IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Graylog launches new cyber security solution to address legacy issues

Graylog Security packages SIEM, UEBA, and anomaly detection into one comprehensive cyber security platform

A robotic hand holding a lock

Centralized log management solution provider Graylog has announced its new security solution.

Dubbed Graylog Security, the new service addresses legacy security information and event management (SIEM) challenges.

In addition to over 50 security scenarios built upon MITRE ATT&CK and Intelligence Community standards, Graylog Security includes machine learning-powered anomaly detection and user entity behavior analytics (UEBA) capabilities.

“Too often, security analysts struggle with SIEM and log management solutions that are complex, slow, noisy, rigid, unscalable, and expensive. Graylog Security overcomes these long-time challenges and provides the right path for security success,” said Andy Grolnick, Graylog CEO.

According to the firm, Graylog Security’s UEBA/Anomaly Detection features can reduce false-positive security alerts by over 90%.

The platform’s machine learning engine self-trains after just seven days of historical data, offering businesses greater protection against credential and insider threats, among other types of cyber attacks.

“With its ease of use, speed, and proactive security that scales up and down, and built-in expertise that eliminates the need and cost of hiring a Ph.D. Data Scientist, Graylog Security is the ideal solution for those new to SIEM or those frustrated by their current SIEM offerings,” added Graylog.

Additionally, Graylog Security’s risk models automatically identify metrics based on an organization's priorities, ensuring the most critical alerts are addressed first.

With its user-friendly investigation capabilities and lightning-fast search engine, Graylog allows security teams to ascertain the cause of security threats and eliminate them promptly and efficiently.

Integration with Security Orchestration, Automation, and Response (SOAR) platforms are also supported. Finally, Graylog's new cyber security solution can also be accessed via its partner network.

Featured Resources

Four strategies for building a hybrid workplace that works

All indications are that the future of work is hybrid, if it's not here already

Free webinar

The digital marketer’s guide to contextual insights and trends

How to use contextual intelligence to uncover new insights and inform strategies

Free Download

Ransomware and Microsoft 365 for business

What you need to know about reducing ransomware risk

Free Download

Building a modern strategy for analytics and machine learning success

Turning into business value

Free Download

Recommended

The Total Economic Impact™ of Apple Mac in Enterprise: M1 update
Whitepaper

The Total Economic Impact™ of Apple Mac in Enterprise: M1 update

12 May 2022
Dell Technologies World 2022: Dell unveils fastest storage architecture in company history
Server & storage

Dell Technologies World 2022: Dell unveils fastest storage architecture in company history

4 May 2022
Dell Technologies World 2022: Dell unveils security offerings for major cloud providers
public cloud

Dell Technologies World 2022: Dell unveils security offerings for major cloud providers

3 May 2022
How do you become an ethical hacker?
ethical hacking

How do you become an ethical hacker?

29 Apr 2022

Most Popular

Windows Server admins say latest Patch Tuesday broke authentication policies
Server & storage

Windows Server admins say latest Patch Tuesday broke authentication policies

12 May 2022
Russian hackers declare war on 10 countries after failed Eurovision DDoS attack
hacking

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack

16 May 2022
IT admin deletes company’s databases and is jailed for seven years
Policy & legislation

IT admin deletes company’s databases and is jailed for seven years

16 May 2022