What Integrates with Graylog?

Find out what Graylog integrations exist in 2025. Learn what software and services currently integrate with Graylog, and sort them by reviews, cost, features, and more. Below is a list of products that Graylog currently integrates with:

  • 1
    StrongDM Reviews

    StrongDM

    StrongDM

    $70/user/month
    85 Ratings
    See Software
    Learn More
    Access and access management today have become more complex and frustrating. strongDM redesigns access around the people who need it, making it incredibly simple and usable while ensuring total security and compliance. We call it People-First Access. End users enjoy fast, intuitive, and auditable access to the resources they need. Administrators gain precise controls, eliminating unauthorized and excessive access permissions. IT, Security, DevOps, and Compliance teams can easily answer who did what, where, and when with comprehensive audit logs. It seamlessly and securely integrates with every environment and protocol your team needs, with responsive 24/7 support.
  • 2
    Tenzir Reviews
    See Software
    Learn More
    Tenzir is a specialized data pipeline engine tailored for security teams, streamlining the processes of collecting, transforming, enriching, and routing security data throughout its entire lifecycle. It allows users to efficiently aggregate information from multiple sources, convert unstructured data into structured formats, and adjust it as necessary. By optimizing data volume and lowering costs, Tenzir also supports alignment with standardized schemas such as OCSF, ASIM, and ECS. Additionally, it guarantees compliance through features like data anonymization and enhances data by incorporating context from threats, assets, and vulnerabilities. With capabilities for real-time detection, it stores data in an efficient Parquet format within object storage systems. Users are empowered to quickly search for and retrieve essential data, as well as to reactivate dormant data into operational status. The design of Tenzir emphasizes flexibility, enabling deployment as code and seamless integration into pre-existing workflows, ultimately seeking to cut SIEM expenses while providing comprehensive control over data management. This approach not only enhances the effectiveness of security operations but also fosters a more streamlined workflow for teams dealing with complex security data.
  • 3
    Netdata Reviews
    Top Pick
    Monitor your servers, containers, and applications, in high-resolution and in real-time. Netdata collects metrics per second and presents them in beautiful low-latency dashboards. It is designed to run on all of your physical and virtual servers, cloud deployments, Kubernetes clusters, and edge/IoT devices, to monitor your systems, containers, and applications. It scales nicely from just a single server to thousands of servers, even in complex multi/mixed/hybrid cloud environments, and given enough disk space it can keep your metrics for years. KEY FEATURES: Collects metrics from 800+ integrations Real-Time, Low-Latency, High-Resolution Unsupervised Anomaly Detection Powerful Visualization Out of box Alerts systemd Journal Logs Explorer Low Maintenance Open and Extensible Troubleshoot slowdowns and anomalies in your infrastructure with thousands of per-second metrics, meaningful visualisations, and insightful health alarms with zero configuration. Netdata is different. Real-Time data collection and visualization. Infinite scalability baked into its design. Flexible and extremely modular. Immediately available for troubleshooting, requiring zero prior knowledge and preparation.
  • 4
    Squadcast Reviews
    Squadcast is a tool for incident management that was specifically designed for SRE. Squadcast Actions can help you create a culture of blamelessness by reducing the need to have physical war rooms.
  • 5
    Telegraf Reviews
    Telegraf is an open-source server agent that helps you collect metrics from your sensors, stacks, and systems. Telegraf is a plugin-driven agent that collects and sends metrics and events from systems, databases, and IoT sensors. Telegraf is written in Go. It compiles to a single binary and has no external dependencies. It also requires very little memory. Telegraf can gather metrics from a wide variety of inputs and then write them into a wide range of outputs. It can be easily extended by being plugin-driven for both the collection and output data. It is written in Go and can be run on any system without external dependencies. It is easy to collect metrics from your endpoints with the 300+ plugins that have been created by data experts in the community.
  • 6
    SOC Prime Platform Reviews
    SOC Prime equips security teams with the largest and most robust platform for collective cyber defense that cultivates collaboration from a global cybersecurity community and curates the most up-to-date Sigma rules compatible with over 28 SIEM, EDR, and XDR platforms. Backed by a zero-trust approach and cutting-edge technology powered by Sigma and MITRE ATT&CK®️, SOC Prime enables smart data orchestration, cost-efficient threat hunting, and dynamic attack surface visibility to maximize the ROI of SIEM, EDR, XDR & Data Lake solutions while boosting detection engineering efficiency. SOC Prime’s innovation is recognized by independent research companies, credited by the leading SIEM, XDR & MDR vendors, and trusted by 8,000+ organizations from 155 countries, including 42% of Fortune 100, 21% of Forbes Global 2000, 90+ public sector institutions, and 300+ MSSP and MDR providers. SOC Prime is backed by DNX Ventures, Streamlined Ventures, and Rembrandt Venture Partners, having received $11.5M in funding in October 2021. Driven by its advanced cybersecurity solutions, Threat Detection Marketplace, Uncoder AI, and Attack Detective, SOC Prime enables organizations to risk-optimize their cybersecurity posture.
  • 7
    Kapacitor Reviews

    Kapacitor

    InfluxData

    $0.002 per GB per hour
    Kapacitor serves as a dedicated data processing engine for InfluxDB 1.x and is also a core component of the InfluxDB 2.0 ecosystem. This powerful tool is capable of handling both stream and batch data, enabling real-time responses through its unique programming language, TICKscript. In the context of contemporary applications, merely having dashboards and operator alerts is insufficient; there is a growing need for automation and action-triggering capabilities. Kapacitor employs a publish-subscribe architecture for its alerting system, where alerts are published to specific topics and handlers subscribe to these topics for updates. This flexible pub/sub framework, combined with the ability to execute User Defined Functions, empowers Kapacitor to function as a pivotal control plane within various environments, executing tasks such as auto-scaling, stock replenishment, and managing IoT devices. Additionally, Kapacitor's straightforward plugin architecture allows for seamless integration with various anomaly detection engines, further enhancing its versatility and effectiveness in data processing.
  • 8
    Fleet Reviews

    Fleet

    Fleet Device Management

    $4 per host per month
    Inquire about the various servers and laptops in your network, regardless of their operating systems or locations. Monitor and categorize your registered devices effectively. Look for key information and focus on specific targets as needed. Gather and disseminate valuable insights for operational teams, security personnel, help desk staff, and others involved. Fleet operates as a self-hosted and self-managed solution, allowing deployment within your own data centers or in cloud environments. Utilize fleetctl to write scripts and create scheduled queries that facilitate the integration of alerts and dashboards throughout your organization, enhancing overall efficiency and responsiveness. This platform empowers you to maintain a comprehensive overview of your hardware assets and their security status.
  • 9
    Zenduty Reviews

    Zenduty

    Zenduty

    $5 per month
    Zenduty offers a comprehensive platform for incident alerting, on-call management, and response orchestration that integrates reliability into your production operations seamlessly. It provides a unified view of the health status across all production activities, allowing teams to respond to incidents with a 90% faster turnaround and resolve issues in 60% less time. With the ability to implement customized, data-driven on-call schedules, you can maintain round-the-clock coverage for significant incidents. The platform facilitates the application of industry-leading incident response protocols, enabling quicker resolution through effective task delegation and collaborative triaging efforts. Furthermore, it automatically integrates your playbooks into each incident, ensuring a structured approach to each situation. You can also log incident-related tasks and action items to enhance the quality of postmortems and prepare for future occurrences effectively. By suppressing unnecessary alerts, your engineering and support teams can concentrate on the notifications that truly matter. Additionally, Zenduty boasts over 100 integrations with various tools such as application performance management (APM), log monitoring, error tracking, server monitoring, IT service management (ITSM), support systems, and security services, thereby enhancing the overall operational efficiency. This extensive connectivity ensures that teams can utilize their existing tools while streamlining their incident management processes.
  • 10
    SMSEagle Reviews

    SMSEagle

    Proximus Sp. z o.o.

    €989
    SMSEagle, a hardware SMS gateway, allows SMS messages to be sent to a telecommunication carrier directly without using 3rd-party services or the Internet. This is done by using a SIM Card, built-in modules with an external antenna to communicate with a telecommunications operator directly (works like mobile phones). Hardware SMS gateways, also called SMS servers, integrate hardware and software to manage communication. The device provides various methods of integration with external systems such as API, Email to SMS, etc.
  • 11
    Parny Reviews

    Parny

    Parny

    $7 per month
    Receive tailored AI suggestions for your alerts that align with the chosen persona. Parny AI offers three distinct personas: DevOps engineer, senior developer, and database administrator, each designed to deliver optimal alert recommendations. You can effortlessly include your colleagues in the on-call roster, ensuring that the appropriate individuals are notified promptly. Distribute on-call duties among team members using scheduled shifts and automated escalations to enhance responsiveness. Our platform empowers engineering teams to adopt a proactive stance, enabling quicker incident resolutions and a smoother operational experience. Additionally, you can access personalized analytics tailored to your organization, teams, services, and users. This ensures that you remain informed about your performance metrics, fostering continuous improvement in your organization's overall efficiency. With these tools at your disposal, your team can work collaboratively and effectively in managing alerts and incidents.
  • 12
    Icinga Reviews

    Icinga

    Icinga GmbH

    $0
    Icinga is an internet monitoring system that checks the availability of your network resources and notifies users when there are outages. It also generates performance data for reporting. Icinga is flexible and extensible. It can monitor complex environments in multiple locations. Icinga 2 is the monitoring server and requires Icinga Web 2 on top in your Icinga Stack. You can manage the configuration with the Icinga Director or config management tools. Plain text is also available within the Icinga DSL. Find solutions, take action and become a problem-solver. Flexibility is key. Keep curious, stay passionate, and stay in the loop. Tackle your monitoring challenge. The Icinga stack consists of six core strengths that cover all aspects related to monitoring. You can get valuable insights, on-time notifications and eye-opening visuals as well as analytics. Icinga integrates easily into your systems and gives you the power of automating your tasks.
  • 13
    Keyfactor EJBCA Reviews
    EJBCA, an Enterprise-grade PKI platform, can issue and manage digital certificates in the millions. It is one of the most widely used PKI platforms worldwide and is used by large enterprises in all sectors.
  • 14
    SafeConsole Reviews

    SafeConsole

    DataLocker

    $28 per device per year
    Central Management Server Software. SecureConsole central management software gives you instant access to all your encrypted USB flash drives or portable hard drives. It allows you to instantly gain complete control over them. You can enjoy the productivity benefits of USB storage devices without worrying about malware, data leaks or breaches. Available as an on-premises or DataLocker hosted cloud service with global locations. You can enforce policies such as file type restrictions, password rules, and geographic boundaries. Reset passwords, change devices to read-only mode, or remotely wipe them in the event of theft or loss. All encrypted drives can be monitored, including their location around the globe. Integrate Active Directory to easily track users, devices and computers connected. You can see which files are being saved to and deleted from your encrypted drives at any time.
  • 15
    TruKno Reviews
    Stay informed about how adversaries are circumventing enterprise security measures by analyzing the most recent patterns of cyberattacks occurring in the field. Gain insights into the cyber attack patterns linked to harmful IP addresses, file hashes, domains, malware, and threat actors. Remain vigilant regarding the newest cyber threats targeting your networks, as well as those affecting your industry, peers, and vendors. Familiarize yourself with the MITRE TTPs at a procedural level that adversaries employ in current cyberattack initiatives to bolster your threat detection capabilities. Additionally, obtain a real-time overview of the evolution of leading malware campaigns in relation to attack sequences (MITRE TTPs), exploitation of vulnerabilities (CVEs), and indicators of compromise (IOCs), which can significantly aid in proactive defense strategies. Understanding these evolving tactics is essential for staying one step ahead of potential threats.
  • 16
    Sandfly Security Reviews
    Renowned for securing critical infrastructure worldwide, Sandfly offers agentless Linux security that eliminates the need for endpoint agents, ensuring a hassle-free experience. Its deployment is immediate, prioritizing system stability without sacrificing security. As an agentless platform, Sandfly is designed to monitor Linux systems quickly and securely. It safeguards a wide range of Linux environments, from contemporary cloud infrastructures to legacy devices, irrespective of their distribution or CPU type. In addition to standard Endpoint Detection and Response (EDR) features, Sandfly effectively manages SSH credentials, identifies weak passwords through audits, detects unauthorized modifications with drift detection, and incorporates customizable modules to identify novel and evolving threats. This comprehensive approach guarantees maximum safety, efficiency, and compatibility across Linux systems. Furthermore, Sandfly stands out in the market by providing extensive coverage for various Linux distributions and architectures, including AMD, Intel, Arm, MIPS, and POWER CPUs. With Sandfly, organizations can ensure their Linux security is both robust and versatile, catering to their diverse technological landscapes.
  • 17
    NXLog Reviews
    Achieve unparalleled security observability by leveraging insightful data from your logs. Enhance the visibility of your infrastructure while bolstering threat prevention through a flexible, multi-platform solution. With compatibility spanning over 100 operating system versions and more than 120 customizable modules, you can obtain extensive insights and strengthen your overall security posture. Significantly lower the expenses associated with your SIEM solution by effectively minimizing noisy and redundant log data. By filtering events, truncating unnecessary fields, and eliminating duplicates, you can substantially improve the quality of your logs. Unify the collection and aggregation of logs from all systems within your organization using a single, comprehensive tool. This approach simplifies the management of security-related events and accelerates both detection and response times. Additionally, empower your organization to fulfill compliance obligations by centralizing specific logs within a SIEM while archiving others for long-term retention. The NXLog Platform serves as an on-premises solution designed for streamlined log management, offering versatile processing capabilities to meet diverse needs. This powerful tool not only enhances security efficiency but also provides a streamlined approach to managing extensive log data.
  • 18
    Trapster Reviews

    Trapster

    Ballpoint

    $1000/year
    Trapster offers a full deceptive security solution designed to uncover cyber intrusions by strategically placing convincing decoy systems throughout your network. Its core is a network-based honeypot server that deploys virtual machines on your hypervisor or cloud, supporting more than 15 protocols to detect reconnaissance activities and lateral attacker movements. The system delivers real-time alerts via email, dashboards, webhooks, syslog, or API, all with minimal setup and zero maintenance. Trapster enhances early detection by planting honeytokens—such as fake files, URLs, API keys, and database records—to lure attackers and expose malicious activity at an initial stage. The external login panel imitates legitimate login screens, capturing credential leaks before attackers can exploit them. Unlike conventional security tools, Trapster proactively surfaces stealthy threats that bypass standard defenses. Its automated and maintenance-free design simplifies deployment, allowing organizations to strengthen security posture effortlessly. Trapster helps security teams stay ahead by revealing hidden intrusions before damage occurs.
  • 19
    Swimlane Reviews
    Swimlane Turbine is the world’s fastest and most scalable security automation platform. Turbine is built with the flexibility and cloud scalability needed for enterprises and MSSP to automate any SecOps process, from SOC workflows to vulnerability management, compliance, and beyond. Only Turbine can execute 25 million daily actions per customer, 17 times faster than any other platform, provider, or technology.
  • 20
    Stackhero Reviews
    We provide a comprehensive suite of managed services, including PostgreSQL, Graylog, RabbitMQ, MariaDB, Elasticsearch, Redis, and many others. You can get your services up and running in just two minutes, ensuring you're ready for production immediately. This allows you to concentrate on your core business without worrying about managing infrastructure. Our extensive catalog features numerous services, and we consistently introduce new offerings each month. You will no longer need to navigate multiple cloud providers and technical solutions, simplifying your operational processes. Our transparent pricing model is straightforward, with no unexpected charges at the end of the billing cycle. Begin with a small setup and select your instance configuration with options up to 16 vCPUs and 64 GB of RAM, scaling seamlessly as your business expands. We prioritize optimizing hardware and fine-tuning software for exceptional performance. By leveraging open source technologies, you avoid being tied to proprietary systems, allowing freedom in data management. You can create and remove services at your discretion, with billing based on hourly usage, and receive a single, clear invoice each month detailing all your services. This flexibility empowers you and your organization to adapt as needed, ensuring that your infrastructure evolves alongside your business.
  • 21
    Centreon Reviews
    Centreon is a global provider for business-aware IT monitoring to ensure high performance and continuous operations. The company's AIOps-ready platform, which is holistic and ready for use in today's complex hybrid cloud infrastructures, is designed to meet the needs of these distributed clouds. Centreon monitors all aspects of the IT Infrastructure, from Cloud-to Edge for a clear and comprehensive view. Centreon eliminates blind spots by monitoring all equipment, middleware, and applications that are part modern IT workflows. This includes legacy assets on-premise, private and public clouds, and all the way to edge of the network where smart devices and customers come together to create business value. Centreon is always up-to-date and can support even the most dynamic environments. It has auto-discovery capabilities that allow it to keep track of Software Defined Network (SDN), AWS or Azure cloud assets and Wi-Fi access points, as well as any other component of today’s agile IT infrastructure.
  • 22
    AirShield Reviews

    AirShield

    LOCH Technologies

    The Internet of Things (IoT) has resulted in an unprecedentedly vast attack surface, with around 80% of these devices being connected wirelessly. Current networks and organizations were not designed to cope with the enormous scale, rapid data flow, and extensive interconnectivity introduced by smart devices. Many companies continue to face challenges in pinpointing IoT devices in their settings, leading to significant security vulnerabilities. AirShield aims to bridge this gap by offering extensive visibility into the IoT and operational technology (OT) threat landscape, enabling the detection, assessment, and mitigation of risks posed by unmanaged, insecure, and misconfigured IoT devices. Through AirShield, users gain real-time, non-intrusive visibility, as well as thorough monitoring and safeguarding for a wide array of wireless devices, including those in the realms of IoT, the Industrial Internet of Things (IIOT), the Internet of Medical Things (IOMT), and various OT environments, regardless of the operating system, protocol, or connection method employed. Additionally, AirShield's sensors seamlessly integrate with the LOCH Machine Vision Cloud, eliminating the need for any on-site server installations. This innovative approach enhances security measures in an increasingly connected world.
  • 23
    Recorded Future Reviews
    Recorded Future stands as the largest global provider of intelligence tailored for enterprise security. By integrating continuous automated data gathering and insightful analytics with expert human analysis, Recorded Future offers intelligence that is not only timely and accurate but also highly actionable. In an increasingly chaotic and uncertain world, Recorded Future equips organizations with the essential visibility needed to swiftly identify and detect threats, enabling them to take proactive measures against adversaries and safeguard their personnel, systems, and assets, thereby ensuring business operations can proceed with assurance. This platform has gained the trust of over 1,000 businesses and government entities worldwide. The Recorded Future Security Intelligence Platform generates exceptional security intelligence capable of countering adversaries on a large scale. It melds advanced analytics with human insights, drawing from an unparalleled range of open sources, dark web data, technical resources, and original research, ultimately enhancing security measures across the board. As threats evolve, the ability to leverage such comprehensive intelligence becomes increasingly crucial for organizational resilience.
  • 24
    Opsera Reviews
    Select the tools that best suit your needs, and we will handle everything else. Create an ideal CI/CD stack tailored to your organization's objectives without the worry of vendor lock-in. By eliminating the need for manual scripts and complex toolchain automation, your engineers can concentrate on your main business activities. Our pipeline workflows utilize a declarative approach, allowing you to prioritize essential tasks over the methods used to achieve them, covering aspects such as software builds, security assessments, unit testing, and deployment processes. With the help of Blueprints, you can troubleshoot any issues directly within Opsera, thanks to a detailed console output for each step of your pipeline's execution. Gain a holistic view of your CI/CD journey with extensive software delivery analytics, tracking metrics like Lead Time, Change Failure Rate, Deployment Frequency, and Time to Restore. Additionally, benefit from contextualized logs that facilitate quicker resolutions while enhancing auditing and compliance measures, ensuring that your operations remain efficient and transparent. This streamlined approach not only promotes better productivity but also empowers teams to innovate more freely.
  • 25
    Enso Reviews

    Enso

    Enso Security

    Through Application Security Posture Management (ASPM), Enso's platform easily deploys into an organization’s environment to create an actionable, unified inventory of all application assets, their owners, security posture and associated risk. With Enso Security, AppSec teams gain the capacity to manage the tools, people and processes involved in application security, enabling them to build an agile AppSec without interfering with development. Enso is used daily AppSec teams small and large across the globe. Get in touch for more information!
  • 26
    Google Digital Risk Protection Reviews
    Understanding what a digital risk protection solution entails can significantly enhance your readiness by revealing who is targeting you, their objectives, and their methods for potential compromise. Google Digital Risk Protection offers a comprehensive digital risk protection solution through both self-managed SaaS products and an all-encompassing service model. Each alternative equips security experts with the ability to see beyond their organization, recognize high-risk attack vectors, and detect malicious activities stemming from both the deep and dark web, as well as attack campaigns occurring on the surface web. Furthermore, the Google Digital Risk Protection solution supplies detailed insights into threat actors, including their tactics, techniques, and procedures, thereby enriching your cyber threat profile. By effectively mapping your attack surface and keeping tabs on activities in the deep and dark web, you can also gain valuable visibility into risk factors that could jeopardize the extended enterprise and supply chain. This proactive approach not only safeguards your organization but also enhances overall resilience against future threats.
  • 27
    Azure Marketplace Reviews
    The Azure Marketplace serves as an extensive digital storefront, granting users access to a vast array of certified, ready-to-use software applications, services, and solutions provided by both Microsoft and various third-party vendors. This platform allows businesses to easily explore, purchase, and implement software solutions directly within the Azure cloud ecosystem. It features a diverse selection of products, encompassing virtual machine images, AI and machine learning models, developer tools, security features, and applications tailored for specific industries. With various pricing structures, including pay-as-you-go, free trials, and subscriptions, Azure Marketplace makes the procurement process more straightforward and consolidates billing into a single Azure invoice. Furthermore, its seamless integration with Azure services empowers organizations to bolster their cloud infrastructure, streamline operational workflows, and accelerate their digital transformation goals effectively. As a result, businesses can leverage cutting-edge technology solutions to stay competitive in an ever-evolving market.
  • 28
    Claroty Reviews
    Our platform, driven by Continuous Threat Detection (CTD) and Secure Remote Access (SRA) solutions, offers a comprehensive suite of industrial cybersecurity controls that integrate flawlessly with your current infrastructure, scale easily, and boast the lowest total cost of ownership (TCO) in the industry. These robust cybersecurity controls are built around the REVEAL, PROTECT, DETECT, CONNECT framework, ensuring you have the necessary tools to enhance your industrial cybersecurity, no matter your current stage in the journey. The Claroty Platform is utilized across various industries, each presenting its own specific operational and security challenges. Effective industrial cybersecurity begins with a clear understanding of what needs protection, and our platform eliminates the obstacles that hinder industrial networks from securely connecting to essential business operations, allowing for innovation while maintaining an acceptable risk threshold. By prioritizing security without sacrificing operational efficiency, our solution enables businesses to thrive in an increasingly complex digital landscape.
  • Previous
  • You're on page 1
  • Next