Product News

LogRhythm Named a Leader in the 2018 Gartner SIEM Magic Quadrant

We are pleased to see Gartner’s recognition of LogRhythm as a Leader in its recent release of Gartner’s Magic Quadrant for Security Information and Event Management (SIEM) research report. Figure 1: The 2018 Gartner SIEM Magic Quadrant This is on…

Read More
The Top Anomalous User Web Console Widget identifies the most anomalous user identity

Insight into User Behavior Using LogRhythm CloudAI: Part I

As Chief Scientist and de facto Technical Product Manager for LogRhythm’s Data Science team, I continuously evaluate the effectiveness of LogRhythm’s user and entity behavior analytics (UEBA) functionality to surface user activity that may be of interest to a security…

Read More

Is It Time to Find a New SIEM?

Though we go head-to-head on a daily basis, I would be remiss if I didn’t appreciate the competition amongst us vendors within the Security Information and Event Management (SIEM) space. It’s this healthy competition that drives each of our respective…

Read More

A Commitment to Customer Success: LogRhythm Receives Gartner Peer Insights Customers’ Choice Designation

Gartner recently announced that LogRhythm was named a 2018 Gartner Peer Insights Customers’ Choice for Security Information and Event Management (SIEM) Software. Based on more than 100 reviews, LogRhythm earned an average score of 4.4 out of five stars. More…

Read More

With Thoma Bravo, LogRhythm Innovation Accelerates

Last week, we announced a definitive agreement with Thoma Bravo, a leading private equity investment firm, to acquire a majority interest in LogRhythm. This investment validates LogRhythm’s significant history of market leadership and innovation, and is expected to support our…

Read More
Cyberattack Trends Reported in the 2017 Verizon Data Breach Investigations Report

Augmenting Your Cyber Resiliency Strategy with NextGen SIEM

The cybersecurity challenge centers around a fundamentally simple concept: Email keeps businesses running and stores critically important corporate and personal data, but email is also the top vector for cyberattacks. The cyberattack trends and numbers speak volumes: Figure 1: Cyberattack…

Read More

Defending Your Organization with User and Entity Behavior Analytics (UEBA)

User and entity-centric threats are a growing concern for security teams. In fact, according to the 2017 Verizon Breach Study, 69 percent of organizations report a recent insider data exfiltration attempt. Compounding matters, 91 percent of firms report inadequate insider…

Read More

Do You Have Real-Time Visibility into Your Epic EHR Instance?

In 2017, there were 477 reported health care breaches in the U.S. affecting 5.6 million patient records. Seventy-one percent of these breaches were due to hacking and IT incidents. In recent years, privacy breaches have proven to be a major…

Read More
Key Elements of LogRhythm’s UEBA Solution

SANS Puts LogRhythm’s UEBA Capabilities to the Test

The threat landscape grows increasingly unpredictable and dangerous as threat actors expand in number and their attacks increase in sophistication. From motivated insiders to well-armed nation-states, threats to your organization are increasing in number and difficulty of detection. When threats…

Read More

Journey to the AI-Enabled SOC: Advancing the Science of Threat Detection

Artificial Intelligence (AI)-enabled analytics offer great promise for furthering the science of advanced threat detection. While it is difficult to imagine AI superseding the cognitive and instinctive power of talented security analysts and threat hunters in the immediate future, AI…

Read More
Bad Code Rolls Use Case Analytics Rule

LogRhythm and DevOps: Bringing It All Together

There has been a recent uptick in corporate IT Development Operations (DevOps). Many tools, books, and experts sing the praises of the DevOps methodology. It can be difficult to fully recognize exactly what DevOps is and how it works, but…

Read More

Clear Next-Gen Leadership

Gartner recently released its annual Magic Quadrant for Security Information and Event Management (SIEM) research report, an assessment of, arguably, the most strategic part of the enterprise security operations stack. Driven by an increasingly complex and challenging threat landscape, this…

Read More

Journey to the AI-Enabled SOC: Unlocking Potential with Data

The Importance of Data In my previous Journey to the AI-Enabled SOC blog, I mentioned the three key ingredients required to unlock the potential of artificial intelligence (AI) towards improved threat detection and transforming how enterprises realize threat lifecycle management:…

Read More

Phishing Intelligence Engine (PIE): Open-Source Release

We are pleased to announce the release of the LogRhythm Phishing Intelligence Engine (PIE), an integrated app with LogRhythm’s NextGen SIEM Platform. What is Phishing Intelligence Engine (PIE)? LogRhythm’s PIE can help streamline and automate the entire process of tracking,…

Read More

CloudAI for User and Entity Based Analytics (UEBA)

Earlier this month, LogRhythm proudly released LogRhythm CloudAI—the most recent chapter in our User and Entity Behavior Analytics (UEBA) story. LogRhythm CloudAI uses machine learning to apply behavioral analytics to user behavior. By modeling user behavior to uncover security relevant…

Read More

Journey to the AI-Enabled SOC: Genesis

The LogRhythm Journey Begins Nearly 15 years ago, Phil Villella and I set out to change the definition of security information and event monitoring (SIEM). Our motivation originated in two fundamental beliefs: First, U.S. companies and agencies were running blind…

Read More

LogRhythm Enhances Cisco’s Security Hardware and Software Portfolio

Partnership Spotlight: Cisco Securing your organization is difficult work. Faced with an endless stream of data and disparate security tools, it’s easy to get lost in the noise. LogRhythm and Cisco can help you can sort through the noise and…

Read More

SANS Institute Validates LogRhythm’s Ability to Scale Above 300K MPS

The Importance of Security Analytics for Threat Prevention Many organizations are beginning to realize that they must use security analytics to recognize threats that bypass their preventative technologies. Unfortunately, despite the promise of a silver bullet, security analytics alone is…

Read More