Parsing sucks! Watch our on-demand webinar and learn what you can do about it! >>
Sándor Guba
Axoflow deployment scenarios

Axoflow deployment scenarios

Discover the flexible deployment modes of Axoflow, and learn how you can streamline SIEM data management, reduce costs by 50%, and improve data quality.

read more
How Host Attribution Empowers Security Teams with Previously Missing Context

How Host Attribution Empowers Security Teams with Previously Missing Context

Collecting data reliably is one thing—understanding their origin is another challenge. Without reliable host attribution, vital context is lost, leaving security teams blind in critical moments. Axoflow’s built-in inventory solution enriches your security data with critical metadata (like the origin host) so you can pinpoint the exact source of every data entry, enabling precise routing and more informed security decisions.

read more
AxoRouter, the security data curation pipeline engine

AxoRouter, the security data curation pipeline engine

Most network appliances send improperly formatted log messages. AxoRouter automatically identifies your log sources, and fixes common errors in the incoming data, correcting missing hostnames, invalid timestamps, formatting errors, and so on. Don’t spend time creating and maintaining rules or trying to fix processing bottlenecks.

read more
Using Telemetry Controller with Logging Operator

Using Telemetry Controller with Logging Operator

The Telemetry Controller turns telemetry event streams – logs, metrics, and traces – into Kubernetes resources. It provides a multi-tenant API on top of OpenTelemetry for isolation and access control for telemetry data. 

read more

Subscribe to stay in touch

Sign up for our newsletter to be the first to knew about new articles. We are excited to be realizing our vision above with a full Axoflow product suite.