Blog
Stay in the loop: Updates, Innovations, and Community Insights
Featured Articles


Beyond Cutting Cost: Why Data Quality Makes Security Pipelines Strategic
Anton Chuvakin and Tim Peacock interview Balázs Scheidler (Axoflow CEO and syslog-ng founder) about the industry’s move from centralization to data access. They discuss why poor data quality weakens SIEM value, how modern pipelines normalize and enrich data so it is ready for immediate use, and meet data quality requirements.


Axoflow’s Storage Strategy: Building the Security Data Layer
Discover Axoflow’s storage solutions for the Security Data Layer. From edge storage and cost-efficient data lakes to stream processing and air-gapped deployments, learn how Axoflow powers scalable, flexible, and reliable security data pipelines.


Splunk .conf25 - The Role of the Pipeline
Splunk .conf2025 experiences, and the increasing importance of the security data pipeline
All Articles


Drowning in Security Data: Why SOCs and CISOs are Rethinking the Pipeline
Overwhelmed by security data? Learn why CISOs and SOC teams are rethinking SIEM pipelines. Discover how intelligent data pipelines cut costs, improve log quality, eliminate blind spots, and empower security operations with automation and AI.


Poor Data + Lack of Automation = SOC Burnout
Explore key findings from Splunk’s 2025 State of Security report on SOC inefficiencies, poor data quality, and alert overload — and learn how Axoflow’s automated data pipeline can help streamline security operations.


Getting firewall logs into Splunk with Axoflow
Learn how to optimize firewall logs before they hit your SIEM using Axoflow's AxoRouter—improve data quality, reduce ingestion costs, and eliminate noisy, unstructured messages.


How to collect AxoSyslog metrics into Prometheus
Learn how to monitor your syslog-ng™ or AxoSyslog deployment by exporting metrics into Prometheus using axosyslog-metrics-exporter. Boost observability and diagnose issues quickly.


Why Choose AxoSyslog over syslog-ng
AxoSyslog: the syslog-ng™ fork built by its original developers. Get secure, supported, binary-compatible log management with advanced observability, daily vulnerability scans, and enterprise-ready features.


The Hidden Cost of Redundancy: Tackling Data Duplication in Security Data Pipelines
Redundant log delivery is the hidden cost of redundancy in security pipelines. Learn how to identify and prevent it before it distorts analytics and increases your SIEM bill.


AxoSyslog License Update: Moving to GPL3
AxoSyslog, our syslog-ng™ fork, simplifies its licensing by adopting a single, clear open source license: GNU General Public License version 3 or later (GPL-3.0-or-later)


Let Go of the Loop: Why Real Telemetry Automation Leaves Manual Oversight Behind
Still stuck managing your telemetry pipelines instead of your data? Discover why real automation means no more manual parser fixes or AI babysitting. Learn how Axoflow delivers detection-ready data—fully automated.


How Axoflow Works with Google Security Operations, Cloud, Pub/Sub, and BigQuery
Discover how Axoflow natively integrates with Google Security Operations (SecOps) and Cloud services like GKE, Pub/Sub, BigQuery, and Private Service Connect to streamline and secure your security data pipelines.
Subscribe to stay in touch
Sign up for our newsletter to be the first to knew about new articles. We are excited to be realizing our vision above with a full Axoflow product suite.

