Blog

LogRhythm Blog

Check out the latest security tips and tricks, news, and insights and join in the conversation

The Analyst Perspective on SIEM and Security Analytics

Resonance, Validation and Insight Gartner is wrapping up their annual Security & Risk Management Summit just outside of Washington D.C. today. It’s been a week of resonance, validation and insight: Resonance between what we’re hearing from the market and what…

Read More

Enhanced Windows Security Event Log Collection

The Challenge Generating Actionable Intelligence from Windows Security Event Logs Microsoft Windows—love it or hate it—is near ubiquitous for desktop, laptop and notebooks, and it still makes an occasional appearance or two across all of the servers running on our…

Read More

Indefinite Disabled User Detection

The Challenge: Getting Rid of Disabled User Accounts What’s worse than the walking dead in real life? Zombie user accounts that suddenly have activity and intend to do harm to your organization. I have spoken with several organizations in the…

Read More

Using LogRhythm as a File Integrity Monitoring Honeypot

The Challenge: Detect Threat Actors Who Already Have Network Access Suppose you wanted to find threat actors lurking on your network—probably a good idea, right? To do this, you need to devise a way to be notified of strange activity.…

Read More

Using Deep Packet Analytics to Detect Personally Identifiable Information

The Challenge: Protecting Customers’ Personally Identifiable Information (PII) Businesses today have to ensure that they not only meet their regulatory compliance requirements, but also take reasonable and appropriate measures to protect their customers’ data (including their personally identifiable information). The…

Read More

See what we've been working on...

See how we're delivering on promises to better serve our customers