Empowering Smarter Network Operations

Preduplication, Not Deduplication

Stop storing data you don't need.

How to deal with 10TB/day of Network analytics.

Read More

Needle in the Haystack is Overrated

Finding Full Bags of Needles is More Like It!

How to deal with 10TB/day of Network analytics.

Read More

Breaking Up With Splunk is Easy to Do

The Hidden Costs of Your Next Data Storm

How many of you have experienced a Splunk-Scenario-Gone-Bad (and costly, too)?

Read More

Deploying LogZilla in a PCI/NIST Environment

LogZilla is slim and fast - an easy installation with simple administration.

Customer Case Study - LogZilla in a PCI/NIST Environment

Read More

NetOps and the Holy Grail

The best kept secrets in Network Management

Reactive, Proactive, and Preemptive Network Operations

Read More

Did you hear the one about the definition of insanity?

When good networks go bad....

Are you still using the same process for managing your network that you did 5 years ago?

Read More

A T-Rex, CiscoLive, and Bruno Mars

this one time, at CiscoLive!...

Ever seen a T-Rex run?

Read More

Spinner Wars at CiscoLive!

when adults act like children...

Trade show toys are always a hit...

Read More

Fidget Spinners and Street Marketing at CiscoLive!

How to get the bathroom?

So we stumbled across a new way to drive customers to our booth...

Read More

The Network Operations Top 5

...and why they matter.

NetOps provides increased availability and efficiencies for...

Read More

So I built this amazing NetOps Platform..

website, and something occurred to me when I launched it.

Goodbye legacy, over-bloated software. It's time for the next generation.

Read More


How to detect the WannaCry Malware in seconds

LogZilla's Malware Detection capability is so easy that it will make you wannacry...

Read More

Download to Dashboards

How to actionable insight into your IT Operations in minutes.

LogZilla’s latest release includes dashboards for Cisco, Security, and Windows...

Read More

Syslog Essentials

A short primer on the use of syslog in NetOps

Most of us cannot remember a time before there was syslog.  I was introduced to Sun Solaris in 1998 while I was working...

Read More

Real-time Network Telemetry Streaming

Filter across your entire infrastructure, drill down in seconds

In the past two weeks I have had multiple conversations where I asked, "what do you like about LogZilla?" Instead of "it's fast or "it scales and saves us money", they have responded with...

Read More

Network Event Remediation in real-time

How to save 60 hours of skilled network engineering time

He said they spend a lot of engineering time on network issues with problem identification and resolution and provided us with...

Read More

Log Spikes and Message Storms

How well does your event manager handle traffic spikes?

Earlier this week one of our customers had a log storm due to a problem with a production server. They were...

Read More

Want To Save Money By Using Open Source?

Bad news...Open source is not Free.

We love open source and LogZilla actually...

Read More

Application Performance Degradation?

How to ensure your solution doesn't die along with the network

Read More

How to Save 82% on Log Management Costs

LogZilla's architecture and capabilities will save customers significantly.

LogZilla will save you money over any competitive solution.

Read More

Feeling TRAPped?

Only using SNMP Traps for event management?

If you aren't’t using syslog, it’s very likely that your event manager is missing 1000’s of...

Read More

Sending Apache Logs to LogZilla

How to send apache logs to syslog-ng

This method is not limited to Apache...

Read More

IP Blacklist to Cisco Access List

How to automatically convert IP Blacklists to Cisco IOS ACLs

Since I'm not much of a painter...

Read More

Heartbleed and Shellshock!

We constantly see systems that are so far behind in updates that they have known vulnerabilities...

Read More

How to send TLS encrypted logs using syslog-ng

Short primer on TLS with syslog

There's a ton of information in your log files that can be used to compromise or secure your network...

Read More