{"type":"video","version":"1.0","html":"<iframe src=\"https://www.loom.com/embed/b5324b9e2a844247bf1f801621db299d\" frameborder=\"0\" width=\"2034\" height=\"1525\" webkitallowfullscreen mozallowfullscreen allowfullscreen></iframe>","height":1525,"width":2034,"provider_name":"Loom","provider_url":"https://www.loom.com","thumbnail_height":1525,"thumbnail_width":2034,"thumbnail_url":"https://cdn.loom.com/sessions/thumbnails/b5324b9e2a844247bf1f801621db299d-977d25c4cb3a3b8a.gif","duration":92.1,"title":"Detecting Rogue Events Using Log Tapping in Axoflow","description":"Mark Bonsack Director of Sales Engineering at Axoflow is talking about how you can use Axoflow to detect rogue data sources using log tapping."}