December 20, 2024
Monad Community Bytes - December 2024

Monad Community Bytes - December 🎇
As we wrap up the year, we wanted to express our gratitude for your continued support, feedback, and spreading the Monad gospel—it’s been instrumental in shaping our journey and what's to come next.
We're headed into 2025 with a full head of steam and couldn't be more excited to continue advancing ETL for security! 🔨
Wishing you a happy and prosperous new year! ✨
Product Updates 🎉

Our engineering and product teams continue rolling out new features and integrations at breakneck speeds🔥. Over the past month, we've rolled out:
- Ability to create data pipelines using our interactive drag-and-drop graph.
- Support for Azure Activity Logs, Azure Entra ID, Azure Log Analytics, and an HTTP Output.
- Ability to validate connection and credentials for all input connectors, during creation.
- Updated our JQ Transformation to use a code editor for an improved UX.
- And so much more!
If you're interested in trying Monad out or would like a demo, reach out to us at product@monad.com!
AI is only as good as the data it's trained on.. Yes, that includes Agents

"...the focus is on unifying data ecosystems to enable AI-driven insights. Data quality and privacy remain at the forefront, especially as AI applications demand fresh and accurate data." - Data Engineering Weekly
If you've recently spent any time on cybersecurity LinkedIn, X, or BlueSky, you're likely nauseated from the debate on autonomous cybersecurity agents and AI for security.
While opinions vary, one truth remains constant: "AI is only as good as the data it's trained on". And the truth is that data ETL, quality and consistency across security data sources are still hard problems most enterprises and security vendors face.
These are challenges that are at the core of our mission and we couldn't be more thrilled to help usher in the era of trustworthy and transparent AI for security. If you're building anything at this intersection and are interested in how Monad can help, let's chat: product@monad.com
Data Engineering For Cybersecurity Pt. 5: Data Routing - Coming Soon
.jpeg)
As mentioned above, security data ETL, consistency, and quality are still major challenges plaguing security teams and vendors. We've been covering these topics in depth in our Data Engineering for Cybersecurity blog series and will be releasing Part 5 on Data Routing next month.
For now, check out Part 4 which focused on Data Transformation and it's role in reducing alert fatigue, enabling vulnerability prioritization, and ultimately, making security data management simpler.
Join Our Slack Community!
If you’re a security practitioner working with data pipelines, log parsers, or detection and response, join our exclusive Slack community by messaging us at community@monad.com!
Have Feedback?
If you have any feedback on how to make these monthly digests more valuable or relevant to you, please reach out to us at feedback@monad.com!
Related content






