{"id":814,"date":"2019-10-16T15:00:26","date_gmt":"2019-10-16T20:00:26","guid":{"rendered":"https:\/\/cyanline.com\/wp\/?page_id=814"},"modified":"2020-05-19T14:47:15","modified_gmt":"2020-05-19T19:47:15","slug":"log-service","status":"publish","type":"page","link":"https:\/\/cyanline.com\/wp\/log-service\/","title":{"rendered":"Self-Managed Log Service"},"content":{"rendered":"<h1><span style=\"color: #000000;\">Managing Your Logs is Key<\/span><\/h1>\n<p><span style=\"color: #000000;\">The constant evolution of cyber attacks prompts a rapid response to malicious activity. Logs are the foundation of monitoring, alerting and forensics. CyanLine not only specializes in <a href=\"https:\/\/cyanline.com\/wp\/services\/computer-forensics\/\"><strong>digital forensics<\/strong><\/a>, but centralized log management deployment.<\/span><\/p>\n<p><span style=\"color: #000000;\">With everything in one place, it becomes easier to verify policy compliance audits for access, collection, and log retention.<\/span><\/p>\n<p><span style=\"color: #000000;\">By having a centralized log management system you decide what data you need to collect in your organization, how long you need to keep it, and who receives access to review the logs.<\/span><\/p>\n<p><span style=\"color: #000000;\">Speed is everything when it comes to centralized logging. The faster you are able to review the log files, the less time it takes to recognize your data is at risk.<\/span><\/p>\n<p><span style=\"color: #000000;\">CyanLine has the capability of installing the software from start to finish for your entire organization. No company is too small or large to have logging in place. Our services enable the logging system to handle up to petabytes of data without any truncating, summarizing, or stripping of the original log message.<\/span><\/p>\n<p><span style=\"color: #000000;\">CyanLine uses GrayLog, a free and open source log management system, to achieve the goal of central log management.<\/span><\/p>\n<p><span style=\"color: #808080;\">Feel free to contact CyanLine\u00a0<strong><a style=\"color: #808080;\" href=\"https:\/\/cyanline.com\/wp\/contact-us-2\/\">here<\/a><\/strong>.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Managing Your Logs is Key The constant evolution of cyber attacks prompts a rapid response to malicious activity. Logs are the foundation of monitoring, alerting and forensics. CyanLine not only specializes in digital forensics, but centralized log management deployment. With everything in one place, it becomes easier to verify policy compliance audits for access, collection, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Self-Managed Log Service - CyanLine<\/title>\n<meta name=\"description\" content=\"CyanLine is a team of highly-experienced computer forensic investigators and security professionals who have worked with law enforcement agencies, government agencies, and corporations of all sizes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyanline.com\/wp\/log-service\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Self-Managed Log Service - CyanLine\" \/>\n<meta property=\"og:description\" content=\"CyanLine is a team of highly-experienced computer forensic investigators and security professionals who have worked with law enforcement agencies, government agencies, and corporations of all sizes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyanline.com\/wp\/log-service\/\" \/>\n<meta property=\"og:site_name\" content=\"CyanLine\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-19T19:47:15+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@cyanline\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyanline.com\/wp\/log-service\/\",\"url\":\"https:\/\/cyanline.com\/wp\/log-service\/\",\"name\":\"Self-Managed Log Service - CyanLine\",\"isPartOf\":{\"@id\":\"https:\/\/cyanline.com\/wp\/#website\"},\"datePublished\":\"2019-10-16T20:00:26+00:00\",\"dateModified\":\"2020-05-19T19:47:15+00:00\",\"description\":\"CyanLine is a team of highly-experienced computer forensic investigators and security professionals who have worked with law enforcement agencies, government agencies, and corporations of all sizes.\",\"breadcrumb\":{\"@id\":\"https:\/\/cyanline.com\/wp\/log-service\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyanline.com\/wp\/log-service\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyanline.com\/wp\/log-service\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyanline.com\/wp\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Self-Managed Log Service\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyanline.com\/wp\/#website\",\"url\":\"https:\/\/cyanline.com\/wp\/\",\"name\":\"CyanLine\",\"description\":\"Trusted Experts\",\"publisher\":{\"@id\":\"https:\/\/cyanline.com\/wp\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyanline.com\/wp\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyanline.com\/wp\/#organization\",\"name\":\"CyanLine, LLC\",\"url\":\"https:\/\/cyanline.com\/wp\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyanline.com\/wp\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyanline.com\/wp\/wp-content\/uploads\/2018\/07\/LOGO-PNG.png\",\"contentUrl\":\"https:\/\/cyanline.com\/wp\/wp-content\/uploads\/2018\/07\/LOGO-PNG.png\",\"width\":691,\"height\":374,\"caption\":\"CyanLine, LLC\"},\"image\":{\"@id\":\"https:\/\/cyanline.com\/wp\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/cyanline\",\"https:\/\/www.linkedin.com\/company\/cyanline\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Self-Managed Log Service - CyanLine","description":"CyanLine is a team of highly-experienced computer forensic investigators and security professionals who have worked with law enforcement agencies, government agencies, and corporations of all sizes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyanline.com\/wp\/log-service\/","og_locale":"en_US","og_type":"article","og_title":"Self-Managed Log Service - CyanLine","og_description":"CyanLine is a team of highly-experienced computer forensic investigators and security professionals who have worked with law enforcement agencies, government agencies, and corporations of all sizes.","og_url":"https:\/\/cyanline.com\/wp\/log-service\/","og_site_name":"CyanLine","article_modified_time":"2020-05-19T19:47:15+00:00","twitter_card":"summary_large_image","twitter_site":"@cyanline","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyanline.com\/wp\/log-service\/","url":"https:\/\/cyanline.com\/wp\/log-service\/","name":"Self-Managed Log Service - CyanLine","isPartOf":{"@id":"https:\/\/cyanline.com\/wp\/#website"},"datePublished":"2019-10-16T20:00:26+00:00","dateModified":"2020-05-19T19:47:15+00:00","description":"CyanLine is a team of highly-experienced computer forensic investigators and security professionals who have worked with law enforcement agencies, government agencies, and corporations of all sizes.","breadcrumb":{"@id":"https:\/\/cyanline.com\/wp\/log-service\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyanline.com\/wp\/log-service\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cyanline.com\/wp\/log-service\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyanline.com\/wp\/"},{"@type":"ListItem","position":2,"name":"Self-Managed Log Service"}]},{"@type":"WebSite","@id":"https:\/\/cyanline.com\/wp\/#website","url":"https:\/\/cyanline.com\/wp\/","name":"CyanLine","description":"Trusted Experts","publisher":{"@id":"https:\/\/cyanline.com\/wp\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyanline.com\/wp\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyanline.com\/wp\/#organization","name":"CyanLine, LLC","url":"https:\/\/cyanline.com\/wp\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyanline.com\/wp\/#\/schema\/logo\/image\/","url":"https:\/\/cyanline.com\/wp\/wp-content\/uploads\/2018\/07\/LOGO-PNG.png","contentUrl":"https:\/\/cyanline.com\/wp\/wp-content\/uploads\/2018\/07\/LOGO-PNG.png","width":691,"height":374,"caption":"CyanLine, LLC"},"image":{"@id":"https:\/\/cyanline.com\/wp\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/cyanline","https:\/\/www.linkedin.com\/company\/cyanline"]}]}},"_links":{"self":[{"href":"https:\/\/cyanline.com\/wp\/wp-json\/wp\/v2\/pages\/814"}],"collection":[{"href":"https:\/\/cyanline.com\/wp\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyanline.com\/wp\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyanline.com\/wp\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyanline.com\/wp\/wp-json\/wp\/v2\/comments?post=814"}],"version-history":[{"count":9,"href":"https:\/\/cyanline.com\/wp\/wp-json\/wp\/v2\/pages\/814\/revisions"}],"predecessor-version":[{"id":936,"href":"https:\/\/cyanline.com\/wp\/wp-json\/wp\/v2\/pages\/814\/revisions\/936"}],"wp:attachment":[{"href":"https:\/\/cyanline.com\/wp\/wp-json\/wp\/v2\/media?parent=814"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}