This post is also available in: Vietnamese

News & Events

syslog-ng Store Box Splunk/HEC and Sentinel destinations

syslog-ng Store Box Splunk/HEC and Sentinel destinations

The syslog-ng Store Box (SSB) appliance, built on syslog-ng Premium Edition (PE), offers a user-friendly graphical interface while retaining most of syslog-ng PE’s robust features. A key application of SSB and syslog-ng PE is enhancing the logging infrastructure for SIEM/log analysis. Notably, SSB has recently added support for log analytics destinations like Splunk HEC (HTTP Event Collector) and Microsoft Sentinel.

read more
MOST INSIDER DATA LEAKS ARE ACCIDENTAL

MOST INSIDER DATA LEAKS ARE ACCIDENTAL

Data breaches have become increasingly common today. Notably, the most newsworthy breaches are often malicious, involving either ransomware gangs or disgruntled employees seeking revenge.

read more
Crisis averted: A recap of the OpenSSH and XZ/liblzma incident

Crisis averted: A recap of the OpenSSH and XZ/liblzma incident

Recently, a new backdoor (CVE-2024-3094) was uncovered within the build system of the widely utilized xz-utils ‘liblzma’ data compression library. This backdoor is purportedly aimed at the OpenSSH server but has the capability to affect any application that interacts with ‘systemd’, utilizes ‘OpenSSL’, and is accessible over the network. The complete extent and consequences of the backdoor remain unclear pending a thorough analysis of the injected malicious binary code.

read more
Business Intelligence and Log management – Opportunities and challenges

Business Intelligence and Log management – Opportunities and challenges

Business intelligence (BI) is all about making sense of huge amounts of data to extract meaningful and actionable insights out of it. Log management tools such as Graylog, instead, are the perfect solution to streamline data collection and analysis, so it’s easy to understand how these two technologies can make sense when they’re coupled together.

read more
Data replication: What is it and what are the advantages of using it?

Data replication: What is it and what are the advantages of using it?

Data replication has moved from “nice to have” to “mainstream” for use cases such as High Availability and Disaster Recovery. At the same time, companies are discovering the need to replicate or move data for other reasons, including performance and translating transactional data into events.

read more
Getting data to Splunk

Getting data to Splunk

Getting data into Splunk can be challenging, especially when dealing with syslog, one of the most crucial data sources. Syslog can present several hard-to-solve problems, such as high volume, non-compliant messages, and the use of the unreliable UDP network protocol. One Identity’s syslog-ng Premium Edition (PE) and syslog-ng Store Box (SSB) can help manage these challenges effectively.

read more
3 steps for API monetization

3 steps for API monetization

API monetization can significantly drive business growth by curating and monetizing your APIs in a marketplace designed to simplify and enhance API adoption.

read more

About Us

From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.

Contact Us

Address

21 Bukit Batok Crescent,
#02-72 WCEGA Tower,
Singapore 658065

Phone

+65 6266 2877