News & Events

Getting data to Splunk

Getting data to Splunk

Getting data into Splunk can be challenging, especially when dealing with syslog, one of the most crucial data sources. Syslog can present several hard-to-solve problems, such as high volume, non-compliant messages, and the use of the unreliable UDP network protocol. One Identity’s syslog-ng Premium Edition (PE) and syslog-ng Store Box (SSB) can help manage these challenges effectively.

read more
3 steps for API monetization

3 steps for API monetization

API monetization can significantly drive business growth by curating and monetizing your APIs in a marketplace designed to simplify and enhance API adoption.

read more
RISING USB-BORNE CYBERATTACKS RAISE CONCERNS

RISING USB-BORNE CYBERATTACKS RAISE CONCERNS

Portable USB storage drives offer users a convenient means to transfer data between work and home, as well as among computers within an organization. This has proven especially valuable during the COVID-19 pandemic, which mandated remote or hybrid work setups. However, this convenience has introduced significant security challenges.

read more
Security intelligence analytics: Planning Increases ROI

Security intelligence analytics: Planning Increases ROI

It’s been a week. A long week. After the most recent Board of Directors meeting, your senior leadership tasked you with finding a security analytics solution. Over the last month, you’ve worked with leadership to develop some basic use cases to determine which solution meets your security and budget needs.

read more
Beyond Factory Reset: Elevate Your Data Security with Securaze Solutions

Beyond Factory Reset: Elevate Your Data Security with Securaze Solutions

In today’s rapidly evolving technological landscape, the lifespan of our electronic devices is becoming increasingly shorter. Upgrades are the norm, leading to a surplus of discarded devices. However, simply performing a factory reset before selling or repurposing your device might not be enough to ensure your sensitive data is fully protected. The recent cautionary tale from Canon serves as a stark reminder of the potential risks.

read more
Sending logs to Splunk using syslog-ng

Sending logs to Splunk using syslog-ng

There are many ways you can collect log messages using syslog-ng and forward them to Splunk. In this blog I collect the history of Splunk support in syslog-ng, and the advantages and disadvantages of various solutions, both open source and commercial.

read more

About Us

From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.

Contact Us

Address

21 Bukit Batok Crescent,
#02-72 WCEGA Tower,
Singapore 658065

Phone

+65 6266 2877