Business intelligence (BI) is all about making sense of huge amounts of data to extract meaningful and actionable insights out of it. Log management tools such as Graylog, instead, are the perfect solution to streamline data collection and analysis, so it’s easy to understand how these two technologies can make sense when they’re coupled together.
Data replication: What is it and what are the advantages of using it?
Data replication has moved from “nice to have” to “mainstream” for use cases such as High Availability and Disaster Recovery. At the same time, companies are discovering the need to replicate or move data for other reasons, including performance and translating transactional data into events.
Getting data to Splunk
Getting data into Splunk can be challenging, especially when dealing with syslog, one of the most crucial data sources. Syslog can present several hard-to-solve problems, such as high volume, non-compliant messages, and the use of the unreliable UDP network protocol. One Identity’s syslog-ng Premium Edition (PE) and syslog-ng Store Box (SSB) can help manage these challenges effectively.
Apple Innovates, Securaze Sustains: Supporting Progress and Sustainability in the MacBook Ecosystem
Apple has once again captivated tech enthusiasts with its latest announcement: the introduction of the new 13 and 15-inch MacBook Air models featuring the formidable M3 chip. This unveiling marks a significant leap forward in Apple’s lineup, promising enhanced performance and efficiency for users worldwide.
3 steps for API monetization
API monetization can significantly drive business growth by curating and monetizing your APIs in a marketplace designed to simplify and enhance API adoption.
RISING USB-BORNE CYBERATTACKS RAISE CONCERNS
Portable USB storage drives offer users a convenient means to transfer data between work and home, as well as among computers within an organization. This has proven especially valuable during the COVID-19 pandemic, which mandated remote or hybrid work setups. However, this convenience has introduced significant security challenges.
How to tap into the full power of open banking APIs
In the last decade, numerous banks have established developer portals to release their open APIs. Developers can visit these portals, register, and leverage the bank’s APIs for their business initiatives.
Security intelligence analytics: Planning Increases ROI
It’s been a week. A long week. After the most recent Board of Directors meeting, your senior leadership tasked you with finding a security analytics solution. Over the last month, you’ve worked with leadership to develop some basic use cases to determine which solution meets your security and budget needs.
Third party patch management: Why it’s so crucial in modern businesses
Third-party applications have become essential tools for companies worldwide, enhancing productivity and fostering innovation. However, integrating these applications into your ecosystem can complicate patch management, potentially exposing your organization to security risks and vulnerabilities.
Beyond Factory Reset: Elevate Your Data Security with Securaze Solutions
In today’s rapidly evolving technological landscape, the lifespan of our electronic devices is becoming increasingly shorter. Upgrades are the norm, leading to a surplus of discarded devices. However, simply performing a factory reset before selling or repurposing your device might not be enough to ensure your sensitive data is fully protected. The recent cautionary tale from Canon serves as a stark reminder of the potential risks.
‘Tis the season (SMeaSon?) for Smishing
Smishing attacks can take many forms. In this blog, learn how to avoid being tricked.
Sending logs to Splunk using syslog-ng
There are many ways you can collect log messages using syslog-ng and forward them to Splunk. In this blog I collect the history of Splunk support in syslog-ng, and the advantages and disadvantages of various solutions, both open source and commercial.
About Us
From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.
Contact Us
Address
#02-72 WCEGA Tower,
Singapore 658065