LogRhythm Customer Center for American Progress to Present at Forrester’s Security Forum 2010

Case Study will Focus on How Washington Think Tank Thwarts Hackers with Log Management and SIEM

Boulder, Colorado, Sep. 13, 2010 – LogRhythm, the company that makes log data useful, today announced that its customer, Center for American Progress (CAP), will present a case study session at Forrester’s Security Forum 2010 on how it protects IT systems against external attacks using Log Management and SIEM (security information event management). Nick Levay, Manager of Information Security and Operations for CAP, will discuss how his security team addresses a myriad of threats including brute force attacks, spear phishing, web site attacks, and more, using LogRhythm’s SIEM platform.

Mr. Levay’s talk will dovetail with the theme of a session being presented by Forrester senior analyst John Kindervag entitled “No More Chewy Centers: The Zero-Trust Model of Information Security”. Mr. Kindervag will unveil a zero-trust model built on the idea that security must become ubiquitous throughout your infrastructure, which includes inspecting and logging all traffic traversing the network. Mr. Levay will explain his approach to implementing a zero-trust model and: How effective log management/SIEM can deliver unprecedented visibility into security threats and provide actionable insights How log management/SIEM can be used as part of a strategy to counter advanced persistent threats that are highly organized attacks involving multiple hackers and do not stop once a particular attack vector is blocked.

According to Nick Levay, “[With LogRhythm] We can now distinguish the very subtle differences between a hacker’s patterns and those of a regular user. This detection is highly adaptive for multiple vendors’ systems. If an employee has an open connection for hours, we expect him or her to dump a lot of data. But a hacker may not do that. That’s what this solution detects.”

About Nick Levay

Nick Levay has over a decade of experience in the information technology and security industry. He has designed, built, and managed network and systems infrastructure for several Internet service providers, played a key role in the design and construction of the three most advanced data centers in Asia, and led engineering teams spread across North America and Asia.

Session Details

Where:
Forrester’s Security Forum 2010

The Westin Copley Place

Boston, Mass.

When:
Thursday, September 16, 2010 at 3:00 PM

About LogRhythm

LogRhythm helps security teams stop breaches by turning disconnected data and signals into trustworthy insights. From connecting the dots across diverse log and threat intelligence sources to using sophisticated machine learning that spots suspicious anomalies in network traffic and user behavior, LogRhythm accurately pinpoints cyberthreats and empowers professionals to respond with speed and efficiency.

With cloud-native and self-hosted deployment flexibility, out-of-the-box integrations, and advisory services, LogRhythm makes it easy to realize value quickly and adapt to an ever-evolving threat landscape. Together, LogRhythm and our customers confidently monitor, detect, investigate, and respond to cyberattacks. Learn more at logrhythm.com.

Comments are closed.