LogRhythm Identity Inference Engine Adds New ID Lens; New Release Extends Accessibility via Mobile-Friendly UX

RSA CONFERENCE USA 2014 (Booth 1001)—SAN FRANCISCO—February 24, 2014— LogRhythm, The Security Intelligence Company, today announced enhancements to its award-winning Security Intelligence Platform. This latest release features the Identity Inference Engine™, which maps user information from related machine data to otherwise anonymous security events, delivering greater clarity and precision to security professionals trying to determine the “who” behind concerning activity. It also includes a powerful new user experience (UX) for web and tablet interfaces that provides increased accessibility to security intelligence for a growing base of mobile information security professionals. With these and other enhancements in scalability, performance and data collection, LogRhythm continues to demonstrate security industry leadership as the most innovative SIEM and security intelligence solution.

Chris Petersen from LogRhythm discusses how LogRhythm 6.2 delivers security intelligence.

Many logs and machine data are generated without any information regarding the user associated with an event (e.g., firewall logs, IDS events, etc.). While manual investigations can often tie a user to such activities, manual correlations across all log and machine data is impractical. LogRhythm’s new Identity Inference Engine applies user identity information to otherwise “anonymous logs” by extracting identity information from related machine data that record and report user ID info in their standard log taxonomies. In an era of increasingly stealthier attacks, tying user information to anonymous security events can mean the difference between detecting and responding to an advanced threat quickly and effectively, and being blind to the event altogether.

Increasingly, IT and security managers require rapid access to security intelligence from any location. LogRhythm’s new UX for web and tablets presents the most critical information in a format that is readily accessible, consumable and actionable, while also enabling rapid and deep drill-down when necessary. Leveraging the latest in web technology, the new UX also enables search and high-performance analytics. The UX is truly touch-compatible/touch-optimized to enable mobile users to access critical security intelligence and threat information from anywhere.

“I was immediately impressed by LogRhythm’s interface for web and tablets,” says Kevin Demers, senior security engineer at Nelnet Corporate Security Group. “The ease of access and the speed at which data is available has given us unprecedented visibility into our environment, for both the security team and our operations teams.”

“LogRhythm has once again delivered powerful innovations in performance, usability and detection at a time when the need has never been greater,” said Jon Oltsik, senior principal analyst at Enterprise Strategy Group (ESG). “Current ESG research shows that information security teams are facing a growing shortage of people, skills and time. The enhancements in LogRhythm’s latest release enable enterprises to address these issues by helping them do more with less – and do it faster. And, security pros are going to benefit from the new UI as it is intuitive and powerful at the same time.”

“Having the ability to identify the users behind critical security events is more essential than ever in today’s environment of increasingly veiled attack vectors. Our new Identity Inference Engine helps lift that veil by tying accurate user information to otherwise anonymous events,” said Chris Petersen, chief technology officer and co-founder of LogRhythm. “Additionally, our new UX for web and tablets extends the accessibility of true security intelligence to an increasingly mobile IT security audience. We’re very pleased to continue our innovation leadership with the latest release of LogRhythm’s Security Intelligence Platform.”

The LogRhythm Security Intelligence Platform is a next-generation security intelligence solution that can detect an ever-expanding landscape of sophisticated and advanced threats that evade other security approaches. Other key enhancements within LogRhythm 6.2 include:

  • Support for the most demanding enterprises: With further extension of LogRhythm’s massively scalable machine-based analytics engine, the solution can accommodate real-time analytics for even the largest and most demanding environments. New performance enhancements were made to LogRhythm’s Host Forensics and File Integrity Monitoring functions as well.
  • New data capture support: LogRhythm now offers added data capture and log normalization support for more than 100 new systems, bringing the number of total supported systems, applications and devices to an industry-leading 650.

The new version of the LogRhythm Security Intelligence Platform is available now and pricing starts at just under $30,000 for entry-level solutions. For more information, please visit LogRhythm.com.

About LogRhythm

LogRhythm helps security teams stop breaches by turning disconnected data and signals into trustworthy insights. From connecting the dots across diverse log and threat intelligence sources to using sophisticated machine learning that spots suspicious anomalies in network traffic and user behavior, LogRhythm accurately pinpoints cyberthreats and empowers professionals to respond with speed and efficiency.

With cloud-native and self-hosted deployment flexibility, out-of-the-box integrations, and advisory services, LogRhythm makes it easy to realize value quickly and adapt to an ever-evolving threat landscape. Together, LogRhythm and our customers confidently monitor, detect, investigate, and respond to cyberattacks. Learn more at logrhythm.com.

Comments are closed.