
Graylog, the AI-powered SIEM purpose-built for lean security teams, has introduced new advancements in explainable AI and automated investigation workflows. These enhancements are designed to help small and mid-sized security teams accelerate threat detection, conduct investigations with greater confidence, and significantly reduce the time spent on manual documentation.
“Lean security teams don’t have the luxury of analyst bench depth or months of automation tuning,” said Andy Grolnick, CEO of Graylog. “Every capability we are showing at RSA is designed around the same principle: rapidly detect, decide, and document from one command center, so analysts spend time on real threats, not busy work.”
The latest updates from Graylog bring AI-driven threat prioritization, agentic AI workflows powered by its open MCP Server, and new capabilities in the upcoming Spring 2026 release that automatically initiate investigations when asset risk thresholds are exceeded.
AI and Automation Capabilities
Graylog is introducing a suite of AI and automation enhancements aimed at enabling lean security teams to efficiently prioritize threats, speed up investigative processes, and minimize manual workloads for analysts.
• Threat Prioritization Engine: Aggregates related alerts using entity context, asset criticality, vulnerability intelligence, and threat campaign data to highlight the most critical issues while filtering out noise.
• Context-Aware Incident Response: Streamlines evidence gathering and orchestrates response workflows. AI Summarization converts collected data into actionable, step-by-step response guidance, cutting investigation time by up to 50 percent compared to traditional manual approaches.
• MCP Server – Conversational AI Across Security Environments: Integrates compatible large language models (LLMs) with Graylog’s security data via the Model Context Protocol. This enables natural language queries such as:
- “Show me assets that increased in risk score this week and are linked to open investigations,”
- “Summarize the top MITRE ATT&CK® techniques in failed logins over the last 24 hours,” and
- “Create an investigation for these three alerts and assign it to the SOC team.”
The MCP Server is included across all Graylog editions—Open, Enterprise, and Security—at no additional cost. Access to queries is governed by user roles and licensed capabilities, ensuring security and compliance. These features also lay the groundwork for advanced agentic security workflows built on the MCP Server.
Enabling Agentic AI Workflows
Graylog’s MCP Server is designed to support the development of agent-driven security operations. Organizations can create intelligent agents using Graylog’s published MSP tools, including:
- A triage agent that correlates alerts with identity providers, EDR platforms, and other security tools, automatically initiating containment actions.
- A compliance agent that aligns detection coverage with frameworks such as MITRE ATT&CK®, PCI, or NIST, generating cross-platform compliance reports.
- A false positive analysis agent that evaluates triggered events against historical trends and provides recommendations to improve detection accuracy.
- An event procedures agent that analyzes investigation evidence to produce context-aware response steps or directly executes actions through a triage agent.
All agents leveraging the MCP Server operate within Graylog’s existing role-based access control framework, ensuring transparency, traceability, and regulatory compliance. Human analysts remain involved for decisions requiring expert judgment.
Preview: Graylog Security Spring 2026 Release (v7.1)
Scheduled for release in May 2026, Graylog Security v7.1 introduces risk-based automated investigations. When an asset’s risk score surpasses a defined threshold, the platform automatically initiates a full investigation, compiles all relevant signals, and provides AI-generated recommendations for next steps—without requiring manual initiation.
This capability eliminates the need for separate automation platforms or additional licensing. Each investigation remains fully explainable, auditable, and traceable from initiation through resolution.
Join Graylog at Booth S-3134 at #RSAC 2026 for a hands-on demonstration of these new features.
About Graylog
Graylog is the AI-powered SIEM and centralized log management platform that transforms noisy data into clear insights. It helps security and IT teams detect and investigate threats faster with explainable AI that summarizes dashboards, prioritizes risks, and automates workflows – without losing human control. Graylog is trusted by 60,000+ organizations worldwide.
Learn more at graylog.com or connect with us on Bluesky and LinkedIn.
Join our LinkedIn group Information Security Community!

















