Product News

LogRhythm's True Unlimited Data Plan

LogRhythm Brings Greater Choice to SIEM Pricing

For years, consumption-based pricing has dominated the security information and event management (SIEM) market. Whether organizations paid a fixed amount based on message per second, event per second, or gigabyte per day, that model was the go-to standard. However, as…

Read More
LogRhythm releases the first unlimited data plan for SIEM

The Only Unlimited SIEM Data Plan in Town

Recently, you’ve heard a lot about unlimited data plans for security information and event management (SIEM) products in the information security (InfoSec) space. However, the word “unlimited” appears not to have an agreed upon definition across vendors. In fact, other…

Read More
LogRhythm True Unlimited Data Plan for SIEM

What Data Sources Would You Add to Your SIEM if Cost Wasn’t an Issue?

If your organization is dealing with digital transformation and modernizing your IT infrastructure, you’re likely also seeing data volumes in your environment grow rapidly. As your data grows, you need to find a security information and event management (SIEM) solution…

Read More
Cloud SIEM

The Top Five Benefits of Cloud SIEM, According to Security Experts

Gartner predicts that “By 2023, 80% of SIEM solutions will have capabilities that are only delivered via the cloud (for example, log storage, analytics, incident management), up from 20% currently.” As SIEM solutions start to offer their products via the…

Read More
LogRhythm Echo Logo

Introducing LogRhythm Echo

LogRhythm Echo is now available. LogRhythm Echo is a standalone app that simulates incident scenarios for demonstration purposes, allowing you to test security rules, verify embedded content, and perform red team preparedness exercises. Regardless of the size of your team,…

Read More
LogRhythm Desktop Dashboard

The LogRhythm NextGen SIEM Platform Moves to the Cloud

Principle Development Objectives for LogRhythm Cloud Building our award-winning NextGen SIEM Platform as a SaaS offering has been in the works for some time. When we initiated the project, our principle objective was quite simple: to deliver the most complete…

Read More

Selecting the Best Data Storage Solution for Your Organization

Security is powered by data, including many machine-generated log sources — from IT infrastructure to cloud applications, personal laptops to Point of Sale endpoints, and internet of things (IoT) devices. While you can’t investigate threats without it, it is often…

Read More

Leading from Every Angle: NextGen SIEM Leadership in 2019

I remember the first time LogRhythm was awarded Best SIEM by SC Media — formerly SC Magazine. It was 2009, Lady Gaga was winning Grammy awards, the global economy was at rock bottom, and LogRhythm had begun our climb to…

Read More
Compromise: Abnormal Process Activity” from the UEBA module

Aligning the LogRhythm NextGen SIEM Platform with the MITRE ATT&CK Framework

Contributors to this blog include Dan Kaiser and Brian Coulson. The MITRE ATT&CK framework is quickly becoming a focal point in the security world — and for good reason. This framework provides a consistent, industry-wide standard on which you can…

Read More
An AWS Activity Monitoring dashboard

Monitoring Cloud Infrastructure with LogRhythm: Data Collection

In the past few years, we’ve seen a massive uptick of interest in leveraging cloud infrastructure from Logrhythm customers. Just a few years ago, organizations viewed cloud as an interesting proposition for a few use cases. Today, we see many…

Read More

LogRhythm’s Road to Scalable Cloud Analytics

As a security company, our first priority is sharing relevant tools and content to make sure organizations can detect and respond to threats faster and more efficiently. To make this happen, there’s a lot that goes on behind the scenes;…

Read More

How LogRhythm 7.4 Drives Customer Success

Accelerating your return on investment (ROI) is critical to drive customer success at LogRhythm. But increasing ROI is only part of our secret sauce. Here at LogRhythm, we enable you to realize greater security operations workflow efficiency and increasingly advanced analytics with each release. To…

Read More

LogRhythm Named a Leader in the 2018 Gartner SIEM Magic Quadrant

We are pleased to see Gartner’s recognition of LogRhythm as a Leader in its recent release of Gartner’s Magic Quadrant for Security Information and Event Management (SIEM) research report. Figure 1: The 2018 Gartner SIEM Magic Quadrant This is on…

Read More
The Top Anomalous User Web Console Widget identifies the most anomalous user identity

Insight into User Behavior Using LogRhythm CloudAI: Part I

As Chief Scientist and de facto Technical Product Manager for LogRhythm’s Data Science team, I continuously evaluate the effectiveness of LogRhythm’s user and entity behavior analytics (UEBA) functionality to surface user activity that may be of interest to a security…

Read More

Is It Time to Find a New SIEM?

Though we go head-to-head on a daily basis, I would be remiss if I didn’t appreciate the competition amongst us vendors within the Security Information and Event Management (SIEM) space. It’s this healthy competition that drives each of our respective…

Read More

A Commitment to Customer Success: LogRhythm Receives Gartner Peer Insights Customers’ Choice Designation

Gartner recently announced that LogRhythm was named a 2018 Gartner Peer Insights Customers’ Choice for Security Information and Event Management (SIEM) Software. Based on more than 100 reviews, LogRhythm earned an average score of 4.4 out of five stars. More…

Read More

With Thoma Bravo, LogRhythm Innovation Accelerates

Last week, we announced a definitive agreement with Thoma Bravo, a leading private equity investment firm, to acquire a majority interest in LogRhythm. This investment validates LogRhythm’s significant history of market leadership and innovation, and is expected to support our…

Read More
Cyberattack Trends Reported in the 2017 Verizon Data Breach Investigations Report

Augmenting Your Cyber Resiliency Strategy with NextGen SIEM

The cybersecurity challenge centers around a fundamentally simple concept: Email keeps businesses running and stores critically important corporate and personal data, but email is also the top vector for cyberattacks. The cyberattack trends and numbers speak volumes: Figure 1: Cyberattack…

Read More