Product News

Security analyst using MistNet NDR by LogRhythm

Combating Ransomware and APTs with MistNet NDR

“Greetings! Your company network has been hacked. All of your important files have been encrypted!” Last year NPR revealed that over 65,000 companies received a ransomware note like this, averaging seven attacks per hour. Unfortunately, things appear to be getting…

Read More
Total Economic Impact Study of the LogRhythm SIEM Platform Reveals 258% ROI for Organizations

Total Economic Impact Study of the LogRhythm SIEM Platform Reveals 258% ROI for Organizations

Independent study by Forrester Consulting finds LogRhythm customers experience $3.1 million in benefits over three years, including faster investigation and resolution of security incidents LogRhythm, the company powering today’s security operations centers (SOCs), announced findings from a newly published Total…

Read More
Man working on computers at home

LogRhythm and Zscaler Partner to Streamline Website Access Control

As cybercrime continues to grow, your network’s security remains a top priority. To protect your network from potential threats, better access control over your network is paramount. Without it, you could be leaving your organization vulnerable to threats. To help,…

Read More
LogRhythm Detail Page

Every Security Incident has a Story

You have lots of security tools at your disposal, but do they help you visualize your data to identify threats or quickly resolve security incidents? Do you know what your data is telling you? LogRhythm uses security information and event…

Read More
LogRhythm and Netskope integration for blacklisting URLs

Automate URL and File Blacklisting with Netskope and LogRhythm

While many organizations focus on outside threats, network security shouldn’t be neglected. Having greater visibility into the websites people are searching and the files they are downloading in your network should be a priority. To strengthen your network visibility, LogRhythm…

Read More
LogRhythm NextGen SIEM Platform 7.7

Introducing LogRhythm 7.7: Improving the Analyst Experience with Detail Page and Timeline View

Security analysts are constantly challenged to investigate security incidents and mitigate them quickly. But does your security operations center (SOC) have the full picture of what’s occurring in the environment to remediate the impact of a false negative? LogRhythm is…

Read More
LogRhythm Releases Version 7.7 of NextGen SIEM Platform

LogRhythm Releases Version 7.7 of NextGen SIEM Platform

New Timeline View Enables Visual, Chronological Review of Security Incidents to Enhance Detection and Response Capabilities Boulder, Colo. — April 5, 2021 — LogRhythm, the company powering today’s security operations centers (SOCs), today announced the launch of version 7.7 of the…

Read More
mistnet on demand webinar

Introducing MistNet NDR by LogRhythm: Network Threat Detection Made Easy

Read More
MistNet NDR MITRE ATT&CK Threat Hunting

Network Threat Hunting Made Easy With the MistNet NDR MITRE ATT&CK™ Engine

Security professionals are widely adopting MITRE ATT&CK™ for network threat hunting. ATT&CK stands for Adversarial Tactics, Techniques and Common Knowledge, and it represents a globally accessible information base of adversary tactics and techniques based on real-world observations. MITRE ATT&CK provides…

Read More
LogRhythm Cloud Security Graphic

Threat Detection in the Public Cloud: Cloud Security Solutions

There is no debating it; the public cloud is here to stay, and therefore, the need for cloud security solutions continue to increase. According to Gartner, spending on public cloud services is forecast to grow 18.4% in 2021, totaling $304.9…

Read More
Security analyst using LogRhythm's SmartResponse automation

Using the Full Power of SmartResponse Automation

Mitigating identified threats is necessary to prevent any breach. Are you wondering how to respond to alerts provided by the LogRhythm NextGen SIEM Platform for identified threats? Analysts can use SmartResponse™ automation to initiate preventive actions such as blocking, blacklisting, and…

Read More
Hands typing on a computer

Analyze Attacker Behavior, Endpoint Detection Anomalies with LogRhythm and Carbon Black  

As cyberthreats continue to grow, enterprises like yours are challenged more than ever to protect the business from damage. And threats aren’t going away. By 2021, Cybercrime Magazine predicts a ransomware attack will occur on businesses every 11 seconds, up from…

Read More