By collaborating at both a technical and business level, LogRhythm and its Technology Partners can help customers address a complex and evolving security threat landscape, meet their compliance requirements, and achieve greater operational efficiency. If you are a technology vendor and are interested in exploring how LogRhythm can enhance the value of your offerings through a technology or business partnership, contact our business development team.Partner Datasheets
Amazon Web Services is a subsidiary of Amazon.com which offers a suite of cloud computing services that make up an on-demand computing platform. These services operate from 12 geographical regions across the world.
Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred.
Arista Networks delivers software defined cloud networking for large data center and high-performance computing environments. With more than three million cloud networking ports deployed worldwide, Arista delivers a portfolio of 1/10/40 and 100 GbE products that redefine network architectures, bring extensibility to networking, and dramatically change the price/performance of data center.
Beyond Trust is a cyber security company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks. Over 4,000 customers worldwide trust our risk intelligence platform of unified Privileged Account Management and Vulnerability Management solutions to shrink attack surfaces, identify threats, and maintain compliance.
Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets.
Bradford Networks is the leading provider of rapid threat response solutions that minimize the risk and impact of cyber threats. The company’s patented Network Sentry solution enables Cyber Security Teams to continuously assess the risk of every user and endpoint on the network, and automatically remove vulnerable and compromised devices that act as backdoors for cyber criminals.
Bromium redefines endpoint protection and endpoint security with a new approach focused on isolation rather than detection. Inspired by the isolation principles of software virtualization, the Bromium team has created an innovative new technology called micro-virtualization to address the most important enterprise security problems and redefine protection for end users.
Carbon Black leads a new era of endpoint security by enabling organizations to disrupt advanced attacks, deploy the best prevention strategies for their business, and leverage the expertise of 10,000 professionals from IR firms, MSSPs and enterprises to shift the balance of power back to security teams. Only Carbon Black continuously records and centrally retains all endpoint activity, making it easy to track an attacker’s every action, instantly scope every incident, unravel entire attacks and determine root causes. Carbon Black also offers a range of prevention options so organizations can match their endpoint defense to their business needs. Carbon Black has been named #1 in endpoint protection, incident response, and market share. Forward-thinking companies choose Carbon Black to arm their endpoints, enabling security teams to: Disrupt. Defend. Unite.
Check Point Software Technologies Ltd. is the largest pure-play security vendor globally, provides industry-leading solutions, and protects customers from cyberattacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises’ networks to mobile devices, in addition to the most comprehensive and intuitive security management.
Cisco Systems Inc is the worldwide leader in networking, transforming how people connect, communicate and collaborate. Cisco designs, manufactures, and sells IP-based networking and other products related to the communications and information technology industry.
CloudLock is the cloud-native CASB and Cloud Cybersecurity Platform that helps organizations securely leverage cloud apps they buy and build. CloudLock delivers security visibility and control for SaaS, IaaS, PaaS and IDaaS environments across the entire enterprise in seconds. Together, CloudLock and Logrhythm empower security teams to better analyze and understand risk in cloud environments and the organization at large.
CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks. Using big-data technologies, CrowdStrike’s next-generation threat protection platform leverages real-time Stateful Execution Inspection (SEI) at the endpoint and Machine Learning in the cloud instead of solely focusing on malware signatures, indicators of compromise, exploits, and vulnerabilities.
CyberArk is the only security company that proactively stops the most advanced cyber threats – those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to protect against cyber threats before attacks can escalate and do irreparable business damage.
Cylance® is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Our technology is deployed on over four million endpoints and protects hundreds of enterprise clients worldwide including Fortune 100 organizations and government institutions.
FairWarning® is a leading global provider of solutions which expand trust in mission critical applications such as Salesforce, Electronic Health Records and cloud-based applications. FairWarning solutions empower businesses globally to grow their reputation with their customers, increase velocity in their business and comply with complex Federal and state privacy laws such as HIPAA, PCI, SOX, FISMA and EU Data Protection Act.
FireEye is the leading provider of next-generation threat protection solutions focused on combating advanced malware, zero-day and targeted APT attacks. FireEye’s solutions supplement security defenses such as traditional and next-generation firewalls, IPS, antivirus and Web gateways. LogRhythm and FireEye, Integrated Security Intelligence.
Forescout enables organizations to continuously monitor and mitigate security exposures and cyber attacks. The company’s flagship CounterACT™ appliance dynamically identifies and assesses network users, endpoints and applications to provide visibility, intelligence and policy-based mitigation of security issues. ForeScout’s open ControlFabric™ technology allows a broad range of IT security products and management systems to share information and automate remediation actions.
Fortinet is a worldwide provider of network security appliances and the market leader in unified threat management (UTM). Fortinet’s products and subscription services provide broad, integrated and high-performance protection against dynamic security threats while simplifying the IT security infrastructure.
Gigamon provides an intelligent Visibility Fabric architecture to enable the management of increasingly complex networks. Gigamon technology empowers infrastructure architects, managers and operators with pervasive visibility and control of traffic across both physical and virtual networks without affecting the performance or stability of the production environment.
Guidance Software is the maker of EnCase® Endpoint Security and is the leading provider of incident response and endpoint investigation solutions for corporate and government organizations. EnCase Endpoint Security enables customers to conduct thorough, network-enabled, computer incident response and breach investigations at the endpoint.
Imperva is a leading provider of cyber security solutions that protect business critical data and applications in the cloud and on-premises. The company’s SecureSphere, Incapsula and Skyfence product lines enable organizations to discover assets and risks, protect information wherever it lives - in the cloud and on-premises - and comply with regulations.
Infoblox delivers network control solutions, the fundamental technology that connects end users, devices, and networks. These solutions enable more than 8,100 enterprises and service providers to transform, secure, and scale complex networks. Infoblox helps take the burden of complex network control out of human hands, reduce costs, and increase security, accuracy, and uptime.
Ixia provides application performance and security resilience solutions to validate, secure, and optimize businesses’ physical and virtual networks. Enterprises, service providers, network equipment manufacturers, and governments worldwide rely on Ixia’s solutions to deploy new technologies and achieve efficient, secure, ongoing operation of their networks.
Liberman Software is a cybersecurity software company whose products help customers isolate and contain data breaches that occur after cyber-attacks penetrate the network perimeter. With its proactive cyber defense solutions, Lieberman Software protects access to systems with sensitive data from advanced persistent threats (APTs) and other forms of malware, as well as malicious insiders with elevated privileges.
Palo Alto Networks has pioneered the next generation of network security with our innovative platform that allows you to secure your network and safely enable an increasingly complex and rapidly growing number of applications. At the core of this platform is our next-generation firewall, which delivers visibility and control over applications, users, and content within the firewall using a highly optimized hardware and software architecture.
PhishMe® is the leading provider of human-focused phishing defense solutions for organizations concerned about their susceptibility to today’s top attack vector – spear phishing. PhishMe’s intelligence-driven platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. Our open approach ensures that PhishMe integrates easily into the security technology stack, demonstrating measurable results to improve security, aid incident response, and reduce the risk of compromise.
Proofpoint Enterprise Protection delivers everything needed to keep an organization safe from email threats by taking a full lifecycle approach to securing email. Proofpoint Enterprise Protection enhances security by providing phishing detection, anti-spam and anti-virus, connection management, and policy enforcement features into a comprehensive, easy-to manage platform.
Qualys, Inc. is a pioneer and leading provider of cloud security and compliance solutions. The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Qualys’ solutions can be deployed in hours anywhere in the world, providing customers an immediate and continuous view of their security & compliance postures.
Rapid7 is the leading provider of security risk intelligence solutions. Rapid7’s integrated vulnerability management and penetration testing products empower organizations to obtain accurate, actionable and contextual intelligence regarding their threat and risk postures.
Recorded Future arms you with real-time threat intelligence so you can proactively defend your organization against cyber attacks. Indexing billions of facts, our patented Web Intelligence Engine continuously analyzes the entire Web, giving you unmatched insight into emerging threats. Recorded Future helps protect four of the top five companies in the world.
Red Seal provides a cybersecurity analytics platform to Global 2000 organizations that helps maximize digital resilience against cyber events. RedSeal’s advanced analytics engine creates functioning network models, tests networks to identify security risks, prioritizes needed actions, and provides critical information to quickly remediate issues. The result: measurable reduced cybersecurity risk and lower incident response and maintenance costs. With operations in North America, Europe, and Asia, RedSeal customers include leaders in finance, retail, technology, utilities, service providers, and government, all served by RedSeal’s channel partner network.
SailPoint is the Worldwide Leader for Enterprise-Class Identity Governance. We minimize risk and maximize business growth by managing access to data and resources across your enterprise. We do it effectively and securely for every person who interacts with your organization—any user, on any device, anywhere in the world.
Skyhigh Networks helps enterprises safely adopt cloud services while meeting compliance, and governance requirements. Skyhigh discovers all cloud services in use, their associated risk; analyzes usage to identify security breaches, compromised accounts, user behavior/insider threats; and enforce security policies with encryption, data loss prevention, contextual access control, and activity monitoring.
Symantec DeepSight™ Intelligence provides actionable data about malicious activity sources, emerging threats, and vulnerabilities. DeepSight Intelligence DataFeeds are derived from deep, proprietary analysis of billions of events from the Symantec™ Global Intelligence Network. This intelligence can reduce exposure to threats through automated integration with existing security solutions.
Varonis is a leading provider of software solutions that protect data from insider threats and cyberattacks. Through an innovative software platform, Varonis allows organizations to analyze, secure, manage, and migrate their volumes of unstructured data. Varonis specializes in file and email systems that store valuable spreadsheets, word processing documents, presentations, audio and video files, emails, and text. IT and business personnel deploy Varonis software for a variety of use cases, including data security, governance and compliance, user behavior analytics, archiving, search, and file synchronization and sharing.
VMware is the global leader in virtualization and cloud infrastructure, delivers customer-proven solutions that reduce complexity and enable more flexible, agile service delivery. VMware enables enterprises to adopt a cloud model that addresses their unique needs.
VS Monitoring is the leading provider of Network Packet Broker (NPB) technologies for the world’s largest telecom, enterprise & government networks. VSS’s advanced grooming and packet optimization solutions enable unmatched performance, visibility & ROI to the network monitoring & network security infrastructure.
Webroot is the market leader in cloud delivered security software as a service (SaaS) solutions for consumers, businesses and enterprises. We have revolutionized Internet security to protect all the ways you connect online. Webroot delivers real-time advanced internet threat protection to customers through its BrightCloud® security intelligence platform, and its SecureAnywhere™ suite of security products for endpoints, mobile devices and corporate networks.
Zscaler protects millions of users at more than 5,000 of the world’s leading enterprises and government organizations against cyber-attacks and data breaches while staying fully compliant with policies. Zscaler’s pure cloud-delivered solution provides a safe and productive Internet user experience from any device and from any location around the world.