LogRhythm, Inc. is an American security intelligence company that unifies Security Information and Event Management (SIEM), log management, network and endpoint monitoring and forensics, and security analytics. LogRhythm claims to help customers detect and respond quickly to cyber threats before a material breach occurs. It also aims to provide compliance automation and assurance and IT predictive intelligence to organizations, government agencies and mid-sized businesses. LogRhythm is headquartered in Boulder, Colorado, with operations in North and South America, Europe and the Asia Pacific region.

Wikipedia
LogRhythm
LogRhythm
YouTube Video
  • Use Office 365 Message Tracking Logs to Detect and Respond to Phishing Attacks Step zero of many, many attacks today begins with a phishing email. What if we could detect phishing attacks and quarantine them before the user clicks on that fatal link, or opens that malicious attachment? Talk about “nipping it in the bud”. But where do you start when scanning every inbox – all the time -- or hoo...

LogRhythm
LogRhythm
Blog Post
  • Around this time every year, we dust off our crystal ball, pull out the casting runes, and ruminate over what might happen in the world of Information Security in the year to come. While we are gathering information for our 2018 predictions, we decided to reflect on our 2017 predictions to see how we did. 1. There will be an overt cyberattack from a nation-state. The difficulty with nation-state...

LogRhythm
LogRhythm
Blog Post
  • Just as hackers often reconnoiter their intended targets to gain insight into an organization’s defenses, companies can monitor the threat landscape to see who is prowling around just outside its gates. Organizations need more than just internal network data to uncover evolving and stealthy threats. To this end, LogRhythm has partnered with Recorded Future, a company that knows best that machine l...

LogRhythm
LogRhythm
YouTube Video
  • Vice President, Information Security Officer of Prologis, Sue Lapierre, is responsible for the global industrial real estate company’s information security, as well as third-party vendor risk management. Lapierre’s great responsibility is matched by an equally great enthusiasm for the cybersecurity space. “This is a hot industry right now,” Lapierre tells us. “Cybersecurity is really the place to ...

LogRhythm
LogRhythm
Blog Post
  • This Saturday, countries around the world will pause in reflection to mark the anniversary of the 11th hour, of the 11th day, of the 11th month—when World War I officially ended. In the United States, this day is recognized as Veterans Day. Many will reach out and give thanks to family members, friends, and colleagues who served and who continue to serve in our armed forces. Speaking as a veteran,...

LogRhythm
LogRhythm
Blog Post
  • We are pleased to announce the release of the LogRhythm Phishing Intelligence Engine (PIE), an integrated app with LogRhythm’s Threat Lifecycle Management (TLM) platform. What is Phishing Intelligence Engine (PIE)? LogRhythm’s PIE can help streamline and automate the entire process of tracking, analyzing, and responding to phishing emails. PIE helps fight one of the most commonly used methods ...

LogRhythm
LogRhythm
YouTube Video
  • Learn how cybersecurity architecture has advanced, and why both Zero Trust and BeyondCorp frameworks are becoming increasingly used. In this Dark Reading webinar, LogRhythm's primary Security Architect will highlight how to: Develop a security architecture framework Align IT security with business strategy Adapt architecture to different environments, like on-premises, cloud and hybrid cloud en...

LogRhythm
LogRhythm
Blog Post
  • Earlier this month, LogRhythm proudly released LogRhythm CloudAI—the most recent chapter in our User and Entity Behavior Analytics (UEBA) story. LogRhythm CloudAI uses machine learning to apply behavioral analytics to user behavior. By modeling user behavior to uncover security relevant anomalous activity, it can detect previously unknown attacks across your security environment. In conjunction ...

LogRhythm
LogRhythm
YouTube Video
  • DNS is woven into the fabric of both the Internet and corporate intranets. It works so well that we forget it even exists, until it doesn’t work or is used against us. The bad guys haven’t forgotten or ignored DNS, and it’s become an increasingly abused protocol. In fact, they are using, leveraging and exploiting DNS more and more to hide their communication right under our nose. In this on-deman...

LogRhythm
LogRhythm
Blog Post
  • A pattern of high-profile network breaches happens repeatedly: An attacker gains a foothold on a single computer in the network—usually through use of a phishing scam or other well-known initial compromise method. Next, the attacker uses domain administrator credentials—stolen from the system’s memory cache—to compromise the rest of the computers in the domain. By default, Windows caches or saves...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.