Skip to content

Outgrown Your Free Graylog? | 6 Reasons to Upgrade | Learn more >>>

Graylog logo blue
  • Solutions
    • Graylog Security
    • Graylog Enterprise
    • Graylog Open
    • Graylog API Security
    • Graylog Illuminate
    • Graylog Cloud

    Graylog Security

    Graylog Enterprise

    Graylog Open

    Graylog API Security

    Free Tools
    Open vs. Paid
    Features Deep Dive
    Use Cases
  • Learn
    • About
    • Resource Library
    • Events
    • Academy
    • Blog

    About Graylog

    Resource Library

    Events

    Academy

    Blog

  • Support
    • Customer Support
    • Documentation
    • Open Community

    Customer Support

    Cloud Platform

    Documentation

    Open Community

    Pro Services

  • Contact Us
  • Pricing
Graylog logo blue
Free Tools
See Demo
Graylog logo blue
  • Solutions
    • Graylog Security
    • Graylog Enterprise
    • Graylog Open
    • Graylog API Security
    • Graylog Illuminate
    • Graylog Cloud

    Graylog Security

    Graylog Enterprise

    Graylog Open

    Graylog API Security

    Free Tools
    Open vs. Paid
    Features Deep Dive
    Use Cases
  • Learn
    • About
    • Resource Library
    • Events
    • Academy
    • Blog

    About Graylog

    Resource Library

    Events

    Academy

    Blog

  • Support
    • Customer Support
    • Documentation
    • Open Community

    Customer Support

    Cloud Platform

    Documentation

    Open Community

    Pro Services

  • Contact Us
  • Pricing
Graylog logo blue
Free Tools
See Demo
Picture of Jeff Darrington

Jeff Darrington

Jeff Darrington is Graylog's Director, Technical Marketing. He is a long-time Graylog OS user with extensive experience in IT Operations, IT product solutions deployment in Firewalls, Networking, VOIP, Physical security Controls, and many others.

Centralized Log Management for Security and Compliance

June 1, 2022

Centralized Log Management for Reporting Compliance to Management

May 10, 2022

Root Cause Analysis in IT: Collaborating to Improve Availability

May 10, 2022

Why Is Normalizing Log Data in a Centralized Logging Setup Important: Operations & Security

April 25, 2022

Tools for Threat Hunting and IT Service Risk Monitoring

April 19, 2022

Use Service Design in Operations Management to Enhance Security

April 13, 2022

Compliance Monitoring for ISO 27000 and ISO 27001

March 9, 2022

Using Log Management for Compliance

March 3, 2022

Monitoring Endpoint Logs for Stronger Security

January 19, 2022

Understanding business and security risk

November 17, 2021

A Study in Graylog’s Versatility

November 3, 2021

Security Analytics is a Team Sport

September 24, 2021
« Previous Page1 Page2 Page3 Page4 Page5 Page6 Page7 Page8 Page9 Page10 Page11 Next »

Products

Graylog Security
Graylog Enterprise
Graylog Open
Graylog API Security
Graylog Cloud
Graylog Illuminate
Graylog Small Business
Pricing

Features

Access Control & Audit Logs
UEBA Anomaly Detection
Graylog Content: Illuminate
Data Collection
Data Enrichment
Data Management
Events & Alerts
Investigations
Reports & Dashboards
Risk Management
Scalable Architecture
Search
SOAR

LEARN

Resource Hub
Blog
Videos
Events
Community

SUPPORT

Customer Support
Documentation
Graylog Academy
Open Community

Company

About
Leadership
Partners
Careers
News & Awards
Contact

[email protected]

Follow Us:

Linkedin Reddit-alien Youtube Github Facebook-f
Graylog Available in AWS Marketplace

GRAYLOG HEADQUARTERS

1301 Fannin St, Ste. 2000
Houston, TX 77002

GRAYLOG COLORADO

1919 14th Street, Suite 700, Office 18
Boulder, CO 80302

GRAYLOG UNITED KINGDOM

34-37 Liverpool Street, 7th Floor
London, EC2M 1PP
United Kingdom

GRAYLOG GERMANY GMBH

Poolstraße 21
20355 Hamburg, Germany

© 2025 Graylog, Inc. All rights reserved

Privacy Policy | Legal | Sitemap