LogRhythm hackathon event

LogRhythm’s Hackathon Sparks New Innovation

Twice a year, the LogRhythm Research and Development team hosts an internal hackathon event to give our engineers an opportunity to collaborate, share innovative projects, and get awarded for their ideas. Past and present hackathon projects have inspired Product and…

Read More

Threat Intelligence Platforms and LogRhythm

Read More
Security operation center (SOC) team working in the office

What SOC Automation Tools Can Do for Your Team

Your analysts are efficient. They are creative problem solvers who prefer to spend their time putting those inventive skills to use rather than expending energy on mundane tasks. For example, logging into an active directory and unlocking a user account…

Read More
LogRhythm SmartResponse Automation to Qualify and Triage Alarms

Rapidly Qualify and Triage Alarms with Contextual SmartResponse Automation

Alarms don’t fire when it’s convenient. You could be threat hunting, out to lunch, or even in bed at 4 a.m. when an alarm comes your way. No matter where you are, you’ll need to quickly determine the severity of…

Read More
Investigate a threat quicker with automation

Notifying and Collaborating with LogRhythm SmartResponse Automation

When a threat emerges in your environment, you need to investigate it as soon as possible to keep it from incurring damage. For that to happen, you need to be notified that it exists in the first place. A typical…

Read More
LogRhythm Echo Logo

Introducing LogRhythm Echo

LogRhythm Echo is now available. LogRhythm Echo is a standalone app that simulates incident scenarios for demonstration purposes, allowing you to test security rules, verify embedded content, and perform red team preparedness exercises. Regardless of the size of your team,…

Read More

R&D Considerations for Developing a Big Data Product

Big data — it’s all the rage in the technology industry right now, and for good reason. Data holds information that, if analyzed properly, reveal invaluable insights that you can use for just about anything — from streamlining internal processes…

Read More

Troubleshooting Delayed Syslog Messages

Anytime our team has been involved in a system migration, there has always been someone who claimed the new system was slower than the old one. In a recent case, the team had just completed the migration of a computing…

Read More

Creating and Managing Playbooks with LogRhythm APIs

New to LogRhythm 7.4: Playbooks Feature Set Standard procedures have been a cornerstone of security best practice since their invention. You may call them runbooks, standing procedures, checklists, or playbooks. Either way, you likely have one or more collections of…

Read More
Outbound IRC alarm fires

Automate Common Threat Hunting and Response Actions with SmartResponse

When your team detects a threat, rapid qualification and response can mean the difference between quick containment and a breach of critical data. Relying solely on manual processes puts your organization at risk. To reduce response time, you should automate…

Read More

Recognize Indicators of Compromise with Complete Endpoint Visibility

As attacks increase in breadth, scope, and complexity, one of the most common vectors that remains is the endpoint. With up to thousands of endpoints to safeguard, it’s imperative to have solutions that seamlessly integrate to provide complete visibility into…

Read More
LogRhythm Centralized Metrics’ main dashboards are customizable and visualize data in one user interface

Measure and Optimize SOC Performance with New LogRhythm Tools

When faced with a bombardment of threats and a severe resource shortage, the best way to keep your organization ahead of a damaging attack is to make the most of what you have. You need your team and tools to…

Read More
You can use LogRhythm and Kibana to track data at the POS

Enrich Your Security Data with LogRhythm and Kibana

Data is a powerful tool. But storing, organizing, and adding value to it to enable better decisions can be difficult. Most companies strive to find a way to best preserve all of their data, and then use that data to…

Read More
Car manufacturing facility

IT Security in an OT World

Before we had the Internet of Things (IoT), ubiquitous wireless access, high speed data pipes, or even core internet protocols including HTTP and TCP, we had industrial automation. Operational Technology (OT) is the latest umbrella term to encompass functionalities such…

Read More