LogRhythm, Inc. is an American security intelligence company that unifies Security Information and Event Management (SIEM), log management, network and endpoint monitoring and forensics, and security analytics. LogRhythm claims to help customers detect and respond quickly to cyber threats before a material breach occurs. It also aims to provide compliance automation and assurance and IT predictive intelligence to organizations, government agencies and mid-sized businesses. LogRhythm is headquartered in Boulder, Colorado, with operations in North and South America, Europe and the Asia Pacific region.

Wikipedia
LogRhythm
LogRhythm
YouTube Video
  • Security mature organizations are increasingly utilizing User and Entity Behavior Analytics (UEBA) to quickly surface, prioritize, and respond to anomalous and alarming user behavior. Join Stephen Frank, director of technology & security at National Hockey League Players' Association (NHLPA), and Matt Willems, LogRhythm technical product manager, as they discuss how to apply UEBA to meet securit...

LogRhythm
LogRhythm
YouTube Video
  • Security mature organizations are increasingly utilizing User and Entity Behavior Analytics (UEBA) to quickly surface, prioritize, and respond to anomalous and alarming user behavior. Join Stephen Frank, director of technology & security at National Hockey League Players' Association (NHLPA), and Matt Willems, LogRhythm technical product manager, as they discuss how to apply UEBA to meet securit...

LogRhythm
LogRhythm
YouTube Video
  • Marc White, Chief Security Officer at Optomany, reviews LogRhythm SIEM. “LogRhythm is a single pane of glass for my analysts, that gives us complete eyes and ears into our environment; LogRhythm is lightyears ahead of the competition, including Splunk and ArcSight.” Read a text version of this review here: https://www.itcentralstation.com/product_reviews/logrhythm-review-47106-by-marc-white This...

LogRhythm
LogRhythm
YouTube Video
  • In this webinar Randy Franklin Smith (of UWS) and Matt Willems (LogRhythm) work through the behavior and logs necessary to track for UEBA. With a focus on a very specific source of data – the Windows Security Log - this is in-depth knowledge. What types of behavior can you track for a user using the Windows security events? From domain controllers you can track: *When a user normally logs on *Wh...

LogRhythm
LogRhythm
YouTube Video
  • Dive into threat hunting with this introduction from John Strand (of Security Weekly, SANS and Black Hills Security) and Andrew Costis (of LogRhythm). The two provide an overview of threat hunting and it's role in both the market and organizations. As the webinar progresses they begin detailing critical threat hunting TTPs and the value that individuals and organizations receive from hunting.

LogRhythm
LogRhythm
YouTube Video
  • Insider actions, whether on purpose or accidental, cause the majority of breaches reported by respondents to multiple SANS surveys (including this one) conducted in 2017. Yet these same responses also indicate that user activities, including those performed through breached credentials, are often not analyzed in threat management lifecycles. In this webcast, senior SANS instructor and analyst Dav...

LogRhythm
LogRhythm
YouTube Video
  • This webinar will focus on the cultural shift from tightly controlled business networks of yesterday to the converged fabric adopted by businesses today. BYOD is becoming a normality for most organisations and it doesn't have to be a heavy burden for security teams with the right policies, people and technology in place. We'll dive into some of the options available for these challenges in this we...

LogRhythm
LogRhythm
YouTube Video
  • Marc White, Chief Security Officer at Optomany, reviews LogRhythm SIEM. “LogRhythm is a single pane of glass for my analysts, that gives us complete eyes and ears into our environment; LogRhythm is lightyears ahead of the competition, including Splunk and ArcSight.” Read a text version of this review here: https://www.itcentralstation.com/product_reviews/logrhythm-review-47106-by-marc-white This...

LogRhythm
LogRhythm
YouTube Video
  • Join IMMIX, Optiv and LogRhythm for this on-demand webinar to learn how LogRhythm, a CDM verified vendor, provides next-generation SIEM and UEBA solutions for each phase of CDM. LogRhythm is focused on threat lifecycle management to reduce the mean time to detect and mean time to respond enabling security analysts to focus on a single solution. Optiv, a LogRhythm partner and security solutions i...

LogRhythm
LogRhythm
YouTube Video
  • Identifying Abnormal Authentication Webcast with Ultimate Windows Security (UWS) Identifying malicious insiders is a massive challenge due to their elevated credentials and presence within your network. However, there are tell tale signs of suspicious activity such as signing on to someone else's workstation (when that isn't in your job role). Observing this activity is critical for for user beha...

LogRhythm
LogRhythm
YouTube Video
  • Threat hunting is the latest strategy to keep networks secure. Put simply, it refers to the process of proactively searching for advanced threats that may have eluded security systems. In other words, going after the ones that slipped through the net. It’s important to know that threat hunting is more than industry hype. It provides security professionals with a powerful weapon with which to com...

LogRhythm
LogRhythm
YouTube Video
  • Customer data falling into the hands of cybercriminals. It’s the stuff of nightmares for any organisation. Today the insider threat has the potential to pose a bigger risk to cybersecurity than external hackers. In this video, LogRhythm experts will take you through a real use case in which data worth millions of pounds was stolen. And they will explain how the incident could have been stopped w...

LogRhythm
LogRhythm
Blog Post
  • In June 2017, Palo Alto’s Unit 42 Threat Research team published an excellent blog post on a newly detected version of the PlugX malware family, also known as “Korplug.” Interested to find out more about this new variant, I started digging around and found that there have been many new samples of “PlugX v1.” This isn’t too surprising considering that a builder for version one of the malware has be...

LogRhythm
LogRhythm
Blog Post
  • User and entity-centric threats are a growing concern for security teams. In fact, according to the 2017 Verizon Breach Study, 69 percent of organizations report a recent insider data exfiltration attempt. Compounding matters, 91 percent of firms report inadequate insider threat programs. User and Entity Behavior Analytics (UEBA) plays a crucial role in detecting the actions of users (and other e...

LogRhythm
LogRhythm
YouTube Video
  • Effectively securing your organization and its reputation requires a smarter approach. To maximize efficiency and minimize risk, security experts turn to LogRhythm—the only leading solution built solely for security teams by a security team committed to your success. NextGen SIEM. UEBA. Network Traffic & Behavior Analysis. Security Automation & Orchestration. Compliance. Security. Made Smarter.

LogRhythm
LogRhythm
Blog Post
  • Cryptocurrency is a hot topic right now, and even though its price is drastically falling across the board, this incredible technology will have lasting impacts on the world for years to come. Though a majority of the focus on cryptocurrencies has been on their negative uses, such as ransomware, the trade of illicit goods, or an easier way of laundering money, there are many positive applications ...

LogRhythm
LogRhythm
YouTube Video
  • In this webinar Randy Franklin Smith (of UWS) and Matt Willems (LogRhythm) work through the behavior and logs necessary to track for UEBA. With a focus on a very specific source of data – the Windows Security Log - this is in-depth knowledge. What types of behavior can you track for a user using the Windows security events? From domain controllers you can track: *When a user normally logs on *Wh...

LogRhythm
LogRhythm
Blog Post
  • Bremer Bank’s CCSO, Jeremiah Cruit, is no rookie when it comes to security. With years of experience and multiple SIEM deployments under his belt, he confidently selected LogRhythm’s NextGen SIEM to secure his organization. Upon deployment, LogRhythm quickly became the centerpiece of Bremer’s security—serving as the repository for all log data across the entire IT environment. Utilizing LogRhythm...

LogRhythm
LogRhythm
YouTube Video
  • Dive into threat hunting with this introduction from John Strand (of Security Weekly, SANS and Black Hills Security) and Andrew Costis (of LogRhythm). The two provide an overview of threat hunting and it's role in both the market and organizations. As the webinar progresses they begin detailing critical threat hunting TTPs and the value that individuals and organizations receive from hunting.

LogRhythm
LogRhythm
Blog Post
  • In 2017, there were 477 reported health care breaches in the U.S. affecting 5.6 million patient records. Seventy-one percent of these breaches were due to hacking and IT incidents. In recent years, privacy breaches have proven to be a major issue for health care entities and their patients. The health care industry is feeling the brunt of hacker attention more so than any other sector. But what e...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.