Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud

Graylog: Your Logs Are Talking. Are You Listening?

Truth in IT
05/09/2025
53
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data. We are here at RSAC 2025 live. We are looking at the latest and greatest cybersecurity vendors and the innovative features they're bringing to the cybersecurity space. I've got Graylog here. We're going to find out what a Graylog is because I'm sure it's not black and white, is it Seth? No, that's absolutely what we're doing is centralized log management security event information management and API security. All right. That's a that's a bundle of stuff. How does that work together. I mean some people might just do one of those things. Yeah. What we're able to do is collect logs from anything on the network and environment that generates the log. We're able to analyze those logs, look for evidence of intrusion, and then provide a workflow to be able to then be able to mitigate those threats that it's discovers with the API security product. Specifically, what we realized was that logs don't really tell the story. You know, if you're looking at your application logs, if you're looking at cloud provider logs, it didn't really help with what was happening in the API transactions. So we have a specialized tool that looks at the API request and responses to look for specific threats in that data set. Are you talking about APIs that you might offer and expose, or APIs that you use? Either or. But yeah, generally this is going to be for the applications that you're developing and the APIs that are in the endpoints that you have. What we find that a lot of a lot of environments don't even realize the API endpoints in their own environment. So we'll help with that API endpoint discovery. And then look at those transactions themselves to make sure that people aren't doing anything malicious against your APIs that you've exposed. I mean, everything comes built with API these days when you're doing that platform level coding, right? And you're trying to be useful, you're creating microservices, 10,000 microservices. Each one of them might have an API that gets really complex. Absolutely, exactly. And that's why API discovery is such a big component of that. Because if you think about it, you know, is your applications, your developers are building out your applications. What they're thinking about is how are these microservices going to talk to each other? And you might be thinking about, how are my customers or how are my partners, how are they going to develop off of these platforms? But you're not necessarily thinking about is how is a threat actor going to leverage those APIs for their own gains. And that's where we can come in and make sure that they're being used in the way that they were intended to be used. Okay. Looking at the show, one of the main themes, I'll just say it. Ai is out there. Ai is built on APIs as well. What kind of what do you kind of tell people that say like, oh, we've got not just APIs, but we've got a lot of AI projects out there that are exposing a lot of things. If your product is using AI, if your users are using AI and your SIM is using AI, we kind of have you covered. So we want to ensure that users are using AI in a responsible manner. That's something that we can help with, and we are using AI in our own product to help you get a second pair of eyes in terms of, hey, for these types of activities that we're seeing in my environment, how are these connected? Does this look malicious? What should be the next step in my investigation? We leverage AI to help you there, in order to make sure that you're comprehensively and conclusively being able to respond to the threats that are being discovered. All right. Looking at the RSA crowd, lots of people here. If you wanted to get the security crowd a single message about what Graylog is doing, particularly value proposition of having multiple parts of the puzzle brought together to do some additional value, that maybe doing those things in isolation, what would that be? You know, for Graylog, there's really two specific areas that I really like to focus on. The first is what Graylog does around our data management capabilities, being able to allow you to have a secondary data lake, that you can park data that maybe isn't being applied to your real time analytics isn't going to your dashboards, but if you drop that log, it's gone forever. So we give you a place to park. That data on the side doesn't count towards the Graylog license, but you can always fetch that if it ever does become important to you in the future. The second is our asset risk model. Instead of triaging each individual alert one at a time, taking 10 or 15 minutes to understand well, why did this alert fire? What did it fire on? We're bringing together the context of what? On a system, on a user level? What are all the activities that have targeted that system, including is that related to threat campaigns? As we think ransomware groups have campaigns that they're running, we can actually link together multiple activities from the same campaign that have targeted multiple systems grouped together at a system or at a user level. So you have all that context at one single point to now begin your investigation. And as you say, if there's smoke, there's fire. We can show you where there's actual smoke in your environment. I mean, that's great. So the Graylog is really kind of referring to that archive of, of log that's not counting against you, but you're not getting rid of it because you might have to drill back into it at some point. That's exactly right. And there's trade offs with traditional sims of, well, what data can I collect because it's going to go against my license, or what threat detections can I enable because I can have to triage those. I might overload the SOC. What we're looking to do is eliminate those trade offs with the way that we can help you collect all the data but in an appropriate, cost effective way. And I can turn on all the threat detections, but not overload my SOC, because we're going to collapse them to the assets that are at risk. I mean, that's so much better than statistically sampling or averaging or bringing things up to a bigger time interval, right? Or just even number of events that happened last hour. I love that perspective. You keep the details so you can always drill back into it. Um, if you, uh, wanted to tell someone who's thinking, oh, maybe this is something I need to go look at. Uh, obviously you have a website, but is there some place specific for the security crowd you would point them at to get started? Yeah. So on our website, what I would take a look at, of course, we could give you a personalized demo. You want to see how this product is going to interact with your types of logs with your types of use cases. And we'll be introducing a way that you can on your own trial out Graylog with real world attack data in Graylog, so you won't have to provide your own log data. You can actually see what it's going to look like, how you investigate these things all on your own without a salesperson over your shoulder. Well there's not. Salespeople aren't all bad. We talk about that. But no, I appreciate that kind of offer, because there's really a lot of people here who might just prefer to look at things before going too far. Very cautious crowd, it turns out, on stuff. Um, no. That's great. Um, what? Just looking around at RCC, what do you think is coming next? What do you think's going to happen here? You know, I think what we're seeing is with I, as you talked about before, the practical uses of AI. So we still see a lot of AI being splashed around from a marketing perspective. But as we are looking at AI, what are the true pragmatic, practical uses? And we're going to start to see the hype fall down to true application. All right. Thank you so much, Seth, for for giving us that information. Thank you very much as well. All right. Check it out. That's Graylog with an A. It's GRAY Graylog. Take care.

At RSAC 2025, Mike Matchett speaks with Seth Goldhammer of Graylog about unified log management, SIM, and API security. Graylog provides detailed threat insights through contextual asset-level risk modeling and secondary data lake storage—preserving logs without bloating the SOC. With AI-assisted investigation tools and discovery of hidden API endpoints, Graylog helps security teams reduce alert fatigue and gain actionable insights, all while maintaining visibility across modern microservice architectures.

Categories:
  • » Small World Big Data
  • » Cybersecurity
  • » Cybersecurity » Zero Trust
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • matchett
  • graylog
  • cybersecurity
  • log
  • management
  • siem
  • api
  • security
  • threat
  • detection
  • soc
  • optimization
  • microservices
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

            Video's comments: Graylog: Your Logs Are Talking. Are You Listening?

            Upcoming Spotlight Events

            • Aug
              13

              Resilience by Design: Reducing Data Risk, Downtime, and Regulatory Exposure

              08/13/202501:00 PM ET
              • Sep
                11

                An Executive’s Guide to Secure AI Adoption

                09/11/202501:00 PM ET
                More events

                Upcoming 360 View Events

                • Aug
                  21

                  360View: HCI, Cloud, and Virtualization: What’s Next?

                  08/21/202512:00 PM ET
                  • Sep
                    25

                    360View: Email Security & Social Engineering Defense

                    09/25/202512:00 PM ET
                    • Oct
                      23

                      360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure

                      10/23/202512:00 PM ET
                      More events

                      Upcoming Industry Events

                      • Aug
                        21

                        Risk in Real Time: Visibility Into Cloud Based Vulnerabilities

                        08/21/202511:00 AM ET
                        • Aug
                          25

                          Harnessing AI to Transform the Landscape of Data Security

                          08/25/202510:55 AM ET
                          • Aug
                            26

                            Renown Health Secures 10K Mailboxes & Stops $1M+ in Email Threats

                            08/26/202501:00 PM ET
                            More events

                            Recent Industry Events

                            • Jul
                              23

                              Enhancing API Security Testing: Identifying Vulnerabilities Ahead of Deployment

                              07/23/202501:00 PM ET
                              • Jul
                                10

                                Discover the Latest Features of Netwrix 1Secure for MSPs

                                07/10/202501:00 PM ET
                                • Jul
                                  09

                                  Building a Strong Data Security Framework with DLP and DSPM Strategies

                                  07/09/202510:55 AM ET
                                  More events

                                  Upcoming Events Calendar

                                  • 08/13/2025
                                    01:00 PM
                                    08/13/2025
                                    Resilience by Design: Reducing Data Risk, Downtime, and Regulatory Exposure
                                    https://www.truthinit.com/index.php/channel/1373/resilience-by-design-reducing-data-risk-downtime-and-regulatory-exposure/
                                  • 08/21/2025
                                    11:00 AM
                                    08/21/2025
                                    Risk in Real Time: Visibility Into Cloud Based Vulnerabilities
                                    https://www.truthinit.com/index.php/channel/1372/understanding-dynamic-risk-management-in-real-time-environments/
                                  • 08/21/2025
                                    12:00 PM
                                    08/21/2025
                                    360View: HCI, Cloud, and Virtualization: What’s Next?
                                    https://www.truthinit.com/index.php/channel/928/360view-hci-cloud-and-virtualization-whats-next/
                                  • 08/25/2025
                                    10:55 AM
                                    08/25/2025
                                    Harnessing AI to Transform the Landscape of Data Security
                                    https://www.truthinit.com/index.php/channel/1381/harnessing-ai-to-transform-the-landscape-of-data-security/
                                  • 08/26/2025
                                    10:55 AM
                                    08/26/2025
                                    Confronting AI’s Challenges: Insights into CISOs' Biggest Concerns
                                    https://www.truthinit.com/index.php/channel/1380/confronting-ai-s-challenges-insights-into-cisos-biggest-concerns/
                                  • 08/26/2025
                                    01:00 PM
                                    08/26/2025
                                    Renown Health Secures 10K Mailboxes & Stops $1M+ in Email Threats
                                    https://www.truthinit.com/index.php/channel/1404/renown-health-secures-10k-mailboxes-stops-1m-in-email-threats/
                                  • 08/27/2025
                                    10:55 AM
                                    08/27/2025
                                    Mastering Secure AI Implementation: A Comprehensive Executive Guide
                                    https://www.truthinit.com/index.php/channel/1379/mastering-secure-ai-implementation-a-comprehensive-executive-guide/
                                  • 08/28/2025
                                    10:55 AM
                                    08/28/2025
                                    A Practitioner’s Roadmap for Safeguarding AI Implementation in Organizations
                                    https://www.truthinit.com/index.php/channel/1378/a-practitioner-s-roadmap-for-safeguarding-ai-implementation-in-organizations/
                                  • 08/29/2025
                                    10:55 AM
                                    08/29/2025
                                    Ethical Frameworks and Compliance Strategies for Safe AI Implementation
                                    https://www.truthinit.com/index.php/channel/1377/ethical-frameworks-and-compliance-strategies-for-safe-ai-implementation/
                                  • 09/11/2025
                                    01:00 PM
                                    09/11/2025
                                    An Executive’s Guide to Secure AI Adoption
                                    https://www.truthinit.com/index.php/channel/1374/an-executives-guide-to-secure-ai-adoption/
                                  • 09/16/2025
                                    01:00 PM
                                    09/16/2025
                                    Beyond DMARC: Closing Critical Gaps in Your Email Security Shield
                                    https://www.truthinit.com/index.php/channel/1403/beyond-dmarc-closing-critical-gaps-in-your-email-security-shield/
                                  • 09/25/2025
                                    12:00 PM
                                    09/25/2025
                                    360View: Email Security & Social Engineering Defense
                                    https://www.truthinit.com/index.php/channel/930/360view-email-security-social-engineering-defense/
                                  • 10/23/2025
                                    12:00 PM
                                    10/23/2025
                                    360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure
                                    https://www.truthinit.com/index.php/channel/931/360view-preventing-data-exfiltration-keeping-enterprise-data-secure/
                                  • 11/20/2025
                                    12:00 PM
                                    11/20/2025
                                    360View: Budget Optimization: Doing More with Less
                                    https://www.truthinit.com/index.php/channel/932/360view-budget-optimization-doing-more-with-less/
                                  • 12/18/2025
                                    12:00 PM
                                    12/18/2025
                                    360View: 2026 IT Predictions & Emerging Trends
                                    https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/
                                  Truth in IT
                                  • Sponsor
                                  • About Us
                                  • Terms of Service
                                  • Privacy Policy
                                  • Contact Us
                                  • Preference Management
                                  Desktop version
                                  Standard version