Technology Partners Marketplace
- Partner Overview
- Partner Program
- Technology Partners
At LogRhythm, we work closely with our Technology Partners, allowing you to expand solution services including LogRhythm and leverage opportunities for better customer solutions and business growth. More options and better integration mean increased sales and happier customers.

A solution for every environment
Endpoint monitoring and threat detection
Cloud security monitoring
Cyber crime and fraud detection
Technology alliance partner directory
A10 Networks
Amazon Web Services

Amazon Web Services is a subsidiary of Amazon.com which offers a suite of cloud computing services that make up an on-demand computing platform. These services operate from 12 geographical regions across the world.
Anomali

AttackIQ

Balbix
Beyond Trust
BlackBerry Cylance

Cylance is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Our technology is deployed on over four million endpoints and protects hundreds of enterprise clients worldwide including Fortune 100 organizations and government institutions.
Box
Broadcom

Carbon Black

Check Point Software Technologies Ltd.
Cimcor

Cisco
Code42

Cofense

Cribl
Criminal IP

Criminal IP is a threat intelligence search engine that scans the whole internet and uncovers all kinds of information on any internet connected device.
Powered by AI and Machine Learning, Criminal IP detects and assesses the risks and vulnerabilities associated with any internet connected devices in real-time. leveraging various powerful Lookup features and filters, it grants you a comprehensive view of the ever-evolving cyber risks.
CyberArk

D3 Security
D3 Security specializes in providing a Smart security orchestration, automation, and response (SOAR) platform that is specifically designed to enhance and streamline incident response procedures within organizations. By leveraging cutting-edge technologies such as artificial intelligence, and automation, the platform facilitates rapid and effective detection, analysis, and real-time response to security incidents.
Dell
Dragos

FireEye
Forescout
Fortinet
Gigamon

Google Cloud
GoTo
Infoblox
IronNet
LOGBinder

Microsoft

Mimecast

Netskope
Okta

Outpost24
Palo Alto Networks
Picus Security
Precisely
Proofpoint
Qualys, Inc.
Recorded Future
Red Seal

RevBits
SecLytics

SecureAuth
SentinelOne
ServiceNow
SIOS Technology Corp.

For more than 20 years, SIOS has been helping companies protect their essential applications from downtime and disasters by providing reliable, easy-to-manage, clustering software and expert consulting services. Since then, we have stayed on the forefront of HA/DR and earned a reputation as the industry’s leading provider of high availability and disaster recovery protection.
SonicWall
SonicWall delivers Boundless Cybersecurity for the hyper-distributed era in a work reality where everyone is remote, mobile, and unsecure. SonicWall safeguards organizations mobilizing for their new business normal with seamless protection that stops the most evasive cyberattacks across boundless exposure points and increasingly remote, mobile and cloud-enabled workforces. By knowing the unknown, providing real-time visibility and enabling breakthrough economics, SonicWall closes the cybersecurity business gap for enterprises, governments and SMBs worldwide.
Spyderbat
STEALTHbits

Tenable Inc.
ThreatConnect

ThreatQuotient

ThreatQuotient improves security operations by fusing together disparate data sources, tools and teams to accelerate threat detection and response. ThreatQuotient’s data-driven security operations platform helps teams prioritize, automate and collaborate on security incidents; enables more focused decision making; and maximizes limited resources by integrating existing processes and technologies into a unified workspace. The result is reduced noise, clear priority threats, and the ability to automate processes with high fidelity data. ThreatQuotient’s industry leading data management, orchestration and automation capabilities support multiple use cases including incident response, threat hunting, spear phishing, alert triage and vulnerability prioritization, and can also serve as a threat intelligence platform.
Trend Micro

Varonis

VMware
Webroot

Zscaler
Explore partner resources
Technology Alliance Partner (TAP) Program
TAP Program Inquiry Request
To request to become a technology partner and to view our Technology Alliance Partner (TAP) Program Guide, please fill out the following information.
Get Gartner’s complete analysis in the SIEM 2022 Magic Quadrant
