Dialogue: Transform AI Trends into Tangible Business Value with Druva
                https://www.truthinit.com/index.php/channel/1556/partner-sales-dialogue-transform-ai-trends-into-tangible-business-value-with-druva/
              • 11/18/2025
                01:00 PM
                11/18/2025
                HUMAN Dialogue: Fostering Trust Amidst Agentic Commerce Dynamics
                https://www.truthinit.com/index.php/channel/1582/human-dialogue-fostering-trust-amidst-agentic-commerce-dynamics/
              • 11/18/2025
                01:00 PM
                11/18/2025
                Microsoft Advanced Group Policy Management (AGPM) End of Life: Your Practical Migration Playbook
                https://www.truthinit.com/index.php/channel/1579/microsoft-advanced-group-policy-management-agpm-end-of-life-your-practical-migration-playbook/
              • 11/20/2025
                05:00 AM
                11/20/2025
                Druva: Prove you can outsmart ransomware in this virtual cyber recovery simulation!
                https://www.truthinit.com/index.php/channel/1619/untitled-channel/
              • 11/20/2025
                11:00 AM
                11/20/2025
                Trend Micro Webinar: Smarter Decision Making via Network Intelligence
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 11/20/2025
                12:00 PM
                11/20/2025
                360View: Budget Optimization: Doing More with Less
                https://www.truthinit.com/index.php/channel/932/360view-budget-optimization-doing-more-with-less/
              • 11/20/2025
                12:00 PM
                11/20/2025
                CMMC Certification: Next Steps for Continuous Monitoring and Management
                https://www.truthinit.com/index.php/channel/1558/cmmc-certification-next-steps-for-continuous-monitoring-and-management/
              • 11/20/2025
                01:00 PM
                11/20/2025
                Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era
                https://www.truthinit.com/index.php/channel/1612/rethinking-hybrid-access-securing-users-vendors-and-infrastructure-in-the-zero-trust-era/
              • 12/04/2025
                12:00 PM
                12/04/2025
                CMMC Level 2 Assessment Insights: Expectations from an OSC and C3PAO Assessor
                https://www.truthinit.com/index.php/channel/1557/cmmc-level-2-assessment-insights-expectations-from-an-osc-and-c3pao-assessor/
              • 12/09/2025
                01:00 PM
                12/09/2025
                Energize Your Connections with Netskope and Presidio Collaboration
                https://www.truthinit.com/index.php/channel/1553/energize-your-connections-with-netskope-and-presidio-collaboration/
              • 12/10/2025
                01:00 PM
                12/10/2025
                The Next Generation of Managed Data Security Services
                https://www.truthinit.com/index.php/channel/1620/cyera-the-next-generation-of-managed-data-security-services/
              • 12/10/2025
                10:00 PM
                12/10/2025
                Enhancing Revenue Opportunities: Bridging Gaps with Druva’s Microsoft Expansion in APAC
                https://www.truthinit.com/index.php/channel/1624/enhancing-revenue-opportunities-bridging-gaps-with-druvas-microsoft-expansion-in-apac/
              • 12/11/2025
                05:00 AM
                12/11/2025
                Maximize Revenue Potential: Address Gaps with Druva’s Microsoft Expansion
                https://www.truthinit.com/index.php/channel/1625/maximize-revenue-potential-address-gaps-with-druvas-microsoft-expansion/
              • 12/11/2025
                12:00 PM
                12/11/2025
                Secureframe: Addressing the Top 5 Compliance Challenges for Startup Leaders and Solutions
                https://www.truthinit.com/index.php/channel/1526/addressing-the-top-5-compliance-challenges-for-startup-leaders-and-solutions/
              • 12/11/2025
                01:00 PM
                12/11/2025
                Enhance Revenue Streams: Address Gaps with Druva's Microsoft Expansion Solutions.
                https://www.truthinit.com/index.php/channel/1623/enhance-revenue-streams-address-gaps-with-druvas-microsoft-expansion-solutions/
              • 12/18/2025
                12:00 PM
                12/18/2025
                360View: 2026 IT Predictions & Emerging Trends
                https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/

              Upcoming Spotlight Events

              • Nov
                18

                Microsoft Advanced Group Policy Management (AGPM) End of Life: Your Practical Migration Playbook

                11/18/202501:00 PM ET
                • Nov
                  20

                  Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era

                  11/20/202501:00 PM ET
                  • Dec
                    10

                    The Next Generation of Managed Data Security Services

                    12/10/202501:00 PM ET
                    More events

                    Upcoming Industry Events

                    • Nov
                      12

                      Zendesk Customer Spotlight [Pure Insurance]: How to Scale Employee Service from IT to HR

                      11/12/202512:00 PM ET
                      • Nov
                        12

                        Transforming AI Buzz into Real Business Value with Druva

                        11/12/202510:00 PM ET
                        • Nov
                          13

                          Transforming AI Buzz into Tangible Business Value with Druva

                          11/13/202505:00 AM ET
                          More events

                          Upcoming 360 View Events

                          • Nov
                            20

                            360View: Budget Optimization: Doing More with Less

                            11/20/202512:00 PM ET
                            • Dec
                              18

                              360View: 2026 IT Predictions & Emerging Trends

                              12/18/202512:00 PM ET
                              More events

                              Recent Spotlight Events

                              • Oct
                                22

                                Cut Ticket Resolution Time in Half with Smarter IT Documentation

                                10/22/202501:00 PM ET
                                • Oct
                                  15

                                  Managing Human Risk in an AI-Driven Threat Landscape: Are Your Defenses Evolving Fast Enough?

                                  10/15/202501:00 PM ET
                                  • Sep
                                    16

                                    KnowBe4: Beyond DMARC: Closing Critical Gaps in Your Email Security Shield

                                    09/16/202501:00 PM ET
                                    More events

                                    Recent Industry Events

                                    • Oct
                                      30

                                      Rethinking Secure Access Beyond VPN and NAC for a Zero Trust Era

                                      10/30/202512:00 PM ET
                                      • Oct
                                        30

                                        Rethink secure access solutions in a zero trust landscape beyond VPN and NAC.

                                        10/30/202506:00 AM ET
                                        • Oct
                                          29

                                          Practical Strategies for Platform Engineering in the AI Era

                                          10/29/202512:00 PM ET
                                          More events
                                          Truth in IT
                                          • Sponsor
                                          • About Us
                                          • Terms of Service
                                          • Privacy Policy
                                          • Contact Us
                                          • Preference Management
                                          Desktop version
                                          Standard version