2025 Report. The state of telemetry in 2025 uncovered
Discover nine key telemetry management challenges, with fresh insights from some of the organizations navigating today’s complex digital environments.
Optimize log management and cut costs
This whitepaper provides insights on optimizing security logging operations through effective log collection and management strategies. These strategies include the use of centralized log collection,
Microsoft Sentinel
and NXLog Platform
Learn the benefits of Microsoft Sentinel integration with NXLog Platform
Google SecOps and NXLog Platform
Learn the benefits of Google SecOps integration with NXLog Platform
NXLog Platform and FortiSIEM
Learn the benefits of FortiSIEM integration with NXLog Platform
Splunk and NXLog Platform
Learn the benefits of Splunk integration with NXLog Platform
Industrial Control Systems and SCADA security
This white paper provides an overview of ICS, including Supervisory Control And Data Acquisition (SCADA) systems, outlines common threat scenarios, and suggests strategies to meet event log management
Solving log collection challenges with Event Tracing for Windows
Event Tracing for Windows (ETW) logs kernel, application, and other system activity. ETW provides better data, and uses fewer resources. By understanding the key characteristics of ETW, system adminis
The importance of DNS logging for enterprise security
Learn how proactive DNS monitoring helps detect and prevent DNS attacks like hijacking, tunneling, cache poisoning, and more for enhanced security.
Using structured logging for effective log management
Structured logging offers a variety of advantages, including simpler parsing, easier format conversion, and more flexible classification and correlation of events, even across diverse log sources.
Security Auditing on Modern Operating Systems
Audit logging is important for maintaining security and investigating incidents. Most operating systems have a native auditing system for this purpose.