Back in August, I had an amazing conversation with Randy Franklin Smith of Ultimate Windows Security during a webinar. We talked about how to identify a number of security scenarios simply by looking at network traffic. If you...Read More
The security operations center (SOC) at Danish telecoms operator TDC recently published a report with regards to an ICMP based DoS/DDoS style of attack. This attack effectively makes use of ICMP type 3 and code 3 crafted packets...Read More
I would recommend LogRhythm Network Monitor because it provides valuable insight into suspicious network activity with the ability to retain packet captures for more detailed analysis.– Security Officer, Large Enterprise Aerospace & Defense Company
When our organization identifies suspicious activity in the console, we use Network Monitor’s full packet capture capability to perform further analysis and gather evidence.– IT Manager, Medium Enterprise Electronics Company
[Our organization] had a need for better network visibility with our internet facing links, LogRhythm’s Network Monitor gives us an efficient and cost effective means of doing that.– Michael Smith, IT Manager, Navigant International, Inc.
We use LogRhythm for all logging and auditing. We have significantly enhanced our return time on getting executive reports out and the reports return much more information.– IT Specialist, Medium Enterprise Insurance Company
Using LogRhythm Network Monitor we were able to detect IRC traffic using non-standard ports and suspicious DNS traffic.– IT Manager, Large Enterprise Aerospace & Defense Company
I would recommend LogRhythm because the features and ease of use for all aspects of the system are head over heels above the competition.– IT Specialist, Medium Enterprise Insurance Company
Cyberthreat intelligence is just data if it is not actionable. We offer tips to help your team focus on relevant CTI for faster threat detection and response...