Technology Partners

Technology Partners

At LogRhythm, we work closely with our Technology Partners, allowing you to deliver full solution services past LogRhythm and leverage opportunities for better customer solutions and business growth for you. More options and better integration mean increased sales and happier customers.

If you are a technology vendor interested in working with LogRhythm to enhance your offerings through a technology or business partnership, visit our Technology Alliance Partner (TAP) Program page to learn more.

To become a Technology Partner

Amazon Web Services is a subsidiary of which offers a suite of cloud computing services that make up an on-demand computing platform. These services operate from 12 geographical regions across the world.
Anomali logo
Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred.
Arista Networks logo
Arista Networks delivers software defined cloud networking for large data center and high-performance computing environments. With more than three million cloud networking ports deployed worldwide, Arista delivers a portfolio of 1/10/40 and 100 GbE products that redefine network architectures, bring extensibility to networking, and dramatically change the price/performance of data center.
AttackIQ Logo
AttackIQ is the leading independent provider in the emerging market of continuous security validation and built the industry’s first platform that enables red and blue teams to test the effectiveness of their security controls & staff. Our platform fully automates testing against the MITRE ATT&CK Matrix, a curated knowledge base and model for cyber adversary behavior used for planning security improvements and verifying security defenses work as expected.
BeyondTrust Logo

Beyond Trust is a cyber security company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks. Over 4,000 customers worldwide trust our risk intelligence platform of unified Privileged Account Management and Vulnerability Management solutions to shrink attack surfaces, identify threats, and maintain compliance.

Box logo
Box is an enterprise content management platform that solves simple and complex challenges, from sharing and accessing files on mobile devices to sophisticated business processes like data governance and retention.
Bromium logo
Bromium redefines endpoint protection and endpoint security with a new approach focused on isolation rather than detection. Inspired by the isolation principles of software virtualization, the Bromium team has created an innovative new technology called micro-virtualization to address the most important enterprise security problems and redefine protection for end users.
CarbonBlack logo
Carbon Black leads a new era of endpoint security by enabling organizations to disrupt advanced attacks, deploy the best prevention strategies for their business, and leverage the expertise of 10,000 professionals from IR firms, MSPs and enterprises to shift the balance of power back to security teams. Only Carbon Black continuously records and centrally retains all endpoint activity, making it easy to track an attacker’s every action, instantly scope every incident, unravel entire attacks and determine root causes. Carbon Black also offers a range of prevention options so organizations can match their endpoint defense to their business needs. Carbon Black has been named #1 in endpoint protection, incident response, and market share. Forward-thinking companies choose Carbon Black to arm their endpoints, enabling security teams to: Disrupt. Defend. Unite.
Check Point Software Technologies logo
Check Point Software Technologies Ltd. is the largest pure-play security vendor globally, provides industry-leading solutions, and protects customers from cyberattacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises’ networks to mobile devices, in addition to the most comprehensive and intuitive security management.
Cilasoft logo

Cilasoft is an industry leader in security and compliance software solutions for the IBM i platform. The Cilasoft Security Suite helps companies maintain compliance with industry regulations through robust auditing, access control, and authority elevation.

Cimcor provides a Real-Time Integrity Verification and Compliance solution with its CimTrak Integrity Suite.  CimTrak facilitates a comprehensive integrity management workflow that includes, change control, configuration management, roll-back and remediation, change prevention, file whitelisting, system benchmarking/hardening and a ticketing system.

Cisco Logo

Cisco Systems Inc is the worldwide leader in networking, transforming how people connect, communicate and collaborate. Cisco designs, manufactures, and sells IP-based networking and other products related to the communications and information technology industry.

Code42 Logo

Code42 is the leader in insider threat detection, investigation and response. Native to the cloud, Code42 rapidly detects potential data exfiltration across endpoints, email, cloud and SaaS applications to speed incident response – all without lengthy deployments, complex policy management or blocking employee productivity. With Code42, security professionals can protect corporate data and reduce insider risk while fostering an open and collaborative culture for employees. Backed by security best practices and control requirements, Code42’s insider threat solution can be configured for GDPR, HIPAA, PCI and other regulatory frameworks.

Cofense Logo
Cofense, formerly PhishMe, is the leading provider of human-driven phishing defense solutions worldwide. Our collective defense suite combines best-in class incident response technologies with timely attack intelligence sourced from employees. Cofense enables thousands of global organizations to stop attacks in progress faster and stay ahead of breaches.
CyberArk logo

CyberArk is the only security company that proactively stops the most advanced cyber threats – those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to protect against cyber threats before attacks can escalate and do irreparable business damage.

Cyber Observer logo
Cyber Observer is a continuous end-to-end cybersecurity assessment platform. Cyber Observer integrates security tools into a single intuitive interface that enables organizations to continuously monitor tool performance and maintain alignment with cybersecurity, business, and regulatory frameworks. The platform reduces business losses and audit costs by leveraging technology that performs continuous monitoring and auditing using Continuous Controls Monitoring (CCM) On-premises and in cloud (SSPM and CSPM).
Cybersponse logo
CyberSponse provides a unique and collaborative security operations platform that facilitates comprehensive and automated incident response lifecycle management. In the cyber world today, there are hundreds of tools that provide the end user with different alerts associated with Incident Management, Threat Management, Vulnerability Management, Physical Security and various other sensor data.
Cylance logo
Cylance® is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Our technology is deployed on over four million endpoints and protects hundreds of enterprise clients worldwide including Fortune 100 organizations and government institutions.
Dell Technologies logo
Dell provides integrated technology solutions worldwide. The company designs, develops, manufactures, markets, sells, and supports mobility products, including laptops, netbooks, tablets, and smartphones; desktops PCs; and servers and networking products.
Digital Defense logo

Serving clients across numerous industries, Digital Defense’s innovative and leading-edge technology helps organizations safeguard sensitive data and ease the burdens associated with information security. Frontline.Cloud, the original Security SaaS platform, delivers unparalleled accuracy and efficiencies through multiple systems including Frontline Vulnerability Manager (Frontline VM), Frontline Web Application Scanning (Frontline WAS), Frontline Active Threat Sweep (Frontline ATS) and Frontline Pen Test, while SecurED®, the company’s security awareness training, promotes employees’ security-minded behavior. The Digital Defense Frontline suite of solutions, underpinned by patented technology and complemented with superior service and support, are highly-regarded by industry experts, as illustrated by the company’s designation as a 2021 Tag Cyber Distinguished Vendor, 2020 U.S. Department of Labor Platinum Medallion Award, a five-star review in SC Magazine and CRN 5-Star Partner Program rating.

Dragos has a global mission: to safeguard civilization from those trying to disrupt the industrial infrastructure we depend on every day. The practitioners who founded Dragos were drawn to this mission through decades of government and private sector experience. Dragos codifies the knowledge of our cybersecurity experts into an integrated software platform that provides customers critical visibility into industrial control systems (ICS) and operational technology (OT) networks so that threats are identified and can be addressed before they become significant events. Our solutions protect organizations across a range of industries, including power and water utilities, energy, and manufacturing, and are optimized for emerging applications like the Industrial Internet of Things (IIOT). Dragos is privately held and headquartered in the Washington, DC area with regional presence around the world, including Canada, Australia, New Zealand, Europe, and the Middle East.

Visit for more information or follow us on Twitter or LinkedIn.

FairWarning logo
FairWarning® is a leading global provider of solutions which expand trust in mission critical applications such as Salesforce, Electronic Health Records and cloud-based applications. FairWarning solutions empower businesses globally to grow their reputation with their customers, increase velocity in their business and comply with complex Federal and state privacy laws such as HIPAA, PCI, SOX, FISMA and EU Data Protection Act.
FireEye Logo
FireEye is the leading provider of next-generation threat protection solutions focused on combating advanced malware, zero-day and targeted APT attacks. FireEye’s solutions supplement security defenses such as traditional and next-generation firewalls, IPS, antivirus and Web gateways. LogRhythm and FireEye, Integrated Security Intelligence.
ForeScout Logo

Forescout enables organizations to continuously monitor and mitigate security exposures and cyber attacks. The company’s flagship CounterACT™ appliance dynamically identifies and assesses network users, endpoints and applications to provide visibility, intelligence and policy-based mitigation of security issues. ForeScout’s open ControlFabric™ technology allows a broad range of IT security products and management systems to share information and automate remediation actions.

Fortinet Logo

Fortinet is a worldwide provider of network security appliances and the market leader in unified threat management (UTM). Fortinet’s products and subscription services provide broad, integrated and high-performance protection against dynamic security threats while simplifying the IT security infrastructure.

Gigamon Logo
The Gigamon Visibility Platform delivers pervasive visibility into the data in motion across your entire network. Their scalable visibility nodes, patented traffic intelligence applications and centralized orchestration optimizes your network monitoring and security infrastructure.
Guidance Software logo
Guidance Software is the maker of EnCase® Endpoint Security and is the leading provider of incident response and endpoint investigation solutions for corporate and government organizations. EnCase Endpoint Security enables customers to conduct thorough, network-enabled, computer incident response and breach investigations at the endpoint.
The Identity Defined Security Alliance is a group of identity and security vendors, solution providers and practitioners that acts as an independent source of education and information on identity-centric security strategies. The IDSA is a nonprofit organization that facilitates community collaboration to create a body of knowledge that provides organizations with practical guidance, implementation best practices and validated solutions to reduce the risk of a breach. The IDSA was originally established in 2015 by Ping Identity, with Optiv as founding solution provider.
Illusive Networks logo
Illusive Networks stops cyberattacks by destroying attackers’ ability to make safe decisions as they attempt to move toward their targets. Using Illusive, organizations eliminate high-risk pathways to critical systems, detect attackers early in the attack process, and capture real-time forensics that focus and accelerate incident response and improve resilience.
Imperva Logo

Imperva is a leading provider of cyber security solutions that protect business critical data and applications in the cloud and on-premises. The company’s SecureSphere, Incapsula and Skyfence product lines enable organizations to discover assets and risks, protect information wherever it lives – in the cloud and on-premises – and comply with regulations.

Infoblox logo
Infoblox delivers network control solutions, the fundamental technology that connects end users, devices, and networks. These solutions enable more than 8,100 enterprises and service providers to transform, secure, and scale complex networks. Infoblox helps take the burden of complex network control out of human hands, reduce costs, and increase security, accuracy, and uptime.
Ixia logo
Ixia provides application performance and security resilience solutions to validate, secure, and optimize businesses’ physical and virtual networks. Enterprises, service providers, network equipment manufacturers, and governments worldwide rely on Ixia’s solutions to deploy new technologies and achieve efficient, secure, ongoing operation of their networks.
LOGBinder develops software agents that extend the reach of SIEM and log management solutions – enabling them to collect and manage isolated application audit logs.
Microsoft Gold Certified Partner Badge
Microsoft develops, licenses and supports a range of software products and services for computing devices worldwide. The company markets and distributes its products and services through OEMs, distributors, and resellers, as well as online.
Mimecast logo
Mimecast (NASDAQ: MIME) makes business email and data safer for tens-of-thousands of customers and their millions of employees worldwide. Founded in 2003, the company’s next-generation cloud-based security, archiving and continuity services protect email and deliver comprehensive email risk management.
Netskope Logo
Netskope is the leader in cloud security. Using patented technology, Netskope’s cloud-scale security platform provides context-aware governance of all cloud usage in the enterprise in real-time, whether accessed from the corporate network, remote, or from a mobile device. This means that security professionals can understand risky activities, protect sensitive data, stop online threats, and respond to incidents in a way that fits how people work today. With granular security policies, the most advanced cloud DLP, and unmatched breadth of workflows, Netskope is trusted by the largest companies in the world. Netskope — security evolved
Okta Logo
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to both secure and manage their extended enterprise, and transform their customers’ experiences. With over 5,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely adopt the technologies they need to fulfill their missions. Over 4,000 organizations, including 20th Century Fox, JetBlue, Nordstrom, Slack, Teach for America and Twilio trust Okta to securely connect their people and technology.
Ordr logo
Ordr is delivering truly proactive protection for the hyper-connected enterprise, providing complete visibility and control over every class of connected device. The Ordr Systems Control Engine is purpose-built to continuously inspect, classify and baseline the behavior of every device. Ordr’s architecture is unique in its ability to process enormous quantities of data in real-time, using sophisticated AI to deliver closed-loop security, generating and implementing enforcement policies across existing multi-vendor network and security infrastructure.
Palo Alto Networks Logo
Palo Alto Networks has pioneered the next generation of network security with our innovative platform that allows you to secure your network and safely enable an increasingly complex and rapidly growing number of applications. At the core of this platform is our next-generation firewall, which delivers visibility and control over applications, users, and content within the firewall using a highly optimized hardware and software architecture.
Proofpoint logo
Proofpoint Enterprise Protection delivers everything needed to keep an organization safe from email threats by taking a full lifecycle approach to securing email. Proofpoint Enterprise Protection enhances security by providing phishing detection, anti-spam and anti-virus, connection management, and policy enforcement features into a comprehensive, easy-to manage platform.
Qualys logo
Qualys, Inc. is a pioneer and leading provider of cloud security and compliance solutions. The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Qualys’ solutions can be deployed in hours anywhere in the world, providing customers an immediate and continuous view of their security & compliance postures.
Recorded Future Logo
Recorded Future arms you with real-time threat intelligence so you can proactively defend your organization against cyber attacks. Indexing billions of facts, our patented Web Intelligence Engine continuously analyzes the entire Web, giving you unmatched insight into emerging threats. Recorded Future helps protect four of the top five companies in the world.
Red Seal logo
Red Seal provides a cybersecurity analytics platform to Global 2000 organizations that helps maximize digital resilience against cyber events. RedSeal’s advanced analytics engine creates functioning network models, tests networks to identify security risks, prioritizes needed actions, and provides critical information to quickly remediate issues. The result: measurable reduced cybersecurity risk and lower incident response and maintenance costs. With operations in North America, Europe, and Asia, RedSeal customers include leaders in finance, retail, technology, utilities, service providers, and government, all served by RedSeal’s channel partner network.
RevBits logo

As a unique integrated solution from a single vendor, RevBits CIP greatly reduces the overhead and complications that comes with deploying point solutions from multiple vendors. Dealing with differences in licensing schedules, commercial terms, help desk and support and other administrative burdens all become a thing of the past.

SailPoint Logo
SailPoint is the Worldwide Leader for Enterprise-Class Identity Governance. We minimize risk and maximize business growth by managing access to data and resources across your enterprise. We do it effectively and securely for every person who interacts with your organization—any user, on any device, anywhere in the world.
SecureAuth Logo
SecureAuth eliminates identity-related breaches through the continuous assessment of risk and the enablement of trust. The company is a leader in access management, identity governance, and penetration testing. SecureAuth’s Identity Security Automation platform redefines security through identity making it easier for organizations to prevent the misuse of credentials.
SentinelOne Logo
SentinelOne delivers autonomous endpoint protection through a single agent that successfully prevents, detects, and responds to attacks across all major vectors. Designed for extreme ease of use, the S1 platform saves customers time by applying AI to automatically eliminate threats in real time for both on premise and cloud environments and is the only solution to provide full visibility across networks directly from the endpoint. To learn more visit or follow us at @SentinelOne, on LinkedIn, YouTube, or on Twitter.
ServiceNow Logo
ServiceNow is changing the way people work. They help the modern enterprise operate at lightspeed and be more scalable than ever before. Customers use their platform to define, structure and automate the flow of work, removing dependencies on email, spreadsheets and other manual processes to transform the delivery of service to the enterprise.
Skyhigh Networks Logo
Skyhigh Networks helps enterprises safely adopt cloud services while meeting compliance, and governance requirements. Skyhigh discovers all cloud services in use, their associated risk; analyzes usage to identify security breaches, compromised accounts, user behavior/insider threats; and enforce security policies with encryption, data loss prevention, contextual access control, and activity monitoring.
STEALTHbits Logo
STEALTHbits is a cybersecurity software company focused on protecting an organization’s credentials and data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, we reduce security risk, fulfill compliance requirements and decrease operations expense. Identify threats. Secure data. Reduce risk.
Symantec Logo
Symantec DeepSight™ Intelligence provides actionable data about malicious activity sources, emerging threats, and vulnerabilities. DeepSight Intelligence DataFeeds are derived from deep, proprietary analysis of billions of events from the Symantec™ Global Intelligence Network. This intelligence can reduce exposure to threats through automated integration with existing security solutions.
Tenable Logo

Tenable™ Inc. is the Cyber Exposure company. Over 30,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 30 percent of the Global 2000 and large government agencies.

Learn more at

ThreatConnect logo
ThreatConnect is a cyber-security firm that provides a Threat Intelligence Platform for companies to aggregate and act upon threat intelligence. Designed by analysts but built for the entire team (security operations, threat intelligence, incident response and security leadership), ThreatConnect’s intelligence-driven security operations platform is the only solution available today with intelligence, automation, analytics, and workflows in a single platform. Centralize your intelligence, establish process consistency, scale operations, and measure your effectiveness in one place. To learn more about our threat intelligence platform (TIP) or security orchestration, automation, and response (SOAR) solutions.
Tripwire Logo
Tripwire is a leading provider of security, compliance and IT operations solutions. Their advanced capabilities deliver the foundational controls that deliver integrity assurance and are essential for security. Tripwire enhances the operational efficiency of these controls with automation and integration to help organizations maintain a known and trusted state: know what they have, know that it’s secure, and know when it changes.
Unisys Logo
Unisys is a global information technology company that builds high-performance, security-centric solutions for the most demanding businesses and governments. Unisys offerings include security software and services; digital transformation and workplace services; industry applications and services; and innovative software operating environments for high-intensity enterprise computing. For more information on how Unisys builds better outcomes securely for its clients across the Government, Financial Services and Commercial markets, visit
Varonis Logo
Varonis is a leading provider of software solutions that protect data from insider threats and cyberattacks. Through an innovative software platform, Varonis allows organizations to analyze, secure, manage, and migrate their volumes of unstructured data. Varonis specializes in file and email systems that store valuable spreadsheets, word processing documents, presentations, audio and video files, emails, and text. IT and business personnel deploy Varonis software for a variety of use cases, including data security, governance and compliance, user behavior analytics, archiving, search, and file synchronization and sharing.
VCE Logo

VCE is the global leader in virtualization and cloud infrastructure, delivers customer-proven solutions that reduce complexity and enable more flexible, agile service delivery. VMware enables enterprises to adopt a cloud model that addresses their unique needs.

Verodin Logo
Verodin’s Security Instrumentation Platform (SIP) is the first business platform to measure, manage and improve cybersecurity effectiveness. The revolutionary platform empowers organizations to remove assumptions and prove their security effectiveness with quantifiable, evidence-based data.
VMWare logo

VMware is the global leader in virtualization and cloud infrastructure, delivers customer-proven solutions that reduce complexity and enable more flexible, agile service delivery. VMware enables enterprises to adopt a cloud model that addresses their unique needs.

VSS Monitoring logo

VSS Monitoring is the leading provider of Network Packet Broker (NPB) technologies for the world’s largest telecom, enterprise & government networks. VSS’s advanced grooming and packet optimization solutions enable unmatched performance, visibility & ROI to the network monitoring & network security infrastructure.

WebRoot Logo

Webroot is the market leader in cloud delivered security software as a service (SaaS) solutions for consumers, businesses and enterprises. We have revolutionized Internet security to protect all the ways you connect online. Webroot delivers real-time advanced internet threat protection to customers through its BrightCloud® security intelligence platform, and its SecureAnywhere™ suite of security products for endpoints, mobile devices and corporate networks.

ZScaler Logo

Zscaler protects millions of users at more than 5,000 of the world’s leading enterprises and government organizations against cyber-attacks and data breaches while staying fully compliant with policies. Zscaler’s pure cloud-delivered solution provides a safe and productive Internet user experience from any device and from any location around the world.

Get Gartner’s complete analysis in the SIEM 2021 Magic Quadrant