Customers

Introducing Student LogWars — A LogRhythm EDU Partnership Program

In the cybersecurity industry, one of the biggest problems facing recent graduates and employers is the lack of real-world experience from education. To address these challenges, LogRhythm is excited to announce a new facet of our EDU Partnership Program, Student…

Read More
Steve Flannery Headshot

LogRhythm Champions Profile: Steve Flannery

The LogRhythm Champions Network is an exclusive community of LogRhythm’s most passionate and strategic customers. This elite group of customer leaders in the InfoSec community are experts in all things LogRhythm. The LogRhythm Champions Network works to recognize these leaders for…

Read More
Seth Shestack Headshot

LogRhythm Champions Profile: Seth Shestack

The LogRhythm Champions Network is an exclusive community of LogRhythm’s most passionate and strategic customers. This elite group of customer leaders in the InfoSec community are experts in all things LogRhythm. The LogRhythm Champions Network works to recognize these leaders for…

Read More
LogRhythm and Netskope integration for blacklisting URLs

Automate URL and File Blacklisting with Netskope and LogRhythm

While many organizations focus on outside threats, network security shouldn’t be neglected. Having greater visibility into the websites people are searching and the files they are downloading in your network should be a priority. To strengthen your network visibility, LogRhythm…

Read More
Kevin Merolla

LogRhythm Champions Profile: Kevin Merolla

The LogRhythm Champions Network is an exclusive community of LogRhythm’s most passionate and strategic customers.  This elite group of customers leaders in the InfoSec community and are experts in all things LogRhythm. The LogRhythm Champions Network works to recognize these…

Read More
Mac Laptop

How to Audit and Test for Sudo’s CVE-2021-3156 with LogRhythm

TL/DR Qualys has reported that Sudo, before 1.9.4p2, has a heap-based buffer overflow vulnerability that allows privileged escalation to root via “sudoedit -s” and a command-line argument that ends with a single backslash character. Detecting a successful exploit of the…

Read More
Empty office

Code42 and LogRhythm Partner to Protect Against Insider Threats

As remote work has become the norm for many enterprises, organizations are struggling with the troubling reality of rising insider threats. Whether the results are from careless or negligent employees or malicious insiders, it’s crucial to arm your organization with…

Read More
Software AG targeted by double extortion ransomware attack, LogRhythm commentsSoftware AG targeted by double extortion ransomware attack, LogRhythm comments

LogRhythm and Getronics Partner for Comprehensive New SOC Solution

LogRhythm and Getronics announced a further commitment to the partnership that sees LogRhythm’s industry leading SIEM solution integrated into Getronics’ managed security offerings globally. The formal partnership allows the companies to tightly integrate LogRhythm’s SIEM solution – winner of SC Awards Europe 2020, Best SIEM Solution – with Getronics data processing and storage, located in the EU and meeting all GDPR regulatory requirements.

Read More
Avertium Enhances LogRhythm Expertise with Acquisition of 1440 Security

Avertium Enhances LogRhythm Expertise with Acquisition of 1440 Security

Avertium, an industry-leading managed security and strategic consulting partner to mid-to-large enterprises, today announced the acquisition of 1440 Security, a nationally recognized managed security service provider with a Colorado-based 24/7 security operations center…Named to the MSSP Alert Top 200 MSSPs list in 2019, 1440 Security has built a loyal customer base and a reputation for excellence in managed security, particularly in the deployment, configuration, and management of the LogRhythm NextGen SIEM Platform.

Read More
LogRhythm Customer Stories

LogRhythm Power Users Share their Use Cases

LogRhythm’s 4,000 customers are finding success every day while using our platform. We asked some of LogRhythm’s best power users how they solved the specific security problems that were plaguing their teams using the LogRhythm NextGen SIEM Platform. Following are…

Read More