際際滷shows by User: balabit / http://www.slideshare.net/images/logo.gif 際際滷shows by User: balabit / Thu, 28 Jan 2016 14:04:17 GMT 際際滷Share feed for 際際滷shows by User: balabit SCaLE 2016 - syslog-ng: From Raw Data to Big Data /slideshow/scale-2016-syslogng-from-raw-data-to-big-data/57606234 czpscale2016v1-160128140417
syslog-ng is an enhanced logging daemon, with a focus on central log collection. It collects logs from many different sources, processes and filters them and forwards them to a destination. This session focuses on how syslog-ng parses important information from incoming messages, how to send this information to big data destinations, like HDFS, Kafka, ElasticSearch or MongoDB. Abstract: syslog-ng is an enhanced logging daemon, with a focus on central log collection. It collects logs from many different sources. Raw log messages come in a variety of formats: - lacking any structure most are usually just an almost proper English sentence with some variable parts in it, like user names or IP addresses. - Fix table-like structure, like Apache access logs. - A small minority of logs arrive in an already structured form: JSON. Parsers in syslog-ng make it possible to extract important information from any of these messages and create name-value pairs.Once you have name-value pairs instead of raw log messages, you have many possibilities. On the syslog-ng side, you can use them for filtering, for example, to send an alert if the username is root. You can also use them in file names, or messages can be modified to facilitate log rotation or better suit applications processing the logs. Parsing and preprocessing log messages also allows you to store them more effectively: - you can send them to the destination (for example, ElasticSearch or MongoDB) in a format that can be easy to process (for example, JSON), - you can filter irrelevant data, and forward only what is really needed, - processing is off-loaded to very effective C code. Finally you will learn about the big data destinations that syslog-ng supports, and how they benefit from message parsing: - Hadoop Distributed File System ( HDFS ), - Apache Kafka, - ElasticSearch and Kibana, and - MongoDB. And if syslog-ng cannot already do something that you need, and you are not afraid of writing some code, you can learn about how language bindings of syslog-ng make it possible to add new destinations, not only in C, but also in Java, Lua, Perl, or Python. Bio: Peter Czanik is community manager at Balabit, developers of syslog-ng. He helps distributions to maintain the syslog-ng package, follows bug trackers, helps users and talks regularly at conferences (FOSDEM, Libre Software Meeting, LOADays, Scale, etc.) In his limited free time he is interested in non-x86 architectures, and works on one of his PPC or ARM machines.]]>

syslog-ng is an enhanced logging daemon, with a focus on central log collection. It collects logs from many different sources, processes and filters them and forwards them to a destination. This session focuses on how syslog-ng parses important information from incoming messages, how to send this information to big data destinations, like HDFS, Kafka, ElasticSearch or MongoDB. Abstract: syslog-ng is an enhanced logging daemon, with a focus on central log collection. It collects logs from many different sources. Raw log messages come in a variety of formats: - lacking any structure most are usually just an almost proper English sentence with some variable parts in it, like user names or IP addresses. - Fix table-like structure, like Apache access logs. - A small minority of logs arrive in an already structured form: JSON. Parsers in syslog-ng make it possible to extract important information from any of these messages and create name-value pairs.Once you have name-value pairs instead of raw log messages, you have many possibilities. On the syslog-ng side, you can use them for filtering, for example, to send an alert if the username is root. You can also use them in file names, or messages can be modified to facilitate log rotation or better suit applications processing the logs. Parsing and preprocessing log messages also allows you to store them more effectively: - you can send them to the destination (for example, ElasticSearch or MongoDB) in a format that can be easy to process (for example, JSON), - you can filter irrelevant data, and forward only what is really needed, - processing is off-loaded to very effective C code. Finally you will learn about the big data destinations that syslog-ng supports, and how they benefit from message parsing: - Hadoop Distributed File System ( HDFS ), - Apache Kafka, - ElasticSearch and Kibana, and - MongoDB. And if syslog-ng cannot already do something that you need, and you are not afraid of writing some code, you can learn about how language bindings of syslog-ng make it possible to add new destinations, not only in C, but also in Java, Lua, Perl, or Python. Bio: Peter Czanik is community manager at Balabit, developers of syslog-ng. He helps distributions to maintain the syslog-ng package, follows bug trackers, helps users and talks regularly at conferences (FOSDEM, Libre Software Meeting, LOADays, Scale, etc.) In his limited free time he is interested in non-x86 architectures, and works on one of his PPC or ARM machines.]]>
Thu, 28 Jan 2016 14:04:17 GMT /slideshow/scale-2016-syslogng-from-raw-data-to-big-data/57606234 balabit@slideshare.net(balabit) SCaLE 2016 - syslog-ng: From Raw Data to Big Data balabit syslog-ng is an enhanced logging daemon, with a focus on central log collection. It collects logs from many different sources, processes and filters them and forwards them to a destination. This session focuses on how syslog-ng parses important information from incoming messages, how to send this information to big data destinations, like HDFS, Kafka, ElasticSearch or MongoDB. Abstract: syslog-ng is an enhanced logging daemon, with a focus on central log collection. It collects logs from many different sources. Raw log messages come in a variety of formats: - lacking any structure most are usually just an almost proper English sentence with some variable parts in it, like user names or IP addresses. - Fix table-like structure, like Apache access logs. - A small minority of logs arrive in an already structured form: JSON. Parsers in syslog-ng make it possible to extract important information from any of these messages and create name-value pairs.Once you have name-value pairs instead of raw log messages, you have many possibilities. On the syslog-ng side, you can use them for filtering, for example, to send an alert if the username is root. You can also use them in file names, or messages can be modified to facilitate log rotation or better suit applications processing the logs. Parsing and preprocessing log messages also allows you to store them more effectively: - you can send them to the destination (for example, ElasticSearch or MongoDB) in a format that can be easy to process (for example, JSON), - you can filter irrelevant data, and forward only what is really needed, - processing is off-loaded to very effective C code. Finally you will learn about the big data destinations that syslog-ng supports, and how they benefit from message parsing: - Hadoop Distributed File System ( HDFS ), - Apache Kafka, - ElasticSearch and Kibana, and - MongoDB. And if syslog-ng cannot already do something that you need, and you are not afraid of writing some code, you can learn about how language bindings of syslog-ng make it possible to add new destinations, not only in C, but also in Java, Lua, Perl, or Python. Bio: Peter Czanik is community manager at Balabit, developers of syslog-ng. He helps distributions to maintain the syslog-ng package, follows bug trackers, helps users and talks regularly at conferences (FOSDEM, Libre Software Meeting, LOADays, Scale, etc.) In his limited free time he is interested in non-x86 architectures, and works on one of his PPC or ARM machines. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/czpscale2016v1-160128140417-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> syslog-ng is an enhanced logging daemon, with a focus on central log collection. It collects logs from many different sources, processes and filters them and forwards them to a destination. This session focuses on how syslog-ng parses important information from incoming messages, how to send this information to big data destinations, like HDFS, Kafka, ElasticSearch or MongoDB. Abstract: syslog-ng is an enhanced logging daemon, with a focus on central log collection. It collects logs from many different sources. Raw log messages come in a variety of formats: - lacking any structure most are usually just an almost proper English sentence with some variable parts in it, like user names or IP addresses. - Fix table-like structure, like Apache access logs. - A small minority of logs arrive in an already structured form: JSON. Parsers in syslog-ng make it possible to extract important information from any of these messages and create name-value pairs.Once you have name-value pairs instead of raw log messages, you have many possibilities. On the syslog-ng side, you can use them for filtering, for example, to send an alert if the username is root. You can also use them in file names, or messages can be modified to facilitate log rotation or better suit applications processing the logs. Parsing and preprocessing log messages also allows you to store them more effectively: - you can send them to the destination (for example, ElasticSearch or MongoDB) in a format that can be easy to process (for example, JSON), - you can filter irrelevant data, and forward only what is really needed, - processing is off-loaded to very effective C code. Finally you will learn about the big data destinations that syslog-ng supports, and how they benefit from message parsing: - Hadoop Distributed File System ( HDFS ), - Apache Kafka, - ElasticSearch and Kibana, and - MongoDB. And if syslog-ng cannot already do something that you need, and you are not afraid of writing some code, you can learn about how language bindings of syslog-ng make it possible to add new destinations, not only in C, but also in Java, Lua, Perl, or Python. Bio: Peter Czanik is community manager at Balabit, developers of syslog-ng. He helps distributions to maintain the syslog-ng package, follows bug trackers, helps users and talks regularly at conferences (FOSDEM, Libre Software Meeting, LOADays, Scale, etc.) In his limited free time he is interested in non-x86 architectures, and works on one of his PPC or ARM machines.
SCaLE 2016 - syslog-ng: From Raw Data to Big Data from BalaBit
]]>
1720 7 https://cdn.slidesharecdn.com/ss_thumbnails/czpscale2016v1-160128140417-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
NIAS 2015 - The value add of open source for innovation /slideshow/nias-2015-the-value-add-of-open-source-for-innovation/54429102 20150915-1520niasprezi05-151027130404-lva1-app6891
(Bal叩zs Scheidler, co-founder and CTO, BalaBit) As a long term member of the Open Source community, I believe that the Open Source development model creates a great context for innovation to happen. In the open source world, collaboration and sharing are key principles. These principles put the problem to be solved in focus and tear down organizational boundaries. An Open Source project is a space where the best engineers from multiple competing organizations work as a team on solving a common goal. This space and the direct connection to users boosts engineer motivation, creating trust and a virtuous circle that results in fast iterations: creating layers upon layers of work yielding a great product at a pace that is unrealistic in a proprietary software development setting. We can also see that the same values and principles start happening outside of the software realm: Wikipedia, Creative Commons and the Maker community confirms the approach works in other fields, which shows that it can be adapted to further situations to improve efficiency and innovation.]]>

(Bal叩zs Scheidler, co-founder and CTO, BalaBit) As a long term member of the Open Source community, I believe that the Open Source development model creates a great context for innovation to happen. In the open source world, collaboration and sharing are key principles. These principles put the problem to be solved in focus and tear down organizational boundaries. An Open Source project is a space where the best engineers from multiple competing organizations work as a team on solving a common goal. This space and the direct connection to users boosts engineer motivation, creating trust and a virtuous circle that results in fast iterations: creating layers upon layers of work yielding a great product at a pace that is unrealistic in a proprietary software development setting. We can also see that the same values and principles start happening outside of the software realm: Wikipedia, Creative Commons and the Maker community confirms the approach works in other fields, which shows that it can be adapted to further situations to improve efficiency and innovation.]]>
Tue, 27 Oct 2015 13:04:04 GMT /slideshow/nias-2015-the-value-add-of-open-source-for-innovation/54429102 balabit@slideshare.net(balabit) NIAS 2015 - The value add of open source for innovation balabit (Bal叩zs Scheidler, co-founder and CTO, BalaBit) As a long term member of the Open Source community, I believe that the Open Source development model creates a great context for innovation to happen. In the open source world, collaboration and sharing are key principles. These principles put the problem to be solved in focus and tear down organizational boundaries. An Open Source project is a space where the best engineers from multiple competing organizations work as a team on solving a common goal. This space and the direct connection to users boosts engineer motivation, creating trust and a virtuous circle that results in fast iterations: creating layers upon layers of work yielding a great product at a pace that is unrealistic in a proprietary software development setting. We can also see that the same values and principles start happening outside of the software realm: Wikipedia, Creative Commons and the Maker community confirms the approach works in other fields, which shows that it can be adapted to further situations to improve efficiency and innovation. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/20150915-1520niasprezi05-151027130404-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> (Bal叩zs Scheidler, co-founder and CTO, BalaBit) As a long term member of the Open Source community, I believe that the Open Source development model creates a great context for innovation to happen. In the open source world, collaboration and sharing are key principles. These principles put the problem to be solved in focus and tear down organizational boundaries. An Open Source project is a space where the best engineers from multiple competing organizations work as a team on solving a common goal. This space and the direct connection to users boosts engineer motivation, creating trust and a virtuous circle that results in fast iterations: creating layers upon layers of work yielding a great product at a pace that is unrealistic in a proprietary software development setting. We can also see that the same values and principles start happening outside of the software realm: Wikipedia, Creative Commons and the Maker community confirms the approach works in other fields, which shows that it can be adapted to further situations to improve efficiency and innovation.
NIAS 2015 - The value add of open source for innovation from BalaBit
]]>
607 4 https://cdn.slidesharecdn.com/ss_thumbnails/20150915-1520niasprezi05-151027130404-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Les Assises 2015 - Why people are the most important aspect of IT security? /slideshow/les-assises-2015-why-people-are-the-most-important-aspect-of-it-security/54250721 201510061140balabitlesassises20151001v2-for-slideshare-151022082138-lva1-app6892
Bal叩zs Scheidler, co-founder and CTO of BalaBit holds a presentation about the importance of privileged users in IT security. He introduces BalaBit's approach to people-centric security - people centric security is a strategic approach to information security that emphasizes individual accountability and trust. It de-emphasizes restrictive, preventive security controls, while the monitoring of user activities is a fundamental element of people centric security. Mr. Scheidler showcases how cooperates Blindspotter, BalaBit's UBA solution with its Privileged Activity Monitoring tool, Shell Control Box, and how does they provide an effective defense against Advanced Persistent Threats. A live demo of how an APT attack would be prevented will be also part of the presentation.]]>

Bal叩zs Scheidler, co-founder and CTO of BalaBit holds a presentation about the importance of privileged users in IT security. He introduces BalaBit's approach to people-centric security - people centric security is a strategic approach to information security that emphasizes individual accountability and trust. It de-emphasizes restrictive, preventive security controls, while the monitoring of user activities is a fundamental element of people centric security. Mr. Scheidler showcases how cooperates Blindspotter, BalaBit's UBA solution with its Privileged Activity Monitoring tool, Shell Control Box, and how does they provide an effective defense against Advanced Persistent Threats. A live demo of how an APT attack would be prevented will be also part of the presentation.]]>
Thu, 22 Oct 2015 08:21:38 GMT /slideshow/les-assises-2015-why-people-are-the-most-important-aspect-of-it-security/54250721 balabit@slideshare.net(balabit) Les Assises 2015 - Why people are the most important aspect of IT security? balabit Bal叩zs Scheidler, co-founder and CTO of BalaBit holds a presentation about the importance of privileged users in IT security. He introduces BalaBit's approach to people-centric security - people centric security is a strategic approach to information security that emphasizes individual accountability and trust. It de-emphasizes restrictive, preventive security controls, while the monitoring of user activities is a fundamental element of people centric security. Mr. Scheidler showcases how cooperates Blindspotter, BalaBit's UBA solution with its Privileged Activity Monitoring tool, Shell Control Box, and how does they provide an effective defense against Advanced Persistent Threats. A live demo of how an APT attack would be prevented will be also part of the presentation. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/201510061140balabitlesassises20151001v2-for-slideshare-151022082138-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Bal叩zs Scheidler, co-founder and CTO of BalaBit holds a presentation about the importance of privileged users in IT security. He introduces BalaBit&#39;s approach to people-centric security - people centric security is a strategic approach to information security that emphasizes individual accountability and trust. It de-emphasizes restrictive, preventive security controls, while the monitoring of user activities is a fundamental element of people centric security. Mr. Scheidler showcases how cooperates Blindspotter, BalaBit&#39;s UBA solution with its Privileged Activity Monitoring tool, Shell Control Box, and how does they provide an effective defense against Advanced Persistent Threats. A live demo of how an APT attack would be prevented will be also part of the presentation.
Les Assises 2015 - Why people are the most important aspect of IT security? from BalaBit
]]>
542 5 https://cdn.slidesharecdn.com/ss_thumbnails/201510061140balabitlesassises20151001v2-for-slideshare-151022082138-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
2015. Libre Software Meeting - syslog-ng: from log collection to processing and information extraction /slideshow/czp-lsm2015-v1/50712594 czplsm2015v1-150720123136-lva1-app6891
Peter Czanik: syslog-ng - from log collection to processing and infomation extraction 2015. Libre Software Meeting After a short introduction to system logging, we will show how the current log messages look like, and what the problem is with this free text format. Next, we will introduce you the powerful concept of name-value pairs, and how you can extract useful information from your logs by parsing log messages into name-value pairs. Next we will demonstrate the flexibility of syslog-ngs message parsers (patterndb, csv and JSON parsers), and show you how to create patterns using a text editor or a GUI. This can also be used to overwrite sensitive information due to privacy regulations. At the end, you will learn about the Perl/Python/Lua/Java bindings of syslog-ng Open Source Edition, how value pairs can be passed to them, and some reference applications written for syslog-ng.]]>

Peter Czanik: syslog-ng - from log collection to processing and infomation extraction 2015. Libre Software Meeting After a short introduction to system logging, we will show how the current log messages look like, and what the problem is with this free text format. Next, we will introduce you the powerful concept of name-value pairs, and how you can extract useful information from your logs by parsing log messages into name-value pairs. Next we will demonstrate the flexibility of syslog-ngs message parsers (patterndb, csv and JSON parsers), and show you how to create patterns using a text editor or a GUI. This can also be used to overwrite sensitive information due to privacy regulations. At the end, you will learn about the Perl/Python/Lua/Java bindings of syslog-ng Open Source Edition, how value pairs can be passed to them, and some reference applications written for syslog-ng.]]>
Mon, 20 Jul 2015 12:31:36 GMT /slideshow/czp-lsm2015-v1/50712594 balabit@slideshare.net(balabit) 2015. Libre Software Meeting - syslog-ng: from log collection to processing and information extraction balabit Peter Czanik: syslog-ng - from log collection to processing and infomation extraction 2015. Libre Software Meeting After a short introduction to system logging, we will show how the current log messages look like, and what the problem is with this free text format. Next, we will introduce you the powerful concept of name-value pairs, and how you can extract useful information from your logs by parsing log messages into name-value pairs. Next we will demonstrate the flexibility of syslog-ngs message parsers (patterndb, csv and JSON parsers), and show you how to create patterns using a text editor or a GUI. This can also be used to overwrite sensitive information due to privacy regulations. At the end, you will learn about the Perl/Python/Lua/Java bindings of syslog-ng Open Source Edition, how value pairs can be passed to them, and some reference applications written for syslog-ng. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/czplsm2015v1-150720123136-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Peter Czanik: syslog-ng - from log collection to processing and infomation extraction 2015. Libre Software Meeting After a short introduction to system logging, we will show how the current log messages look like, and what the problem is with this free text format. Next, we will introduce you the powerful concept of name-value pairs, and how you can extract useful information from your logs by parsing log messages into name-value pairs. Next we will demonstrate the flexibility of syslog-ngs message parsers (patterndb, csv and JSON parsers), and show you how to create patterns using a text editor or a GUI. This can also be used to overwrite sensitive information due to privacy regulations. At the end, you will learn about the Perl/Python/Lua/Java bindings of syslog-ng Open Source Edition, how value pairs can be passed to them, and some reference applications written for syslog-ng.
2015. Libre Software Meeting - syslog-ng: from log collection to processing and information extraction from BalaBit
]]>
1206 2 https://cdn.slidesharecdn.com/ss_thumbnails/czplsm2015v1-150720123136-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
LOADays 2015 - syslog-ng - from log collection to processing and infomation extraction /slideshow/czp-loadays2015-v1/50712593 czploadays2015v1-150720123133-lva1-app6891
Peter Czanik: syslog-ng - from log collection to processing and infomation extraction LOADays 2015. After a short introduction to system logging, we will show how the current log messages look like, and what the problem is with this free text format. Next, we will introduce you the powerful concept of name-value pairs, and how you can extract useful information from your logs by parsing log messages into name-value pairs. Next we will demonstrate the flexibility of syslog-ngs message parsers (patterndb, csv and JSON parsers), and show you how to create patterns using a text editor or a GUI. This can also be used to overwrite sensitive information due to privacy regulations. At the end, you will learn about the Perl/Python/Lua/Java bindings of syslog-ng Open Source Edition, how value pairs can be passed to them, and some reference applications written for syslog-ng.]]>

Peter Czanik: syslog-ng - from log collection to processing and infomation extraction LOADays 2015. After a short introduction to system logging, we will show how the current log messages look like, and what the problem is with this free text format. Next, we will introduce you the powerful concept of name-value pairs, and how you can extract useful information from your logs by parsing log messages into name-value pairs. Next we will demonstrate the flexibility of syslog-ngs message parsers (patterndb, csv and JSON parsers), and show you how to create patterns using a text editor or a GUI. This can also be used to overwrite sensitive information due to privacy regulations. At the end, you will learn about the Perl/Python/Lua/Java bindings of syslog-ng Open Source Edition, how value pairs can be passed to them, and some reference applications written for syslog-ng.]]>
Mon, 20 Jul 2015 12:31:33 GMT /slideshow/czp-loadays2015-v1/50712593 balabit@slideshare.net(balabit) LOADays 2015 - syslog-ng - from log collection to processing and infomation extraction balabit Peter Czanik: syslog-ng - from log collection to processing and infomation extraction LOADays 2015. After a short introduction to system logging, we will show how the current log messages look like, and what the problem is with this free text format. Next, we will introduce you the powerful concept of name-value pairs, and how you can extract useful information from your logs by parsing log messages into name-value pairs. Next we will demonstrate the flexibility of syslog-ngs message parsers (patterndb, csv and JSON parsers), and show you how to create patterns using a text editor or a GUI. This can also be used to overwrite sensitive information due to privacy regulations. At the end, you will learn about the Perl/Python/Lua/Java bindings of syslog-ng Open Source Edition, how value pairs can be passed to them, and some reference applications written for syslog-ng. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/czploadays2015v1-150720123133-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Peter Czanik: syslog-ng - from log collection to processing and infomation extraction LOADays 2015. After a short introduction to system logging, we will show how the current log messages look like, and what the problem is with this free text format. Next, we will introduce you the powerful concept of name-value pairs, and how you can extract useful information from your logs by parsing log messages into name-value pairs. Next we will demonstrate the flexibility of syslog-ngs message parsers (patterndb, csv and JSON parsers), and show you how to create patterns using a text editor or a GUI. This can also be used to overwrite sensitive information due to privacy regulations. At the end, you will learn about the Perl/Python/Lua/Java bindings of syslog-ng Open Source Edition, how value pairs can be passed to them, and some reference applications written for syslog-ng.
LOADays 2015 - syslog-ng - from log collection to processing and infomation extraction from BalaBit
]]>
1221 1 https://cdn.slidesharecdn.com/ss_thumbnails/czploadays2015v1-150720123133-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Big Data Science - hype? /slideshow/big-data-science-hype/49605155 openacademy2015tl-150619151822-lva1-app6891
Big Data Science - hype?]]>

Big Data Science - hype?]]>
Fri, 19 Jun 2015 15:18:22 GMT /slideshow/big-data-science-hype/49605155 balabit@slideshare.net(balabit) Big Data Science - hype? balabit Big Data Science - hype? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/openacademy2015tl-150619151822-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Big Data Science - hype?
Big Data Science - hype? from BalaBit
]]>
2463 2 https://cdn.slidesharecdn.com/ss_thumbnails/openacademy2015tl-150619151822-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
DevAssistant, Docker and You /slideshow/slavek-kabrda-devassistantdockerandyou/49605112 slavekkabrdadevassistant-docker-and-you-150619151720-lva1-app6891
DevAssistant, Docker and You]]>

DevAssistant, Docker and You]]>
Fri, 19 Jun 2015 15:17:20 GMT /slideshow/slavek-kabrda-devassistantdockerandyou/49605112 balabit@slideshare.net(balabit) DevAssistant, Docker and You balabit DevAssistant, Docker and You <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/slavekkabrdadevassistant-docker-and-you-150619151720-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> DevAssistant, Docker and You
DevAssistant, Docker and You from BalaBit
]]>
778 1 https://cdn.slidesharecdn.com/ss_thumbnails/slavekkabrdadevassistant-docker-and-you-150619151720-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Linux Kernel Hogyan csapjunk bele? /slideshow/linux-kernel-hogyan-csapjunk-bele/49605007 kurusaleventelinuxkernelhogyancsapjunkbelealevesbe-150619151502-lva1-app6892
Linux Kernel Hogyan csapjunk bele?]]>

Linux Kernel Hogyan csapjunk bele?]]>
Fri, 19 Jun 2015 15:15:02 GMT /slideshow/linux-kernel-hogyan-csapjunk-bele/49605007 balabit@slideshare.net(balabit) Linux Kernel Hogyan csapjunk bele? balabit Linux Kernel Hogyan csapjunk bele? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/kurusaleventelinuxkernelhogyancsapjunkbelealevesbe-150619151502-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Linux Kernel Hogyan csapjunk bele?
Linux Kernel Hogyan csapjunk bele? from BalaBit
]]>
722 2 https://cdn.slidesharecdn.com/ss_thumbnails/kurusaleventelinuxkernelhogyancsapjunkbelealevesbe-150619151502-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Swift -Helyzetjelent辿s az iOS programoz叩s 炭j nyelv辿rl /slideshow/swift-helyzetjelents-az-ios-programozs-j-nyelvrl/49604964 kelenyiimreopenacademy-swift-150619151401-lva1-app6891
Swift -Helyzetjelent辿s az iOS programoz叩s 炭j nyelv辿rl]]>

Swift -Helyzetjelent辿s az iOS programoz叩s 炭j nyelv辿rl]]>
Fri, 19 Jun 2015 15:14:01 GMT /slideshow/swift-helyzetjelents-az-ios-programozs-j-nyelvrl/49604964 balabit@slideshare.net(balabit) Swift -Helyzetjelent辿s az iOS programoz叩s 炭j nyelv辿rl balabit Swift -Helyzetjelent辿s az iOS programoz叩s 炭j nyelv辿rl <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/kelenyiimreopenacademy-swift-150619151401-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Swift -Helyzetjelent辿s az iOS programoz叩s 炭j nyelv辿rl
Swift -Helyzetjelents az iOS programozs j nyelvr藜 from BalaBit
]]>
877 2 https://cdn.slidesharecdn.com/ss_thumbnails/kelenyiimreopenacademy-swift-150619151401-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
DATA DRIVEN DESIGN - avagy hogy f辿r 旦ssze a kreativit叩s a t辿nyekkel /slideshow/csertan-akos-openacademyrcclean/49604832 csertanakosopenacademyrcclean-150619151044-lva1-app6892
DATA DRIVEN DESIGN - avagy hogy f辿r 旦ssze a kreativit叩s a t辿nyekkel]]>

DATA DRIVEN DESIGN - avagy hogy f辿r 旦ssze a kreativit叩s a t辿nyekkel]]>
Fri, 19 Jun 2015 15:10:44 GMT /slideshow/csertan-akos-openacademyrcclean/49604832 balabit@slideshare.net(balabit) DATA DRIVEN DESIGN - avagy hogy f辿r 旦ssze a kreativit叩s a t辿nyekkel balabit DATA DRIVEN DESIGN - avagy hogy f辿r 旦ssze a kreativit叩s a t辿nyekkel <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/csertanakosopenacademyrcclean-150619151044-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> DATA DRIVEN DESIGN - avagy hogy f辿r 旦ssze a kreativit叩s a t辿nyekkel
DATA DRIVEN DESIGN - avagy hogy f莨r ssze a kreativits a t莨nyekkel from BalaBit
]]>
793 2 https://cdn.slidesharecdn.com/ss_thumbnails/csertanakosopenacademyrcclean-150619151044-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
syslog-ng: from log collection to processing and information extraction /slideshow/from-log-collectiontoprocessingandinformationextraction/45216627 from-log-collection-to-processing-and-information-extraction-150227043230-conversion-gate01
]]>

]]>
Fri, 27 Feb 2015 04:32:30 GMT /slideshow/from-log-collectiontoprocessingandinformationextraction/45216627 balabit@slideshare.net(balabit) syslog-ng: from log collection to processing and information extraction balabit <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/from-log-collection-to-processing-and-information-extraction-150227043230-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
syslog-ng: from log collection to processing and information extraction from BalaBit
]]>
2639 1 https://cdn.slidesharecdn.com/ss_thumbnails/from-log-collection-to-processing-and-information-extraction-150227043230-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
eCSI - The Agile IT security /slideshow/e-csi-brief/40057333 ecsibrief-141009041513-conversion-gate02
We present you the eCSI, an out-of-the-box security concept for facing this problem and to solve it business-friendly without bad compromises.]]>

We present you the eCSI, an out-of-the-box security concept for facing this problem and to solve it business-friendly without bad compromises.]]>
Thu, 09 Oct 2014 04:15:12 GMT /slideshow/e-csi-brief/40057333 balabit@slideshare.net(balabit) eCSI - The Agile IT security balabit We present you the eCSI, an out-of-the-box security concept for facing this problem and to solve it business-friendly without bad compromises. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ecsibrief-141009041513-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> We present you the eCSI, an out-of-the-box security concept for facing this problem and to solve it business-friendly without bad compromises.
eCSI - The Agile IT security from BalaBit
]]>
765 1 https://cdn.slidesharecdn.com/ss_thumbnails/ecsibrief-141009041513-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Top 10 reasons to monitor privileged users /slideshow/bala-bit-top10reasonstomonitorprivilegedusers/39193508 balabit-top-10-reasons-to-monitor-privileged-users-140917083047-phpapp02
A recent eCSI survey reveals that nearly a quarter of IT professionals use firewalls as their only protection against malicious insiders and targeted attacks, which is completely ineffective for that purpose. ]]>

A recent eCSI survey reveals that nearly a quarter of IT professionals use firewalls as their only protection against malicious insiders and targeted attacks, which is completely ineffective for that purpose. ]]>
Wed, 17 Sep 2014 08:30:47 GMT /slideshow/bala-bit-top10reasonstomonitorprivilegedusers/39193508 balabit@slideshare.net(balabit) Top 10 reasons to monitor privileged users balabit A recent eCSI survey reveals that nearly a quarter of IT professionals use firewalls as their only protection against malicious insiders and targeted attacks, which is completely ineffective for that purpose. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/balabit-top-10-reasons-to-monitor-privileged-users-140917083047-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A recent eCSI survey reveals that nearly a quarter of IT professionals use firewalls as their only protection against malicious insiders and targeted attacks, which is completely ineffective for that purpose.
Top 10 reasons to monitor privileged users from BalaBit
]]>
428 1 https://cdn.slidesharecdn.com/ss_thumbnails/balabit-top-10-reasons-to-monitor-privileged-users-140917083047-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds infographic White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Hogyan maradj eg辿szs辿ges irodai munka mellett? /slideshow/office-health/24648223 officehealth-130726063731-phpapp02
Hogy kiknek sz坦l ez a kiadv叩ny? Amatr旦knek. P叩lyakezdknek. jrakezdknek. Sohaelnemkezdknek. M叩rmint eg辿szs辿g fronton. F叩j坦s h叩ttal, 炭sz坦gumival a derekukon munk叩ban 炭sz坦 sorst叩rsainknak. Hogy kiknek nem sz坦l? Profiknak nem sz坦l, mert ahhoz sz叩nd辿kosan kev辿s. Misztikus-egzotikus csodaprogramokat habzsol坦 divat-eg辿szs辿geseknek sem sz坦l, mert nincs k旦nny撤 炭t. Csak egy 炭t van. Az al叩bbi p叩r oldalon 旦sszeszedt端k a legfontosabb tan叩csokat 辿s megt叩mogattuk ket azokkal a t辿nyeket, ami biol坦gi叩b坦l, anat坦mi叩b坦l, k辿mi叩b坦l stb... k旦vetkezik. Hisz端nk benne, hogy a meg辿rt辿s seg鱈ti a tud叩s alkalmaz叩s叩t.]]>

Hogy kiknek sz坦l ez a kiadv叩ny? Amatr旦knek. P叩lyakezdknek. jrakezdknek. Sohaelnemkezdknek. M叩rmint eg辿szs辿g fronton. F叩j坦s h叩ttal, 炭sz坦gumival a derekukon munk叩ban 炭sz坦 sorst叩rsainknak. Hogy kiknek nem sz坦l? Profiknak nem sz坦l, mert ahhoz sz叩nd辿kosan kev辿s. Misztikus-egzotikus csodaprogramokat habzsol坦 divat-eg辿szs辿geseknek sem sz坦l, mert nincs k旦nny撤 炭t. Csak egy 炭t van. Az al叩bbi p叩r oldalon 旦sszeszedt端k a legfontosabb tan叩csokat 辿s megt叩mogattuk ket azokkal a t辿nyeket, ami biol坦gi叩b坦l, anat坦mi叩b坦l, k辿mi叩b坦l stb... k旦vetkezik. Hisz端nk benne, hogy a meg辿rt辿s seg鱈ti a tud叩s alkalmaz叩s叩t.]]>
Fri, 26 Jul 2013 06:37:31 GMT /slideshow/office-health/24648223 balabit@slideshare.net(balabit) Hogyan maradj eg辿szs辿ges irodai munka mellett? balabit Hogy kiknek sz坦l ez a kiadv叩ny? Amatr旦knek. P叩lyakezdknek. jrakezdknek. Sohaelnemkezdknek. M叩rmint eg辿szs辿g fronton. F叩j坦s h叩ttal, 炭sz坦gumival a derekukon munk叩ban 炭sz坦 sorst叩rsainknak. Hogy kiknek nem sz坦l? Profiknak nem sz坦l, mert ahhoz sz叩nd辿kosan kev辿s. Misztikus-egzotikus csodaprogramokat habzsol坦 divat-eg辿szs辿geseknek sem sz坦l, mert nincs k旦nny撤 炭t. Csak egy 炭t van. Az al叩bbi p叩r oldalon 旦sszeszedt端k a legfontosabb tan叩csokat 辿s megt叩mogattuk ket azokkal a t辿nyeket, ami biol坦gi叩b坦l, anat坦mi叩b坦l, k辿mi叩b坦l stb... k旦vetkezik. Hisz端nk benne, hogy a meg辿rt辿s seg鱈ti a tud叩s alkalmaz叩s叩t. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/officehealth-130726063731-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Hogy kiknek sz坦l ez a kiadv叩ny? Amatr旦knek. P叩lyakezdknek. jrakezdknek. Sohaelnemkezdknek. M叩rmint eg辿szs辿g fronton. F叩j坦s h叩ttal, 炭sz坦gumival a derekukon munk叩ban 炭sz坦 sorst叩rsainknak. Hogy kiknek nem sz坦l? Profiknak nem sz坦l, mert ahhoz sz叩nd辿kosan kev辿s. Misztikus-egzotikus csodaprogramokat habzsol坦 divat-eg辿szs辿geseknek sem sz坦l, mert nincs k旦nny撤 炭t. Csak egy 炭t van. Az al叩bbi p叩r oldalon 旦sszeszedt端k a legfontosabb tan叩csokat 辿s megt叩mogattuk ket azokkal a t辿nyeket, ami biol坦gi叩b坦l, anat坦mi叩b坦l, k辿mi叩b坦l stb... k旦vetkezik. Hisz端nk benne, hogy a meg辿rt辿s seg鱈ti a tud叩s alkalmaz叩s叩t.
Hogyan maradj eg莨szs莨ges irodai munka mellett? from BalaBit
]]>
1339 4 https://cdn.slidesharecdn.com/ss_thumbnails/officehealth-130726063731-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Regulatory compliance and system logging /slideshow/regulatory-compliance-and-system-logging/17350007 regulatory-compliance-and-system-logging-130319024842-phpapp02
Log messages can be used to detect security incidents, operational problems, and other issues like policy violations, and are useful in auditing and forensics situations. From this white paper you can learn the advantages of using the syslog-ng Store Box logserver appliance to collect, store, and manage system log (syslog) and eventlog messages for policy compliance.]]>

Log messages can be used to detect security incidents, operational problems, and other issues like policy violations, and are useful in auditing and forensics situations. From this white paper you can learn the advantages of using the syslog-ng Store Box logserver appliance to collect, store, and manage system log (syslog) and eventlog messages for policy compliance.]]>
Tue, 19 Mar 2013 02:48:42 GMT /slideshow/regulatory-compliance-and-system-logging/17350007 balabit@slideshare.net(balabit) Regulatory compliance and system logging balabit Log messages can be used to detect security incidents, operational problems, and other issues like policy violations, and are useful in auditing and forensics situations. From this white paper you can learn the advantages of using the syslog-ng Store Box logserver appliance to collect, store, and manage system log (syslog) and eventlog messages for policy compliance. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/regulatory-compliance-and-system-logging-130319024842-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Log messages can be used to detect security incidents, operational problems, and other issues like policy violations, and are useful in auditing and forensics situations. From this white paper you can learn the advantages of using the syslog-ng Store Box logserver appliance to collect, store, and manage system log (syslog) and eventlog messages for policy compliance.
Regulatory compliance and system logging from BalaBit
]]>
723 6 https://cdn.slidesharecdn.com/ss_thumbnails/regulatory-compliance-and-system-logging-130319024842-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Kontrolle und revisionssichere Auditierung privilegierter IT-Zugriffe https://de.slideshare.net/slideshow/kontrolle-und-revisionssichere-auditierung-privilegierter-it-zugriffe/16499915 kontrolleundrevisionssichereauditierungprivilegierterit-zugriffe-130213021746-phpapp01
In einem Unternehmen gibt es meist eine Vielzahl unbekannter privilegierter Benutzer: Systemadministratoren, Benutzer mit Zugriff auf vertrauliche Inhalte besonders in IT-Architekturen, die mehrere Altsysteme enthalten.]]>

In einem Unternehmen gibt es meist eine Vielzahl unbekannter privilegierter Benutzer: Systemadministratoren, Benutzer mit Zugriff auf vertrauliche Inhalte besonders in IT-Architekturen, die mehrere Altsysteme enthalten.]]>
Wed, 13 Feb 2013 02:17:46 GMT https://de.slideshare.net/slideshow/kontrolle-und-revisionssichere-auditierung-privilegierter-it-zugriffe/16499915 balabit@slideshare.net(balabit) Kontrolle und revisionssichere Auditierung privilegierter IT-Zugriffe balabit In einem Unternehmen gibt es meist eine Vielzahl unbekannter privilegierter Benutzer: Systemadministratoren, Benutzer mit Zugriff auf vertrauliche Inhalte besonders in IT-Architekturen, die mehrere Altsysteme enthalten. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/kontrolleundrevisionssichereauditierungprivilegierterit-zugriffe-130213021746-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In einem Unternehmen gibt es meist eine Vielzahl unbekannter privilegierter Benutzer: Systemadministratoren, Benutzer mit Zugriff auf vertrauliche Inhalte besonders in IT-Architekturen, die mehrere Altsysteme enthalten.
from BalaBit
]]>
1194 3 https://cdn.slidesharecdn.com/ss_thumbnails/kontrolleundrevisionssichereauditierungprivilegierterit-zugriffe-130213021746-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Techreggeli - Logmenedzsment /slideshow/techreggeli-logmenedzsment/16421577 techreggeli-logmenedzsment-130208071446-phpapp02
]]>

]]>
Fri, 08 Feb 2013 07:14:46 GMT /slideshow/techreggeli-logmenedzsment/16421577 balabit@slideshare.net(balabit) Techreggeli - Logmenedzsment balabit <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/techreggeli-logmenedzsment-130208071446-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Techreggeli - Logmenedzsment from BalaBit
]]>
372 3 https://cdn.slidesharecdn.com/ss_thumbnails/techreggeli-logmenedzsment-130208071446-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
State of the art logging /slideshow/state-of-the-art-logging/16421540 stateoftheartlogging-130208071154-phpapp01
]]>

]]>
Fri, 08 Feb 2013 07:11:53 GMT /slideshow/state-of-the-art-logging/16421540 balabit@slideshare.net(balabit) State of the art logging balabit <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/stateoftheartlogging-130208071154-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
State of the art logging from BalaBit
]]>
921 2 https://cdn.slidesharecdn.com/ss_thumbnails/stateoftheartlogging-130208071154-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Why proper logging is important /slideshow/why-proper-logging-is-important/16421466 balabitwhyproperloggingisimportant-130208070702-phpapp01
]]>

]]>
Fri, 08 Feb 2013 07:07:02 GMT /slideshow/why-proper-logging-is-important/16421466 balabit@slideshare.net(balabit) Why proper logging is important balabit <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/balabitwhyproperloggingisimportant-130208070702-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Why proper logging is important from BalaBit
]]>
1360 3 https://cdn.slidesharecdn.com/ss_thumbnails/balabitwhyproperloggingisimportant-130208070702-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Balabit Company Overview /slideshow/balabit-company-overview/12648225 balabitcompanyoverviewwebfinal-120423022105-phpapp02
]]>

]]>
Mon, 23 Apr 2012 02:21:04 GMT /slideshow/balabit-company-overview/12648225 balabit@slideshare.net(balabit) Balabit Company Overview balabit <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/balabitcompanyoverviewwebfinal-120423022105-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Balabit Company Overview from BalaBit
]]>
1561 2 https://cdn.slidesharecdn.com/ss_thumbnails/balabitcompanyoverviewwebfinal-120423022105-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
https://cdn.slidesharecdn.com/profile-photo-balabit-48x48.jpg?cb=1552829920 What I learnt during my 17 years in the field of marketing is customer focus above all. It sounds banal but from this corny truth a lot of things follow: From the customers' point of view there is no separate marketing and sales processes. There is only one unified process which is the customer journey from the very first step to the end of use. From the customers' point of view your product is all of the values wholly you provide during the customer journey. Including gated contents in lead generation, free trainings in customer on-boarding, and your reputation which gives safety to your customers' decision makers. The product is the customer experience. From the customers' point of ... https://www.balabit.com https://cdn.slidesharecdn.com/ss_thumbnails/czpscale2016v1-160128140417-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/scale-2016-syslogng-from-raw-data-to-big-data/57606234 SCaLE 2016 - syslog-ng... https://cdn.slidesharecdn.com/ss_thumbnails/20150915-1520niasprezi05-151027130404-lva1-app6891-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/nias-2015-the-value-add-of-open-source-for-innovation/54429102 NIAS 2015 - The value ... https://cdn.slidesharecdn.com/ss_thumbnails/201510061140balabitlesassises20151001v2-for-slideshare-151022082138-lva1-app6892-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/les-assises-2015-why-people-are-the-most-important-aspect-of-it-security/54250721 Les Assises 2015 - Why...