Blog Entries

14. 05. 2018 NetEye Blog Admin Events, Log-SIEM, NetEye

IT Security Conference 2018 – Get your VIP tickets

Our rapidly changing digital world is demanding new monitoring strategies  for managing your IT infrastructure and adapting business transformations in real time. IoT, mobility and Hybrid Clouds offer opportunities as well as potential risks and challenges. How can you succeed in shifting your security posture from reactive to active, and your IT service monitoring from…

Read More
13. 03. 2018 Arianna Cunaccia APM, Asset Management, ITOA, Log Management, NetEye, Service Management

Out Now – The New NetEye & EriZone Training Program

Ready to take your IT process skills beyond the traditional?  Our new training offerings will help you acquire, maintain and improve your knowledge and skills around our solutions.  This year’s training program contains courses for NetEye, EriZone or Alyvix customers and partners, each lasting between 2 and 4 working days. The main focus will be…

Read More
07. 03. 2018 Juergen Vigna Log Management, NetEye

Analyze your OpenLDAP Logs

Suppose you have an OpenLDAP Server and you want to analyze what it does.  A good way to do this is to send the logs to NetEye’s LogServer.  Some elements you will see include: – Returned Entries! (ENTRY) – Search Operations! (SEARCH) – Total Connections! (BIND) To do this you need to add a new…

Read More
07. 02. 2018 Juergen Vigna Log Management, Log-SIEM, NetEye

Harmonize Your Monitoring with Your Elasticsearch Database Entries

If you have an Elasticsearch Database like the one in the NetEye Elastic Stack Module then you are surely interested in integrating this information into your Monitoring environment.  To do this, use this new plugin: check_elasticsearch_query # /data/neteye/usr/lib/nagios/plugins/local/check_elasticsearch_query –help Check a count of number of events fount in elasticsearch over a query and timeframe Usage:…

Read More
29. 01. 2018 Roberto Palmarin Log-SIEM, NetEye

From Software Inventory to Vulnerabilities!

Now that your company has invested time and resources in gathering information about your entire installed base of software and equipment, how can we analyze and measure its level of security protection?  Can we identify the vulnerabilities in your company’s software?  Can we create a scoring function that measures security and how it changes over…

Read More
21. 12. 2017 Massimiliano De Luca Log-SIEM, NetEye

GROK: Instructions for Use

Grok is a plug-in installed by default in Logstash, which is supplied with the Elastic package (the ELK – Elasticsearch, Logstash and Kibana), one of the integrated modules in our NetEye Unified Monitoring solution.What is this plug-in for? First of all, Grok is an English neologism that means  “to understand profoundly, intuitively or by empathy,…

Read More
28. 11. 2017 Giuseppe Di Garbo Log Management, NetEye

The Role of IT Asset Management in GDPR Compliance – Part I

In this post, and in the one that will follow in the next weeks, I would like to analyze the role of IT Asset Management in adapting to the new General Data Protection Regulations (GDPR). In this first article I will briefly introduce what the GDPR is, what measures it introduces, and how the IT…

Read More
31. 10. 2017 Juergen Vigna Log Management, Log-SIEM, NetEye

Sending Cisco Syslogs to Elasticsearch: A simple guide

Do you use Cisco’s network infrastructure? Would you like to view its logs through the syslog protocol in an Elasticsearch database? Find out below about the filters and templates needed for the Logstash setup. As you probably already know, you need a Logstash instance in order to get indexed data into the Elasticsearch database. Cisco…

Read More
19. 09. 2017 Massimo Giaimo Log-SIEM, NetEye

Do you want to prevent cyber-attacks? NetEye and Kibana can help.

IT security is one of the highest priorities for every CIO. Cyber-attacks are now a reality that we must deal with on a daily basis. More and more organizations have been the victims of so-called cybercrimes that are the cause of financial losses, operational problems and consequences to the company’s reputation. That is why trying…

Read More
02. 08. 2017 Susanne Greiner Anomaly Detection, Machine Learning, NetEye, Real User Experience

Next Level Performance Monitoring – Part II: The Role of Machine Learning and Anomaly Detection

Machine learning and anomaly detection are being mentioned with increasing frequency in performance monitoring. But what are they and why is interest in them rising so quickly? From Statistics to Machine Learning There have been several attempts to explicitly differentiate between machine learning and statistics. It is not so easy to draw a line between…

Read More
06. 06. 2017 Giuseppe Di Garbo Log Management, NetEye

How to send logs from servers in the cloud to NetEye?

Keeping an offline copy of your logs does not only provide better visibility from the system management point of view, but also turns out to be extremely precious in case of a security incident during which your local copies have been affected. As many of you might know, the Log Management module of NetEye offers…

Read More
30. 05. 2017 Massimiliano De Luca Log-SIEM, NetEye

IoT: The future, today.

The Smith-Family is driving on the highway to arrive to their holiday destination in Italy, as a car in front of them suddenly brakes. A truck accidently has lost demolition debris and thereby almost caused a multiple-vehicle collision. Mrs. Jones is driving the car just behind the truck and as her car brakes, it simultaneously…

Read More
22. 05. 2017 Tobias Goller Anomaly Detection, Log Management, NetEye

NetEye as essential component of a Security Operations Centers

During my last projects I noticed that the implementation of a „Security Operations Center“ (in short SOC) is becoming increasingly important, especially for our enterprise customers. Mainly for big companies that are of public interest like banks, energy providers, assurances etc. the topic of cyber threats is getting more actual and requires special attention. This…

Read More
25. 11. 2016 Juergen Vigna Log Management, NetEye

Some Words about Logstash Filters and Dates

Some time ago I published an article about how to store the NetEye SMS Protocol log into an ELK environment. Now, after using it some times, I discovered that it was not completely correct as the time/date functions for the Logstash filters are a bit more complicated. In particular, it was that the date was…

Read More
11. 10. 2016 Benjamin Gröber Downloads / Release Notes, Log-SIEM, NetEye

Updated package elasticsearch 1.7.5_neteye1.0.2-2 (for NetEye 3.8)

ChangeLog: Fixed bug where elasticsearch-cleanoldindexes.sh had no execute permission

Read More

Archive