Clear Next-Gen Leadership
Gartner recently released its annual Magic Quadrant for Security Information and Event Management (SIEM) research report, an assessment of, arguably, the most strategic part of the enterprise security operations stack. Driven by an increasingly complex and challenging threat landscape, this…
Read More
December 19, 2017
Journey to the AI-Enabled SOC: Unlocking Potential with Data
Posted by: Chris Petersen
The Importance of Data In my previous Journey to the AI-Enabled SOC blog, I mentioned the three key ingredients required to unlock the potential of artificial intelligence (AI) towards improved threat detection and transforming how enterprises realize threat lifecycle management:…
Read More
November 16, 2017
Phishing Intelligence Engine (PIE): Open-Source Release
We are pleased to announce the release of the LogRhythm Phishing Intelligence Engine (PIE), an integrated app with LogRhythm’s NextGen SIEM Platform. What is Phishing Intelligence Engine (PIE)? LogRhythm’s PIE can help streamline and automate the entire process of tracking,…
Read More
November 8, 2017
CloudAI for User and Entity Based Analytics (UEBA)
Earlier this month, LogRhythm proudly released LogRhythm CloudAI—the most recent chapter in our User and Entity Behavior Analytics (UEBA) story. LogRhythm CloudAI uses machine learning to apply behavioral analytics to user behavior. By modeling user behavior to uncover security relevant…
Read More
October 31, 2017
Journey to the AI-Enabled SOC: Genesis
Posted by: Chris Petersen
The LogRhythm Journey Begins Nearly 15 years ago, Phil Villella and I set out to change the definition of security information and event monitoring (SIEM). Our motivation originated in two fundamental beliefs: First, U.S. companies and agencies were running blind…
Read More
October 10, 2017
LogRhythm Enhances Cisco’s Security Hardware and Software Portfolio
Partnership Spotlight: Cisco Securing your organization is difficult work. Faced with an endless stream of data and disparate security tools, it’s easy to get lost in the noise. LogRhythm and Cisco can help you can sort through the noise and…
Read More
September 13, 2017
SANS Institute Validates LogRhythm’s Ability to Scale Above 300K MPS
The Importance of Security Analytics for Threat Prevention Many organizations are beginning to realize that they must use security analytics to recognize threats that bypass their preventative technologies. Unfortunately, despite the promise of a silver bullet, security analytics alone is…
Read More
June 7, 2017
Trifecta: LogRhythm Recognized by Forrester, SANS, and SC Labs
In just the last few months, LogRhythm has been named a Leader in the Forrester Wave: Security Analytics Platforms, Q1 2017 analyst report, was honored by the SANS Institute in the “Best of 2016 Awards” in the SIEM category for…
Read More
May 9, 2017
Stop Insider Threats with LogRhythm’s UEBA Capabilities
Detecting and responding to a threat in the earliest stages of the Cyber Attack Lifecycle is the key factor in preventing a breach from becoming a detrimental incident. LogRhythm User and Entity Behavior Analytics (UEBA) detects and neutralizes both known…
Read More
May 4, 2017
Do More with Security Orchestration, Automation, and Response (SOAR)
Posted by: Chris Petersen
Achieve Team Productivity and Sanity Without Hiring More Staff Small Teams Doing Important Work Security operations teams today are challenged with both getting the right staff and the right amount of staff. Most organizations are now just beginning to shift…
Read More
March 29, 2017
Achieving Intelligent Infrastructure Defense with LogRhythm’s Co-Pilot Service and Security Analytics
Retailers have learned hard lessons in recent years, as organizations such as Target have suffered major data breaches. In Target’s case, the compromised credit card information of 70 million customers have resulted in significant expense, lost revenues, and a damaged…
Read More
January 5, 2017
Avoid Major Data Breaches with Effective Threat Lifecycle Management
Posted by: Chris Petersen
A New Approach to Cybersecurity It’s a simple concept: The earlier you detect and mitigate a threat, the less the ultimate cost to your business. Implementing an effective end-to-end threat management process that focuses on reducing detection and response times…
Read More
December 1, 2016
The Best Gets Better: Introducing LogRhythm 7.2
Posted by: Chris Petersen
I’m excited to share our latest release, LogRhythm 7.2. It arms your team with the ability to detect, respond to, and neutralize threats before they result in damaging cyber incidents like a data breach. LogRhythm 7.2 builds upon the groundbreaking…
Read More
November 29, 2016
Detecting Home Network Issues with Network Monitor
I’ve been running a test Network Monitoring (NetMon) Mini device at home for the past few weeks and, up until recently, I didn’t notice anything “unexpected” on my home network. Figure 1: Miniature NetMon Home Appliance (Click on images to…
Read More
November 8, 2016
SIEM’s Total Cost of Ownership
Posted by: Michael Suby
Michael Suby, as Stratecast’s Vice President of Research in Frost & Sullivan, engages with his seasoned team of analysts and business strategists in defining research direction and in delivering impactful customer interactions. Leveraging a 15-year analyst career, Mr. Suby maintains…
Read More
August 22, 2016
Started Near the Bottom. Now We’re Here!
LogRhythm made its first appearance in the Gartner Magic Quadrant for SIEM as a Visionary back in 2008. At the time, ArcSight was the Goliath in the market in terms of market share, customer penetration, and momentum. David (aka LogRhythm)…
Read More
August 11, 2016
The Analyst Perspective on SIEM and Security Analytics
Resonance, Validation and Insight Gartner is wrapping up their annual Security & Risk Management Summit just outside of Washington D.C. today. It’s been a week of resonance, validation and insight: Resonance between what we’re hearing from the market and what…
Read More
June 17, 2016
When Incident Response is Critical, LogRhythm Forensic Co-Pilot Services Can Help
With the growing severity and volume of cyber threats, it’s inevitable that many organizations will fall victim to a breach that results in the loss of sensitive information. In 2015, the Ponemon Institute calculated that malicious attacks take an average…
Read More
April 13, 2016