Skip to content

Outgrown Your Free Graylog? | 6 Reasons to Upgrade | Learn more >>>

Graylog logo blue
  • Solutions
    • Graylog Security
    • Graylog Enterprise
    • Graylog Open
    • Graylog API Security
    • Graylog Illuminate
    • Graylog Cloud

    Graylog Security

    Graylog Enterprise

    Graylog Open

    Graylog API Security

    Free Tools
    Open vs. Paid
    Features Deep Dive
    Use Cases
  • Learn
    • About
    • Resource Library
    • Events
    • Academy
    • Blog

    About Graylog

    Resource Library

    Events

    Academy

    Blog

  • Support
    • Customer Support
    • Documentation
    • Open Community

    Customer Support

    Cloud Platform

    Documentation

    Open Community

    Pro Services

  • Contact Us
  • Pricing
Graylog logo blue
Free Tools
See Demo
Graylog logo blue
  • Solutions
    • Graylog Security
    • Graylog Enterprise
    • Graylog Open
    • Graylog API Security
    • Graylog Illuminate
    • Graylog Cloud

    Graylog Security

    Graylog Enterprise

    Graylog Open

    Graylog API Security

    Free Tools
    Open vs. Paid
    Features Deep Dive
    Use Cases
  • Learn
    • About
    • Resource Library
    • Events
    • Academy
    • Blog

    About Graylog

    Resource Library

    Events

    Academy

    Blog

  • Support
    • Customer Support
    • Documentation
    • Open Community

    Customer Support

    Cloud Platform

    Documentation

    Open Community

    Pro Services

  • Contact Us
  • Pricing
Graylog logo blue
Free Tools
See Demo
Picture of Jeff Darrington

Jeff Darrington

Jeff Darrington is Graylog's Director, Technical Marketing. He is a long-time Graylog OS user with extensive experience in IT Operations, IT product solutions deployment in Firewalls, Networking, VOIP, Physical security Controls, and many others.

What is the MITRE ATT&CK® framework?

May 9, 2024

What Is Credential Stuffing?

March 14, 2024

Bolster OT Security with Graylog

March 11, 2024

Getting Started with NGINX

February 21, 2024

Challenges with Cybersecurity Asset Identification and Management

February 12, 2024

When 200 OK Is Not OK – Unveiling the Risks of Web Responses In API Calls

February 5, 2024

Why Network Load Balancer Monitoring is Critical

January 17, 2024

Application Monitoring with a Web Application Firewall (WAF) for Network Security

January 16, 2024

Hardening Graylog – Encryptify Your Log Supply!

December 29, 2023

Using VPC Flow Logs to Monitor AWS Virtual Public Cloud

December 18, 2023

Monitoring with AWS Cloudwatch

December 5, 2023

Azure Monitoring: What it is and why you need it

November 13, 2023
« Previous Page1 Page2 Page3 Page4 Page5 Page6 Page7 Page8 Page9 Page10 Page11 Next »

Products

Graylog Security
Graylog Enterprise
Graylog Open
Graylog API Security
Graylog Cloud
Graylog Illuminate
Graylog Small Business
Pricing

Features

Access Control & Audit Logs
UEBA Anomaly Detection
Graylog Content: Illuminate
Data Collection
Data Enrichment
Data Management
Events & Alerts
Investigations
Reports & Dashboards
Risk Management
Scalable Architecture
Search
SOAR

LEARN

Resource Hub
Blog
Videos
Events
Community

SUPPORT

Customer Support
Documentation
Graylog Academy
Open Community

Company

About
Leadership
Partners
Careers
News & Awards
Contact

[email protected]

Follow Us:

Linkedin Reddit-alien Youtube Github Facebook-f
Graylog Available in AWS Marketplace

GRAYLOG HEADQUARTERS

1301 Fannin St, Ste. 2000
Houston, TX 77002

GRAYLOG COLORADO

1919 14th Street, Suite 700, Office 18
Boulder, CO 80302

GRAYLOG UNITED KINGDOM

34-37 Liverpool Street, 7th Floor
London, EC2M 1PP
United Kingdom

GRAYLOG GERMANY GMBH

Poolstraße 21
20355 Hamburg, Germany

© 2025 Graylog, Inc. All rights reserved

Privacy Policy | Legal | Sitemap