Security Spot

Network Monitor and SSL Proxy Integration

The Encryption Paradox Security experts universally agree that network traffic must be encrypted to be considered secure, and many compliance standards and applications (let alone...

Read More

Make Your Data Work for You

“Make your money work for you.” It’s something that I’ve heard financial planners say for years. But recently, I started correlating this notion with what...

Read More

Using Expiring Lists in LogRhythm 7

As a multi-billion dollar company that makes everything, Acme Labs are rightly paranoid about the threats and resulting risks that they face. Just imagine if...

Read More

Precision Search

With the release of LogRhythm 7, we introduced Precision Search. This feature helps you cut through the massive amount of data in your environment to...

Read More