Technology Partner Solution Briefs

Anomali

Anomali logo

LogRhythm and Anomali have developed an integrated solution for comprehensive security intelligence and threat management. LogRhythm automatically integrates actionable intelligence from the ThreatStream Platform with other machine data collected throughout the enterprise for comprehensive, real-time threat visibility and next generation security analytics…

BeyondTrust

BeyondTrust logo

LogRhythm and BeyondTrust have developed an integrated solution for enterprise security analytics and threat management. LogRhythm automatically incorporates vulnerability data from BeyondTrust’s Retina CS to deliver real-time cyber threat protection based on up-to-date situational awareness and comprehensive…

Bromium

Bromium logo

The joint solution allows organizations to automatically isolate and defeat advanced malware and gather accurate, actionable threat intelligence in real-time. Bromium vSentry, installed on the endpoint, uses hardware level isolation to defeat attacks against enterprise desktops…

Carbon Black

Carbon Black

LogRhythm and Carbon Black have partnered to deliver enterprise-wide threat detection and response. LogRhythm’s security intelligence and analytics platform continuously collects, normalizes, and analyzes rich, dynamic endpoint telemetry captured by Cb Response, including endpoint threat attribution…

Check Point

Check Point logo

LogRhythm and Check Point have developed an integrated solution for enterprise security intelligence and next generation network protection. The joint solution delivers advanced threat detection and response via a two way integration with Check Point. LogRhythm collects extensive insight into the entire security gateway from Check Point via OPSEC LEA for…

Cisco

Cisco logo

LogRhythm and Cisco have formed a strategic partnership to help organizations around the globe increase network visibility and secure their IT environments. LogRhythm offers extensive support for and integration across Cisco’s product portfolio…

Cofense

Cofense logo

The Cofense, formerly PhishMe, and LogRhythm integration provides security teams with the ability to quickly respond to phishing attacks that have bypassed infrastructure security controls. By leveraging the power of human reported phishing attacks, analysts can prioritize the most critical events and…

CyberArk

CyberArk logo

CyberArk has partnered with LogRhythm to deliver a real-time privileged activity monitoring solution. By combining the CyberArk Privileged Account Security Solution with LogRhythm’s Security Intelligence Platform, security analysts and audit teams can access the information they need to…

Cylance

Cylance logo

LogRhythm and Cylance® Cylance have partnered to deliver enterprise-wide threat prevention, analysis, and response. The LogRhythm Platform continuously collects, normalizes, and analyzes rich, dynamic endpoint telemetry captured by CylancePROTECT…

FairWarning

FairWarning logo

LogRhythm and FairWarning, Inc. have developed an integrated solution for comprehensive privacy auditing and monitoring capabilities. It delivers immediate protection from cyber security threats and data breaches such as unlawful access to Protected Health Information (PHI), and ensures compliance…

FireEye

FireEye logo

LogRhythm and FireEye have developed an integrated solution for comprehensive enterprise intelligence and threat management. LogRhythm’s advanced correlation and pattern recognition automatically incorporates threat intelligence from the FireEye Malware Protection System to deliver…

ForeScout

Forescout logo

LogRhythm and ForeScout have developed an integrated solution for comprehensive enterprise security intelligence and threat management. With the rapid expansion of the mobile workforce, organizations are increasingly at risk from a multitude of attacks that specifically target the endpoint…

Fortinet

Fortinet logo

Fortinet and LogRhythm have developed an integrated offering for comprehensive enterprise security intelligence and incident response management. LogRhythm gathers intelligence from Fortinet’s FortiGate high performance network security platform and correlates it against other security device and machine data…

Gigamon

Gigamon logo

Gigamon and LogRhythm have integrated their solutions – the Gigamon GigaSECURE® Security Delivery Platform and the LogRhythm Threat Lifecycle Management Platform with Network Monitor – to provide organizations with a comprehensive view of network traffic…

Infoblox

Infoblox logo

LogRhythm and Infoblox have developed an integrated solution for comprehensive enterprise security intelligence and continuous threat protection. Today’s targeted attacks pose threats to data and systems across the distributed enterprise. Increasingly, the Domain Name System (DNS) is being leveraged…

Ixia

Ixia logo

Ixia’s Vision ONE provides complete access to network data feeds that LogRhythm Network Monitor then identifies, captures, and analyzes for real-time security threats. Leveraging Network Monitor’s Deep Packet Analytics capability, the solution automates threat detection through continuous correlation of network data…

LOGbinder

LOGBinder logo

LOGbinder develops software agents that extend the reach of SIEM and log management solutions – enabling them to collect and manage isolated application audit logs…

Mimecast

Mimecast logo

LogRhythm and Mimecast have developed an integration that combines email security with enterprise security and threat management. LogRhythm’s advanced correlation and pattern recognition automatically consumes email security data directly from the Mimecast cloud service, delivering real-time cyberthreat protection based on up-to-date situational awareness and comprehensive security analytics. …

Okta

Okta logo

LogRhythm and Okta have partnered to deliver a robust identity monitoring solution. By combining the Okta Identity Cloud with LogRhythm’s NextGen Security Information and Event Management (SIEM), security analysts and audit teams correlate the information they need to identify and respond to the most critical incidents—those involving compromised credentials or unauthorized access …

Palo Alto Networks

Palo Alto Networks logo

LogRhythm and Palo Alto Networks have partnered to deliver enterprise-wide threat detection and response through deep forensic visibility, advanced behavioral analytics, and automated incident response orchestration and remediation. Next-generation firewalls from Palo Alto Networks…

Qualys

Qualys logo

LogRhythm and Qualys have developed an integrated solution for comprehensive enterprise security intelligence and threat management. LogRhythm’s advanced correlation and pattern recognition automatically incorporates vulnerability data imported directly from Qualys, delivering real-time cyber threat protection…

Recorded Future

Recorded Future logo

LogRhythm has developed a solution which integrates Recorded Future’s real-time threat intelligence into LogRhythm’s Security Intelligence Platform. LogRhythm automatically correlates petabytes of machine data collected from across the extended enterprise with actionable intelligence that Recorded Future…

SentinelOne

SentinelOne logo

LogRhythm and SentinelOne provide an integrated enterprise security solution to prevent, detect, and respond to threats in your environment. LogRhythm’s security analytics automatically incorporate rich endpoint telemetry from SentinelOne, enabling…

Symantec

Symantec logo

LogRhythm has developed a solution which integrates Symantec’s DeepSight Threat Intelligence into LogRhythm’s Security Intelligence Platform. LogRhythm automatically correlates actionable intelligence from Symantec’s DeepSight™ Intelligence DataFeeds with other machine data collected throughout the enterprise…

Tenable

Tenable logo

LogRhythm and Tenable have developed an integrated solution for comprehensive enterprise security and threat management. LogRhythm automatically incorporates vulnerability data imported directly from SecurityCenter and Tenable.io via API, delivering real-time cyber threat protection based on up-to-date…

Tripwire

Tripwire logo

LogRhythm and Tripwire have developed an integrated solution for comprehensive enterprise security and threat management. LogRhythm automatically incorporates vulnerability data imported directly from Tripwire IP360 via API, delivering real-time cyber threat protection…

Varonis

Varonis logo

With the integration of Varonis and LogRhythm, LogRhythm and Varonis customers gain unprecedented intelligence in the realm of unstructured data – what they typically have the most of yet know the least about. From initial reconnaissance through data exfiltration, Varonis and LogRhythm help you spot…

VMware

VMware logo

Merchants and service providers that transmit, store or process payment card information are required to meet all PCI DSS controls in order to fulfill the compliance standard for accepting payment cards. LogRhythm is working with VMware to provide solutions that help customers achieve PCI compliance through…

Webroot

Webroot logo

LogRhythm and Webroot have developed an integrated solution for comprehensive security intelligence and threat management. LogRhythm automatically integrates actionable intelligence from Webroot’s BrightCloud IP Reputation Service with other machine data collected throughout the enterprise for comprehensive…