LogRhythm, Inc. is an American security intelligence company that unifies Security Information and Event Management (SIEM), log management, network and endpoint monitoring and forensics, and security analytics. LogRhythm claims to help customers detect and respond quickly to cyber threats before a material breach occurs. It also aims to provide compliance automation and assurance and IT predictive intelligence to organizations, government agencies and mid-sized businesses. LogRhythm is headquartered in Boulder, Colorado, with operations in North and South America, Europe and the Asia Pacific region.

Wikipedia
LogRhythm
LogRhythm
Blog Post
  • In June 2017, Palo Alto’s Unit 42 Threat Research team published an excellent blog post on a newly detected version of the PlugX malware family, also known as “Korplug.” Interested to find out more about this new variant, I started digging around and found that there have been many new samples of “PlugX v1.” This isn’t too surprising considering that a builder for version one of the malware has be...

LogRhythm
LogRhythm
Blog Post
  • User and entity-centric threats are a growing concern for security teams. In fact, according to the 2017 Verizon Breach Study, 69 percent of organizations report a recent insider data exfiltration attempt. Compounding matters, 91 percent of firms report inadequate insider threat programs. User and Entity Behavior Analytics (UEBA) plays a crucial role in detecting the actions of users (and other e...

LogRhythm
LogRhythm
YouTube Video
  • Effectively securing your organization and its reputation requires a smarter approach. To maximize efficiency and minimize risk, security experts turn to LogRhythm—the only leading solution built solely for security teams by a security team committed to your success. NextGen SIEM. UEBA. Network Traffic & Behavior Analysis. Security Automation & Orchestration. Compliance. Security. Made Smarter.

LogRhythm
LogRhythm
Blog Post
  • Cryptocurrency is a hot topic right now, and even though its price is drastically falling across the board, this incredible technology will have lasting impacts on the world for years to come. Though a majority of the focus on cryptocurrencies has been on their negative uses, such as ransomware, the trade of illicit goods, or an easier way of laundering money, there are many positive applications ...

LogRhythm
LogRhythm
YouTube Video
  • In this webinar Randy Franklin Smith (of UWS) and Matt Willems (LogRhythm) work through the behavior and logs necessary to track for UEBA. With a focus on a very specific source of data – the Windows Security Log - this is in-depth knowledge. What types of behavior can you track for a user using the Windows security events? From domain controllers you can track: *When a user normally logs on *Wh...

LogRhythm
LogRhythm
Blog Post
  • Bremer Bank’s CCSO, Jeremiah Cruit, is no rookie when it comes to security. With years of experience and multiple SIEM deployments under his belt, he confidently selected LogRhythm’s NextGen SIEM to secure his organization. Upon deployment, LogRhythm quickly became the centerpiece of Bremer’s security—serving as the repository for all log data across the entire IT environment. Utilizing LogRhythm...

LogRhythm
LogRhythm
YouTube Video
  • Dive into threat hunting with this introduction from John Strand (of Security Weekly, SANS and Black Hills Security) and Andrew Costis (of LogRhythm). The two provide an overview of threat hunting and it's role in both the market and organizations. As the webinar progresses they begin detailing critical threat hunting TTPs and the value that individuals and organizations receive from hunting.

LogRhythm
LogRhythm
Blog Post
  • In 2017, there were 477 reported health care breaches in the U.S. affecting 5.6 million patient records. Seventy-one percent of these breaches were due to hacking and IT incidents. In recent years, privacy breaches have proven to be a major issue for health care entities and their patients. The health care industry is feeling the brunt of hacker attention more so than any other sector. But what e...

LogRhythm
LogRhythm
Blog Post
  • Contributors to this blog include Nathaniel “Q” Quist and Dan Kaiser. On February 28 and March 5, 2018, Memcached DDoS attacks targeted GitHub. LogRhythm Labs performed an investigation into the cause, effect, and outcome of these attacks. The following will help give you an understanding of the background that allowed the DDoS attack to be possible, the vulnerability that was exposed, mitigation...

LogRhythm
LogRhythm
YouTube Video
  • Insider actions, whether on purpose or accidental, cause the majority of breaches reported by respondents to multiple SANS surveys (including this one) conducted in 2017. Yet these same responses also indicate that user activities, including those performed through breached credentials, are often not analyzed in threat management lifecycles. In this webcast, senior SANS instructor and analyst Dav...

LogRhythm
LogRhythm
Blog Post
  • Various blog posts have been written by LogRhythm’s very own resident LogRhythm NetMon expert Rob McGovern regarding the numerous benefits of using Deep Packet Analytics within NetMon. If you’re not already familiar with deep packet analytics (DPA) rules, Rob’s post would be a great resource to review and includes free training! While analyzing a PCAP file recently, I discovered some malicious, o...

LogRhythm
LogRhythm
Blog Post
  • The LogRhythm 2018 Tech Summit is underway, and we’re thrilled to have our biggest turnout yet. LogRhythm partners are attending a number of breakout sessions with topics ranging from the power of SmartResponse to an overview of our Phishing Intelligence Engine (PIE). Attendees will also hear about the LogRhythm product roadmap and gain an understanding of how LogRhythm stacks up in today’s compet...

LogRhythm
LogRhythm
Blog Post
  • Part one of this blog series discussed what Dynamic Data Exchange (DDE) is, what an attack may look like, and steps for mitigation. In Part 2, I’ll cover how LogRhythm and Carbon Black can work together to help detect a DDE-enabled attack. Suppose you’re a security operations center (SOC) analyst. Upon arriving for work one morning, you hear about a DDE attack through your daily RSS feed review. ...

LogRhythm
LogRhythm
YouTube Video
  • LogRhythm and Cisco are committed to helping you enhance your security operations through the seamless integration and powerful capabilities of the LogRhythm Threat Lifecycle Management platform and Cisco’s Threat Grid, Umbrella, Firepower and ISE. Currently integrating with over three dozen Cisco products, LogRhythm provides centralized visibility and advanced security analytics across the Cisc...

LogRhythm
LogRhythm
YouTube Video
  • This webinar will focus on the cultural shift from tightly controlled business networks of yesterday to the converged fabric adopted by businesses today. BYOD is becoming a normality for most organisations and it doesn't have to be a heavy burden for security teams with the right policies, people and technology in place. We'll dive into some of the options available for these challenges in this we...

LogRhythm
LogRhythm
Blog Post
  • Today’s cyberthreats are advancing in both methodology and frequency. To keep pace with evolving cyberattacks, you need to make use of all of the information and intelligence available. Threat intelligence can help you stay one step ahead of cyberthreats by providing you with rich, external context. Integrating threat intelligence into your SIEM can help increase overall network visibility, keep ...

LogRhythm
LogRhythm
YouTube Video
  • Shane Addison, information security officer at First Mid-Illinois Bank and Trust, reviews LogRhythm SIEM. “Scalability is one of the most valuable features… It chews through the logs; LogRhythm is great for not just security but operations as well; LogRhythm enables our IT staff to be more proactive by finding and fixing problems, instead of waiting for end user calls; Support is wonderful; LogRhy...

LogRhythm
LogRhythm
YouTube Video
  • A Technical Systems Analyst, reviews LogRhythm SIEM. “AI Engine rules have been really advantageous for us; It turns out there is a wealth of information coming from LogRhythm, other than just being PCI compliant; Technical support has been great. A strength of LogRhythm; LogRhythm earned 8 out of 10 stars.” Read a text version of this review here: https://www.itcentralstation.com/product_reviews...

LogRhythm
LogRhythm
YouTube Video
  • Noel Medina, sr. IT security analyst at a retail organization, reviews LogRhythm SIEM. “AI Engine rule set significantly changes how we notify users about what’s going on our network. Not one log but the correlation of multiple logs and sources; LogRhythm earned 9 out of 10 stars.” Read a text version of this review here: https://www.itcentralstation.com/product_reviews/logrhythm-review-47112-by-...

LogRhythm
LogRhythm
YouTube Video
  • Jon Nicholson, cybersecurity operations manager at Old National Bank, reviews LogRhythm SIEM. “LogRhythm processes many log sources in it, we can easily investigate and gain visibility into any system we have; LogRhythm earned 9 out of 10 stars.” Read a text version of this review here: https://www.itcentralstation.com/product_reviews/logrhythm-review-47113-by-jon-nicholson This review was recor...

LogRhythm
LogRhythm
YouTube Video
  • Steven McDonald, security engineer at a finance organization, reviews LogRhythm SIEM. “I can get my information in one place. I don't have to log in to six or seven different appliances and hunt for data; LogRhythm earned 9 out of 10 stars.” Read a text version of this review here: https://www.itcentralstation.com/product_reviews/logrhythm-review-47111-by-steven-mcdonald This review was recorded...

LogRhythm
LogRhythm
YouTube Video
  • Dan Ney, security and risk manager lead | Baker Tilley LLP, reviews LogRhythm SIEM. “LogRhythm dashboards easily percolates critical information to the team for review and drill-down; We reviewed Splunk and RSA’s new product and ended up selecting LogRhythm; LogRhythm helped us pass security audits from customers; Professional Services and initial set up was fast and smooth; LogRhythm earned a 9 o...

LogRhythm
LogRhythm
YouTube Video
  • LogRhythm SIEM Review: Jack Callahan (Senior Security Analyst | Financial Service) Jack Callahan, senior security analyst at a financial service organization, reviews LogRhythm SIEM and provides recommendations for his peers. Read a text version of this review here: https://www.itcentralstation.com/product_reviews/logrhythm-review-47108-by-jack-callahan This review was recorded by IT Central Stat...

LogRhythm
LogRhythm
YouTube Video
  • Jorge Trujillo, information security team lead at a financial services organization, reviews LogRhythm SIEM. “Great having visibility into IT environment; Support walked us through everything we had to do.” Read a text version of this review here: https://www.itcentralstation.com/product_reviews/logrhythm-review-47107-by-jorge-trujillo This review was recorded by IT Central Station at LogRhythm ...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.