LogRhythm Launches Tools for Rapidly Adopting the Kingdom of Saudi Arabia’s Essential Cybersecurity Controls (ECC)

LogRhythm Launches Tools for Rapidly Adopting the Kingdom of Saudi Arabia’s Essential Cybersecurity Controls (ECC)

Its predefined reports and use cases enable organizations to accelerate compliance with the KSA’s ECC and supports Saudi Vision 2030

DUBAI, UAE – November 2, 2020 – LogRhythm, the company powering today’s security operations centers (SOCs), has launched reporting capabilities and compliance use cases that make it simple and efficient to comply with the Kingdom of Saudi Arabia’s (KSA) Essential Cybersecurity Controls (ECC). It enables organizations of all kinds to use one-click, out-of-the box automation to meet the minimum cybersecurity requirements for information and technology assets operating within the KSA.

The reports and use cases can be deployed in LogRhythm’s NextGen Security Information and Event Management (SIEM) platform, delivering rapid regulatory compliance. It enables organizations of all sizes to create a secure foundation for digital transformation, adopting new applications and services, and growing their operations. The predefined reports and use cases are available immediately to all LogRhythm users in the KSA.

“Every LogRhythm solution comes with a full suite of automated compliance reports and we’re proud to expand this to include the Kingdom of Saudi Arabia’s ECC. Cybersecurity is fundamental to the long-term growth of technology, digital transformation and digital infrastructure in the KSA and across the region. Our predefined reports and use cases ensure that more organizations can secure their digital ecosystems and remove the barriers to transforming their operations. This is about making world-class cybersecurity solutions simple and easy to adopt in local markets in the Middle East and around the world,” said Mazen A. Dohaji, Vice President, India, Middle East, Turkey & Africa (iMETA) at LogRhythm.

The ECC was launched in 2018 by the National Cybersecurity Authority (NCA) within the Kingdom as part of the Saudi Vision 2030 strategic framework. The objective of the ECC is to establish best practice in cybersecurity at a national level, covering critical infrastructure, high priority sectors and government services. All government-run agencies and departments within the Kingdom must comply with the ECC, and any privately-run organizations looking to do business with public sector organizations must also comply.

“The Kingdom of Saudi Arabia has taken a proactive approach to cybersecurity and made it a priority for its Saudi Vision 2030 strategic framework. Our mission is to make compliance simple and efficient for customers, both governmental and privately owned, to more ably comply with evolving cybersecurity frameworks. With our new predefined reports and compliance use cases, customers can easily and accurately demonstrate their compliance with the ECC when audits are needed,” said Abdulrahman Aldahbali, Country Manager at LogRhythm, iMETA.

LogRhythm is a world leader in NextGen SIEM, empowering organizations on six continents to successfully reduce risk by rapidly detecting, responding to and neutralizing damaging cyberthreats. The LogRhythm platform combines user and entity behavior analytics (UEBA), network traffic and behavior analytics (NTBA) and security automation and orchestration (SAO) in a single end-to-end solution. Over the past five years, it has grown to encompass multiple teams in Egypt, Jordan, the KSA, Lebanon and the UAE. It serves 200 customers across the region, with a key focus on public sector customers.

About LogRhythm

LogRhythm helps security teams stop breaches by turning disconnected data and signals into trustworthy insights. From connecting the dots across diverse log and threat intelligence sources to using sophisticated machine learning that spots suspicious anomalies in network traffic and user behavior, LogRhythm accurately pinpoints cyberthreats and empowers professionals to respond with speed and efficiency.

With cloud-native and self-hosted deployment flexibility, out-of-the-box integrations, and advisory services, LogRhythm makes it easy to realize value quickly and adapt to an ever-evolving threat landscape. Together, LogRhythm and our customers confidently monitor, detect, investigate, and respond to cyberattacks. Learn more at logrhythm.com.

Comments are closed.