Data replication: What is it and what are the advantages of using it?

Data replication: What is it and what are the advantages of using it?

Data replication has moved from “nice to have” to “mainstream” for use cases such as High Availability and Disaster Recovery. At the same time, companies are discovering the need to replicate or move data for other reasons, including performance and translating transactional data into events.

Getting data to Splunk

Getting data to Splunk

Getting data into Splunk can be challenging, especially when dealing with syslog, one of the most crucial data sources. Syslog can present several hard-to-solve problems, such as high volume, non-compliant messages, and the use of the unreliable UDP network protocol. One Identity’s syslog-ng Premium Edition (PE) and syslog-ng Store Box (SSB) can help manage these challenges effectively.

3 steps for API monetization

3 steps for API monetization

API monetization can significantly drive business growth by curating and monetizing your APIs in a marketplace designed to simplify and enhance API adoption.

RISING USB-BORNE CYBERATTACKS RAISE CONCERNS

RISING USB-BORNE CYBERATTACKS RAISE CONCERNS

Portable USB storage drives offer users a convenient means to transfer data between work and home, as well as among computers within an organization. This has proven especially valuable during the COVID-19 pandemic, which mandated remote or hybrid work setups. However, this convenience has introduced significant security challenges.

Security intelligence analytics: Planning Increases ROI

Security intelligence analytics: Planning Increases ROI

It’s been a week. A long week. After the most recent Board of Directors meeting, your senior leadership tasked you with finding a security analytics solution. Over the last month, you’ve worked with leadership to develop some basic use cases to determine which solution meets your security and budget needs.

Third party patch management: Why it’s so crucial in modern businesses

Third party patch management: Why it’s so crucial in modern businesses

Third-party applications have become essential tools for companies worldwide, enhancing productivity and fostering innovation. However, integrating these applications into your ecosystem can complicate patch management, potentially exposing your organization to security risks and vulnerabilities.

Beyond Factory Reset: Elevate Your Data Security with Securaze Solutions

Beyond Factory Reset: Elevate Your Data Security with Securaze Solutions

In today’s rapidly evolving technological landscape, the lifespan of our electronic devices is becoming increasingly shorter. Upgrades are the norm, leading to a surplus of discarded devices. However, simply performing a factory reset before selling or repurposing your device might not be enough to ensure your sensitive data is fully protected. The recent cautionary tale from Canon serves as a stark reminder of the potential risks.

Sending logs to Splunk using syslog-ng

Sending logs to Splunk using syslog-ng

There are many ways you can collect log messages using syslog-ng and forward them to Splunk. In this blog I collect the history of Splunk support in syslog-ng, and the advantages and disadvantages of various solutions, both open source and commercial.

About Us

From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.

Contact Us

Address

21 Bukit Batok Crescent,
#02-72 WCEGA Tower,
Singapore 658065

Phone

+65 6266 2877