Getting data to Splunk

Getting data to Splunk

Getting data into Splunk can be challenging, especially when dealing with syslog, one of the most crucial data sources. Syslog can present several hard-to-solve problems, such as high volume, non-compliant messages, and the use of the unreliable UDP network protocol. One Identity’s syslog-ng Premium Edition (PE) and syslog-ng Store Box (SSB) can help manage these challenges effectively.

3 steps for API monetization

3 steps for API monetization

API monetization can significantly drive business growth by curating and monetizing your APIs in a marketplace designed to simplify and enhance API adoption.

RISING USB-BORNE CYBERATTACKS RAISE CONCERNS

RISING USB-BORNE CYBERATTACKS RAISE CONCERNS

Portable USB storage drives offer users a convenient means to transfer data between work and home, as well as among computers within an organization. This has proven especially valuable during the COVID-19 pandemic, which mandated remote or hybrid work setups. However, this convenience has introduced significant security challenges.

How to tap into the full power of open banking APIs

How to tap into the full power of open banking APIs

In the last decade, numerous banks have established developer portals to release their open APIs. Developers can visit these portals, register, and leverage the bank’s APIs for their business initiatives.

Security intelligence analytics: Planning Increases ROI

Security intelligence analytics: Planning Increases ROI

It’s been a week. A long week. After the most recent Board of Directors meeting, your senior leadership tasked you with finding a security analytics solution. Over the last month, you’ve worked with leadership to develop some basic use cases to determine which solution meets your security and budget needs.

Third party patch management: Why it’s so crucial in modern businesses

Third party patch management: Why it’s so crucial in modern businesses

Third-party applications have become essential tools for companies worldwide, enhancing productivity and fostering innovation. However, integrating these applications into your ecosystem can complicate patch management, potentially exposing your organization to security risks and vulnerabilities.

Beyond Factory Reset: Elevate Your Data Security with Securaze Solutions

Beyond Factory Reset: Elevate Your Data Security with Securaze Solutions

In today’s rapidly evolving technological landscape, the lifespan of our electronic devices is becoming increasingly shorter. Upgrades are the norm, leading to a surplus of discarded devices. However, simply performing a factory reset before selling or repurposing your device might not be enough to ensure your sensitive data is fully protected. The recent cautionary tale from Canon serves as a stark reminder of the potential risks.

Sending logs to Splunk using syslog-ng

Sending logs to Splunk using syslog-ng

There are many ways you can collect log messages using syslog-ng and forward them to Splunk. In this blog I collect the history of Splunk support in syslog-ng, and the advantages and disadvantages of various solutions, both open source and commercial.

Cybersecurity Trends to Look Out for in 2024

Cybersecurity Trends to Look Out for in 2024

The importance of cybersecurity has been on the rise for a while now. In 2024, cybersecurity will make its way into boardrooms, enter the AI battlefield, or change how businesses juggle their trade secrets and sensitive communications. 

About Us

From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.

Contact Us

Address

21 Bukit Batok Crescent,
#02-72 WCEGA Tower,
Singapore 658065

Phone

+65 6266 2877