- Partner Overview
- Partner Program
- Technology Partners
At LogRhythm, we work closely with our Technology Partners, allowing you to expand solution services including LogRhythm and leverage opportunities for better customer solutions and business growth. More options and better integration mean increased sales and happier customers.
A Solution for Every Environment
Endpoint monitoring and threat detection
Cloud security monitoring
Cyber crime and fraud detection
Technology Alliance Partner Directory
Sort
A10 Networks
Amazon Web Services (AWS)
Amazon Web Services is a subsidiary of Amazon.com which offers a suite of cloud computing services that make up an on-demand computing platform. These services operate from 12 geographical regions across the world.
Anomali
Anomali offers an industry-leading AI-Powered solution that elevates your security operations and defense capabilities in one platform. They consolidate your tech stack, giving you never- before-seen speed, scale, and performance at a fraction of the cost. Anomali empowers your team and helps you retain talent. Simply different.
AttackIQ
AttackIQ is the leading independent provider in the emerging market of continuous security validation and built the industry’s first platform that enables red and blue teams to test the effectiveness of their security controls & staff. Our platform fully automates testing against the MITRE ATT&CK Matrix, a curated knowledge base and model for cyber adversary behavior used for planning security improvements and verifying security defenses work as expected.
Balbix
Beyond Trust
Beyond Trust is a cyber security company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks. Over 4,000 customers worldwide trust our risk intelligence platform of unified Privileged Account Management and Vulnerability Management solutions to shrink attack surfaces, identify threats, and maintain compliance.
Bitdefender
Founded in 2001 in Romania, Bitdefender is one of the most trusted cybersecurity companies, consistently leading independent evaluations, securing hundreds of millions of systems worldwide, and licensing technology to over 180 major technology brands. Bitdefender operates exclusively as a cybersecurity organization, with Bitdefender Labs at its core, serving as a research institute, a source for security and engineering innovations and threat intelligence. Bitdefender’s deep ties with academia enable cutting-edge developments in ML/AI since 2008, neural networks, and quantum security, while our extended collaboration with global law enforcement agencies plays a pivotal role in disrupting cybercriminal activities. Our proprietary technologies, trusted by hundreds of cybersecurity vendors, ensure robust protection for our customers against even the most severe threats.
BlackBerry Cylance
Cylance is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Our technology is deployed on over four million endpoints and protects hundreds of enterprise clients worldwide including Fortune 100 organizations and government institutions.
Box
Box is an enterprise content management platform that solves simple and complex challenges, from sharing and accessing files on mobile devices to sophisticated business processes like data governance and retention.
Broadcom
Symantec DeepSight™ Intelligence provides actionable data about malicious activity sources, emerging threats, and vulnerabilities. DeepSight Intelligence DataFeeds are derived from deep, proprietary analysis of billions of events from the Symantec™ Global Intelligence Network. This intelligence can reduce exposure to threats through automated integration with existing security solutions.
Carbon Black
Carbon Black leads a new era of endpoint security by enabling organizations to disrupt advanced attacks, deploy the best prevention strategies for their business, and leverage the expertise of 10,000 professionals from IR firms, MSPs and enterprises to shift the balance of power back to security teams. Only Carbon Black continuously records and centrally retains all endpoint activity, making it easy to track an attacker’s every action, instantly scope every incident, unravel entire attacks and determine root causes. Carbon Black also offers a range of prevention options so organizations can match their endpoint defense to their business needs. Carbon Black has been named #1 in endpoint protection, incident response, and market share. Forward-thinking companies choose Carbon Black to arm their endpoints, enabling security teams to: Disrupt. Defend. Unite.
Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. is the largest pure-play security vendor globally, provides industry-leading solutions, and protects customers from cyberattacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises’ networks to mobile devices, in addition to the most comprehensive and intuitive security management.
Cimcor
Cimcor provides a Real-Time Integrity Verification and Compliance solution with its CimTrak Integrity Suite. CimTrak facilitates a comprehensive integrity management workflow that includes, change control, configuration management, roll-back and remediation, change prevention, file whitelisting, system benchmarking/hardening and a ticketing system.
Cisco
Cisco Systems Inc is the worldwide leader in networking, transforming how people connect, communicate and collaborate. Cisco designs, manufactures, and sells IP-based networking and other products related to the communications and information technology industry.
Code42
Code42 is the leader in insider threat detection, investigation and response. Native to the cloud, Code42 rapidly detects potential data exfiltration across endpoints, email, cloud and SaaS applications to speed incident response – all without lengthy deployments, complex policy management or blocking employee productivity. With Code42, security professionals can protect corporate data and reduce insider risk while fostering an open and collaborative culture for employees. Backed by security best practices and control requirements, Code42’s insider threat solution can be configured for GDPR, HIPAA, PCI and other regulatory frameworks.
Cofense
Cofense, formerly PhishMe, is the leading provider of human-driven phishing defense solutions worldwide. Our collective defense suite combines best-in class incident response technologies with timely attack intelligence sourced from employees. Cofense enables thousands of global organizations to stop attacks in progress faster and stay ahead of breaches.
Cribl
LogRhythm and Cribl work together to help organizations around the globe get the most out of their data, increase visibility, and protect against modern attacks. The combined solution empowers security teams to identify behavioral anomalies, internal, and external threats, and to prioritize their responses based on accurate enterprise security intelligence. LogRhythm and Cribl empower security teams to navigate a changing landscape with confidence.
Criminal IP
Criminal IP is a threat intelligence search engine that scans the whole internet and uncovers all kinds of information on any internet connected device.
Powered by AI and Machine Learning, Criminal IP detects and assesses the risks and vulnerabilities associated with any internet connected devices in real-time. leveraging various powerful Lookup features and filters, it grants you a comprehensive view of the ever-evolving cyber risks.
CyberArk
CyberArk is the only security company that proactively stops the most advanced cyber threats – those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to protect against cyber threats before attacks can escalate and do irreparable business damage.
Cyware
Cyware enhances security operations, fostering collaboration and automated threat response. Its Cyber Fusion solutions empower lean teams to preemptively thwart threats, streamline incident analysis, slash response times, and alleviate analyst burnout. Benefiting enterprises, government agencies, and MSSPs, Cyware is a key player in global threat intelligence sharing platforms for ISAC/ISAO communities.
D3 Security
D3 Security’s Smart SOAR platform is the only SOAR platform that combines automation and orchestration across unlimited integrated tools with an automated event pipeline that reduces event volume by 90% or more. Smart SOAR’s codeless playbooks automate enrichment and remediation tasks, while making it easy for enterprises and MSSPs to build, modify, and scale workflows for security operations, incident response, and threat hunting.
Dell
Dell provides integrated technology solutions worldwide. The company designs, develops, manufactures, markets, sells, and supports mobility products, including laptops, netbooks, tablets, and smartphones; desktops PCs; and servers and networking products.
Dragos
Dragos has a global mission: to safeguard civilization from those trying to disrupt the industrial infrastructure we depend on every day. The practitioners who founded Dragos were drawn to this mission through decades of government and private sector experience. Dragos codifies the knowledge of our cybersecurity experts into an integrated software platform that provides customers critical visibility into industrial control systems (ICS) and operational technology (OT) networks so that threats are identified and can be addressed before they become significant events. Our solutions protect organizations across a range of industries, including power and water utilities, energy, and manufacturing, and are optimized for emerging applications like the Industrial Internet of Things (IIOT). Dragos is privately held and headquartered in the Washington, DC area with regional presence around the world, including Canada, Australia, New Zealand, Europe, and the Middle East. Visit dragos.com for more information or follow us on Twitter or LinkedIn.
FireEye
FireEye is the leading provider of next-generation threat protection solutions focused on combating advanced malware, zero-day and targeted APT attacks. FireEye’s solutions supplement security defenses such as traditional and next-generation firewalls, IPS, antivirus and Web gateways. LogRhythm and FireEye, Integrated Security Intelligence.
Forescout
Forescout enables organizations to continuously monitor and mitigate security exposures and cyber attacks. The company’s flagship CounterACT™ appliance dynamically identifies and assesses network users, endpoints and applications to provide visibility, intelligence and policy-based mitigation of security issues. ForeScout’s open ControlFabric™ technology allows a broad range of IT security products and management systems to share information and automate remediation actions.
Fortinet
Fortinet is a worldwide provider of network security appliances and the market leader in unified threat management (UTM). Fortinet’s products and subscription services provide broad, integrated and high-performance protection against dynamic security threats while simplifying the IT security infrastructure.
Gigamon
The Gigamon Visibility Platform delivers pervasive visibility into the data in motion across your entire network. Their scalable visibility nodes, patented traffic intelligence applications and centralized orchestration optimizes your network monitoring and security infrastructure.
Google Cloud
GoTo
Infoblox
Infoblox delivers network control solutions, the fundamental technology that connects end users, devices, and networks. These solutions enable more than 8,100 enterprises and service providers to transform, secure, and scale complex networks. Infoblox helps take the burden of complex network control out of human hands, reduce costs, and increase security, accuracy, and uptime.
IronNet
Jamf
Jamf’s purpose is to simplify work by helping organizations manage and secure an Apple experience that end-users love and organizations trust. Jamf is the only company in the world that provides a complete management and security solution for an Apple-first environment that is enterprise secure, consumer simple and protects personal privacy. Jamf ensures secure, consumer-simple technology for over 75,300+ businesses, schools and hospitals with +32.3 million devices running Jamf.
Kaspersky
Established in 1997, Kaspersky protects over 400 million users and 240,000 companies worldwide. We transform our leading security intelligence into real protection for our clients and partners. Kaspersky empowers you to safely and confidently use technology in your life and in your business. We are a private global company, domiciled in the UK.
LOGBinder
LOGBinder develops software agents that extend the reach of SIEM and log management solutions – enabling them to collect and manage isolated application audit logs.
Microsoft
Microsoft develops, licenses and supports a range of software products and services for computing devices worldwide. The company markets and distributes its products and services through OEMs, distributors, and resellers, as well as online.
Mimecast
Mimecast (NASDAQ: MIME) makes business email and data safer for tens-of-thousands of customers and their millions of employees worldwide. Founded in 2003, the company’s next-generation cloud-based security, archiving and continuity services protect email and deliver comprehensive email risk management.
Netskope
Netskope is the leader in cloud security. Using patented technology, Netskope’s cloud-scale security platform provides context-aware governance of all cloud usage in the enterprise in real-time, whether accessed from the corporate network, remote, or from a mobile device. This means that security professionals can understand risky activities, protect sensitive data, stop online threats, and respond to incidents in a way that fits how people work today. With granular security policies, the most advanced cloud DLP, and unmatched breadth of workflows, Netskope is trusted by the largest companies in the world. Netskope — security evolved
Okta
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to both secure and manage their extended enterprise, and transform their customers’ experiences. With over 5,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely adopt the technologies they need to fulfill their missions. Over 4,000 organizations, including 20th Century Fox, JetBlue, Nordstrom, Slack, Teach for America and Twilio trust Okta to securely connect their people and technology.
Outpost24
Palo Alto Networks
Palo Alto Networks has pioneered the next generation of network security with our innovative platform that allows you to secure your network and safely enable an increasingly complex and rapidly growing number of applications. At the core of this platform is our next-generation firewall, which delivers visibility and control over applications, users, and content within the firewall using a highly optimized hardware and software architecture.
Picus Security
Precisely
Precisely (formerly Cilasoft) is an industry leader in security and compliance software solutions for the IBM i platform. The Cilasoft Security Suite helps companies maintain compliance with industry regulations through robust auditing, access control, and authority elevation.
Proofpoint
Proofpoint Enterprise Protection delivers everything needed to keep an organization safe from email threats by taking a full lifecycle approach to securing email. Proofpoint Enterprise Protection enhances security by providing phishing detection, anti-spam and anti-virus, connection management, and policy enforcement features into a comprehensive, easy-to manage platform.
Pure Storage
Qualys, Inc.
Qualys, Inc. is a pioneer and leading provider of cloud security and compliance solutions. The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Qualys’ solutions can be deployed in hours anywhere in the world, providing customers an immediate and continuous view of their security & compliance postures.
Recorded Future
Recorded Future arms you with real-time threat intelligence so you can proactively defend your organization against cyber attacks. Indexing billions of facts, our patented Web Intelligence Engine continuously analyzes the entire Web, giving you unmatched insight into emerging threats. Recorded Future helps protect four of the top five companies in the world.
Red Seal
Red Seal provides a cybersecurity analytics platform to Global 2000 organizations that helps maximize digital resilience against cyber events. RedSeal’s advanced analytics engine creates functioning network models, tests networks to identify security risks, prioritizes needed actions, and provides critical information to quickly remediate issues. The result: measurable reduced cybersecurity risk and lower incident response and maintenance costs. With operations in North America, Europe, and Asia, RedSeal customers include leaders in finance, retail, technology, utilities, service providers, and government, all served by RedSeal’s channel partner network.
RevBits
As a unique integrated solution from a single vendor, RevBits CIP greatly reduces the overhead and complications that comes with deploying point solutions from multiple vendors. Dealing with differences in licensing schedules, commercial terms, help desk and support and other administrative burdens all become a thing of the past. https://www.revbits.com/
SecLytics
Powered by unique, patented predictive intelligence, SecLytics’ Augur PDR protects your network against novel and emerging threat vectors by identifying, attributing and blocking malicious infrastructure as it is brought online – providing you with an automated, proactive first line of defense.
SecureAuth
SecureAuth is a leading next-gen access management and authentication company that enables the most secure and passwordless, continuous authentication experience for everyone, everywhere. SecureAuth leverages adaptive risk analytics, using hundreds of human variables to create each user’s unique digital DNA. This enables real-time continuous authentication and provides the highest level of security throughout the digital journey.
SecurityScorecard
SecurityScorecard is the leading security ratings platform that enables you to instantly rate, understand, and continuously monitor the cybersecurity risk of any company, non intrusively. We automatically map ratings to cybersecurity questionnaire responses, providing a true 360 degree view of risk. SecurityScorecard Ratings uses non-intrusive and proprietary data collection methods, as well as trusted commercial and open-source threat feeds, to quantitatively evaluate the cybersecurity posture of any organization
SentinelOne
SentinelOne delivers autonomous endpoint protection through a single agent that successfully prevents, detects, and responds to attacks across all major vectors. Designed for extreme ease of use, the S1 platform saves customers time by applying AI to automatically eliminate threats in real time for both on premise and cloud environments and is the only solution to provide full visibility across networks directly from the endpoint. To learn more visit sentinelone.com or follow us at @SentinelOne, on LinkedIn, YouTube, or on Twitter.
ServiceNow
ServiceNow is changing the way people work. They help the modern enterprise operate at lightspeed and be more scalable than ever before. Customers use their platform to define, structure and automate the flow of work, removing dependencies on email, spreadsheets and other manual processes to transform the delivery of service to the enterprise.
SIOS Technology Corp.
For more than 20 years, SIOS has been helping companies protect their essential applications from downtime and disasters by providing reliable, easy-to-manage, clustering software and expert consulting services. Since then, we have stayed on the forefront of HA/DR and earned a reputation as the industry’s leading provider of high availability and disaster recovery protection.
SOC Prime
SOC Prime operates the world’s first platform for collective cyber defense based on global threat intelligence, crowdsourcing, zero-trust, and AI. Powered by cutting-edge technology leveraging Roota, Sigma, and MITRE ATT&CK® as benchmarks, SOC Prime drives a transformational change in cybersecurity to empower smart data orchestration, dynamic attack surface visibility, and cost-efficient threat hunting.
SonicWall
SonicWall delivers Boundless Cybersecurity for the hyper-distributed era in a work reality where everyone is remote, mobile, and unsecure. SonicWall safeguards organizations mobilizing for their new business normal with seamless protection that stops the most evasive cyberattacks across boundless exposure points and increasingly remote, mobile and cloud-enabled workforces. By knowing the unknown, providing real-time visibility and enabling breakthrough economics, SonicWall closes the cybersecurity business gap for enterprises, governments and SMBs worldwide.
Spyderbat
STEALTHbits
STEALTHbits is a cybersecurity software company focused on protecting an organization’s credentials and data. By removing inappropriate data access, enforcing security policy, and detecting advanced threats, we reduce security risk, fulfill compliance requirements and decrease operations expense. Identify threats. Secure data. Reduce risk.
Swimlane
Swimlane is the leader in AI-enabled, low-code security automation. Swimlane unifies security operations in-and-beyond the SOC into a single system of record to reduce process and data fatigue while quantifying business value and security effectiveness. The cloud-scale Turbine platform combines human and machine data into actionable intelligence for security leaders.
Tenable Inc.
Tenable™ Inc. is the Cyber Exposure company. Over 30,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 30 percent of the Global 2000 and large government agencies. Learn more at www.tenable.com.
ThreatConnect
ThreatConnect is a cyber-security firm that provides a Threat Intelligence Platform for companies to aggregate and act upon threat intelligence. Designed by analysts but built for the entire team (security operations, threat intelligence, incident response and security leadership), ThreatConnect’s intelligence-driven security operations platform is the only solution available today with intelligence, automation, analytics, and workflows in a single platform. Centralize your intelligence, establish process consistency, scale operations, and measure your effectiveness in one place. To learn more about our threat intelligence platform (TIP) or security orchestration, automation, and response (SOAR) solutions.
ThreatQuotient
ThreatQuotient improves security operations by fusing together disparate data sources, tools and teams to accelerate threat detection and response. ThreatQuotient’s data-driven security operations platform helps teams prioritize, automate and collaborate on security incidents; enables more focused decision making; and maximizes limited resources by integrating existing processes and technologies into a unified workspace. The result is reduced noise, clear priority threats, and the ability to automate processes with high fidelity data. ThreatQuotient’s industry leading data management, orchestration and automation capabilities support multiple use cases including incident response, threat hunting, spear phishing, alert triage and vulnerability prioritization, and can also serve as a threat intelligence platform.
Trend Micro
Trend Vision One is a modern security operations platform for security and IT teams, unifying purpose-built XDR, attack surface risk management, and zero trust capabilities, in a single console. Trend Vision One correlates data across multiple security layers from native sensors and third-party data sources to rapidly discover, assess, prioritize, and mitigate risk across the attack surface.
Trend Micro Joint Solution Brief
Varonis
Varonis is a leading provider of software solutions that protect data from insider threats and cyberattacks. Through an innovative software platform, Varonis allows organizations to analyze, secure, manage, and migrate their volumes of unstructured data. Varonis specializes in file and email systems that store valuable spreadsheets, word processing documents, presentations, audio and video files, emails, and text. IT and business personnel deploy Varonis software for a variety of use cases, including data security, governance and compliance, user behavior analytics, archiving, search, and file synchronization and sharing.
VMware
VMware is the global leader in virtualization and cloud infrastructure, delivers customer-proven solutions that reduce complexity and enable more flexible, agile service delivery. VMware enables enterprises to adopt a cloud model that addresses their unique needs.
Webroot
Webroot is the market leader in cloud delivered security software as a service (SaaS) solutions for consumers, businesses and enterprises. We have revolutionized Internet security to protect all the ways you connect online. Webroot delivers real-time advanced internet threat protection to customers through its BrightCloud® security intelligence platform, and its SecureAnywhere™ suite of security products for endpoints, mobile devices and corporate networks.
Zscaler
Zscaler protects millions of users at more than 5,000 of the world’s leading enterprises and government organizations against cyber-attacks and data breaches while staying fully compliant with policies. Zscaler’s pure cloud-delivered solution provides a safe and productive Internet user experience from any device and from any location around the world.
No results match search input
Explore Partner Resources
Technology Alliance Partner (TAP) Program
To request to become a technology partner and to view our Technology Alliance Partner (TAP) Program Guide, please fill out the following information.
TAP Program Inquiry Request
To request to become a technology partner and to view our Technology Alliance Partner (TAP) Program Guide, please fill out the following information.