Technology Partners Marketplace
- Partner Overview
- Partner Program
- Technology Partners
At LogRhythm, we work closely with our Technology Partners, allowing you to expand solution services including LogRhythm and leverage opportunities for better customer solutions and business growth. More options and better integration mean increased sales and happier customers.

A solution for every environment
Endpoint monitoring and threat detection
Cloud security monitoring
Cyber crime and fraud detection
Technology alliance partner directory
Amazon Web Services

Amazon Web Services is a subsidiary of Amazon.com which offers a suite of cloud computing services that make up an on-demand computing platform. These services operate from 12 geographical regions across the world.
Anomali
Arista Networks

Arista Networks delivers software defined cloud networking for large data center and high-performance computing environments. With more than three million cloud networking ports deployed worldwide, Arista delivers a portfolio of 1/10/40 and 100 GbE products that redefine network architectures, bring extensibility to networking, and dramatically change the price/performance of data center.
AttackIQ

AttackIQ is the leading independent provider in the emerging market of continuous security validation and built the industry’s first platform that enables red and blue teams to test the effectiveness of their security controls & staff. Our platform fully automates testing against the MITRE ATT&CK Matrix, a curated knowledge base and model for cyber adversary behavior used for planning security improvements and verifying security defenses work as expected.
Beyond Trust
Box
Bromium

Carbon Black

Carbon Black leads a new era of endpoint security by enabling organizations to disrupt advanced attacks, deploy the best prevention strategies for their business, and leverage the expertise of 10,000 professionals from IR firms, MSPs and enterprises to shift the balance of power back to security teams. Only Carbon Black continuously records and centrally retains all endpoint activity, making it easy to track an attacker’s every action, instantly scope every incident, unravel entire attacks and determine root causes. Carbon Black also offers a range of prevention options so organizations can match their endpoint defense to their business needs. Carbon Black has been named #1 in endpoint protection, incident response, and market share. Forward-thinking companies choose Carbon Black to arm their endpoints, enabling security teams to: Disrupt. Defend. Unite.
Check Point Software Technologies Ltd.
Cimcor

Cisco
Code42

Cofense
CyberArk
Cyber Observer

CyberSponse

Cylance ®

Dell
Digital Defense

Dragos

FairWarning ®

FireEye
Forescout
Fortinet
Gigamon

Guidance Software

The Identity Defined Security Alliance (IDSA)

Illusive Networks
Imperva

Infoblox
Ixia

LOGBinder

Microsoft

Mimecast

Netskope
Okta
Ordr
Palo Alto Networks
Precisely
Proofpoint
Qualys, Inc.
Recorded Future
Red Seal

RevBits
SailPoint

SecureAuth

SentinelOne
ServiceNow
Skyhigh Networks

STEALTHbits

Symantec

Tenable Inc.
ThreatConnect
ThreatQuotient

ThreatQuotient improves security operations by fusing together disparate data sources, tools and teams to accelerate threat detection and response. ThreatQuotient’s data-driven security operations platform helps teams prioritize, automate and collaborate on security incidents; enables more focused decision making; and maximizes limited resources by integrating existing processes and technologies into a unified workspace. The result is reduced noise, clear priority threats, and the ability to automate processes with high fidelity data. ThreatQuotient’s industry leading data management, orchestration and automation capabilities support multiple use cases including incident response, threat hunting, spear phishing, alert triage and vulnerability prioritization, and can also serve as a threat intelligence platform.
Tripwire
Unisys
Varonis

VCE

Verodin

VMware
VSS Monitoring

Webroot

Zscaler
Explore partner resources
Technology Alliance Partner (TAP) Program
TAP Program Inquiry Request
To request to become a technology partner and to view our Technology Alliance Partner (TAP) Program Guide, please fill out the following information.
Get Gartner’s complete analysis in the SIEM 2021 Magic Quadrant
