LogRhythm Regenerated: Delivering on Promises to Serve Our Customers
Posted by: Christopher O’Malley
With Q2 2022 now at an end with sights on a bright future, we are pleased to release the Q3 quarterly delivery. LogRhythm is not only launching new versions of LogRhythm SIEM Platform (version 7.9), NDR, and UEBA solutions, but…
Read More
July 5, 2022
Protecting Your Network with LogRhythm NDR
Posted by: Derek Watkins
Protecting the network is an ongoing challenge for many cybersecurity professionals. At LogRhythm, our goal is to make it easier for you to detect and respond to network security threats quickly and effectively. We are pleased to announce the latest…
Read More
June 30, 2022
Q2 Analytic Co-Pilot Security Use Cases
Posted by: Daniel Chambers
LogRhythm’s Analytic Co-Pilot Services help customers accelerate threat detection and response by guiding users through the implementation and optimization of security analytics content and custom security use cases. While working closely with customers in Q2 2022, the Analytic Co-Pilot team…
Read More
June 29, 2022
Introducing LogRhythm Version 7.9: Simplify Your Job with Greater Efficiency and Enhanced Security
Posted by: Kish Dill
As part of our commitment to customers, we’re continuing to innovate and invest in the LogRhythm SIEM Platform. Since 2003, LogRhythm has been an ally in cybersecurity, helping reduce customers’ cyber risk, eliminate blind spots, and quickly shut down attacks.…
Read More
June 24, 2022
Leverage Your SIEM as Part of Your Zero Trust Strategy
Editor’s Note: This a partnered sponsored guest blog written by Avertium. Continuous monitoring is one of the most important facets of any Zero Trust architecture. The level of trust a system has in any user, application, or data flow may…
Read More
June 21, 2022
Detect Insider Threats with Cloud Native LogRhythm UEBA
Posted by: Melissa Ruzzi
The cyberthreat landscape has become more sophisticated due to the volume and complexity of attacks. That’s why it’s harder than ever to detect employees’ anomalous behavior or compromised accounts. As your security operations center (SOC) becomes more mature and you…
Read More
June 9, 2022