LogRhythm, Inc. is an American security intelligence company that unifies Security Information and Event Management (SIEM), log management, network and endpoint monitoring and forensics, and security analytics. LogRhythm claims to help customers detect and respond quickly to cyber threats before a material breach occurs. It also aims to provide compliance automation and assurance and IT predictive intelligence to organizations, government agencies and mid-sized businesses. LogRhythm is headquartered in Boulder, Colorado, with operations in North and South America, Europe and the Asia Pacific region.

Wikipedia
LogRhythm
LogRhythm
Blog Post

New blog articles detected.

  • First Financial Bank Unifies Threat Data and Streamlines Response
    LogRhythm Enables Comprehensive Visibility and Enhanced Incident Workflows When Michael Cole took on his new role as Chief Information Security Officer at First Financial Bank (NASDAQ:FFIN), he inherited a fragmented security operations program that provided a limited visibility into the organization’s threat environment. Cole ultimately selected LogRhythm to help solve the First Financial Bank’s...
LogRhythm
LogRhythm
Blog Post

New blog articles detected.

  • Mamba Ransomware Analysis
    Mamba Ransomware Background In September of 2016, a strain of ransomware was found in the wild which performed full disk encryption. According to Kaspersky Lab researchers1, this ransomware strain named “Mamba” now appears to be re-circulating, primarily in Brazil and Saudi Arabia. The ransomware includes a DiskCryptor tool capable of using strong encryption algorithms to make recovering the enc...
LogRhythm
LogRhythm
Blog Post

New blog articles detected.

  • Three Weeks Left to Enter the Rule Your Network Challenge
    There are only three weeks left to enter the Rule Your Network to win up to $18,000 USD. Submit an entry by August 31st and you’ll be eligible to win our cash prizes. How to Enter To start, download Network Monitor Freemium and create unique DPA rules, query rules, or dashboards to submit to one of the following three categories: Novel Threat Detection: Can you use Network Monitor to is...
LogRhythm
LogRhythm
Blog Post

New blog articles detected.

  • How to Make Your SIEM Speak
    Your security teams can be responsible for managing a number of logs, so how do you make malicious behavior and alerts stand out? Using LogRhythm’s SmartResponse™, you can make your SIEM speak to you and audibly alert to a threat. In the LogRhythm security operations center (SOC), we’re all about finding new ways to be notified of alarms, and we’re constantly building integrations to help our cus...
LogRhythm
LogRhythm
YouTube Video

New YouTube videos detected.

  • Defend Against Insider Threats with UEBA Demo
    Last year, 69% of organizations reported incidents of attempted data theft. These threats came from inside the organization. But 91% of companies also reported that they don't have an effective method to identify insider threats. Watch the demo to see how LogRhythm's User and Entity Behavior Analytics (UEBA) can help you address insider threats, account compromise, data exfiltration, and more—all ...
LogRhythm
LogRhythm
Blog Post

New blog articles detected.

  • Build a Highly Efficient SOC—Even with Limited Resources
    Security Teams are Overwhelmed If your team is struggling to keep up and getting bogged down by manual processes, it may feel like you will never be one step ahead of cyberthreats that may threaten your business. In a perfect world, you’d have a 24x7 security operations center (SOC) where a team of dedicated analysts carefully monitor for threats around the clock, every day of the year. But the...
LogRhythm
LogRhythm
Blog Post

New blog articles detected.

  • Analyzing ICMP Traffic with Network Monitor
    The Internet Control Message Protocol (ICMP) is one of the foundational internet protocols that define how systems talk to each other. Commands such as ping and traceroute are supported by ICMP. Based on request for comments (RFC) 792, ICMP has been around since the early days of the internet, circa 1981. So why should you care about analyzing one of the oldest internet-networking protocols? Hasn...
LogRhythm
LogRhythm
Blog Post

New blog articles detected.

  • Identifying PowerShell Tunneling through ICMP
    Hackers are constantly looking for ways to bypass traditional network defenses, and exploiting the Internet Control Message Protocol (ICMP) as a covert channel for a reverse shell is a commonly used method for attack. However, you can use LogRhythm’s Network Monitor to identify PowerShell tunneling through an ICMP. From the previous look into the ICMP, you know that, based on RFC 792, a Type 8 IC...
LogRhythm
LogRhythm
Blog Post

New blog articles detected.

  • Northampton County Improves Visibility and Automation with LogRhythm
    LogRhythm Enhances Efficiency by Streamlining Security Operations Bob Mace, senior information security analyst, leads a small IT team to manage and secure Northampton County’s IT infrastructure. As the team faced mounting challenges and time-consuming manual processes, Mace turned to LogRhythm. Upon implementation, LogRhythm quickly provided a centralized web console that enhanced the team’s abi...
LogRhythm
LogRhythm
YouTube Video

New YouTube videos detected.

  • Moving threat defences to real-time - Quicker detection and mitigation of cyber threats
    Building fortresses has long ceased to be an option. Rather, the IT security focus has moved to dealing with the inevitable breaches as quickly, thoroughly and efficiently as possible – disarming threats before any real damage can be done. This means reducing risk to the business by cutting the mean time to detect (MTTD) and mean time to respond (MTTR). During this video we’ll be looking at how bu...
LogRhythm
LogRhythm
YouTube Video

New YouTube videos detected.

  • Business Reporter interview with Ross Brewer: A new approach to cyber security is required
    Globally, sophisticated cyber-attacks are compromising organisations at an unprecedented rate and with devastating consequences. Today’s hackers are motivated by a wide range of objectives that include financial gain, industrial espionage, cyber-warfare, and terrorism. The odds that your organisation will be compromised are high with a recent report indicating that 76 percent of surveyed organisat...
LogRhythm
LogRhythm
Blog Post

New blog articles detected.

  • SANS Incident Response Survey Results- Part 1
    SANS Incident Response Survey Results- Part 1 SANS’ 2016 survey of incident response (IR) capabilities indicated that the IR landscape was ever changing. Advanced industries were able to maintain effective IR teams, but it identified hurdles responders face to increase the efficiency of their IR teams. In this on-demand SANS Incident Response Survey webcast, James Carder, LogRhythm CISO & VP o...
LogRhythm
LogRhythm
Blog Post

New blog articles detected.

  • First Financial | Finance & Lending
    First Financial Bank Unifies Threat Data and Streamlines Response First Financial Bank (NASDAQ:FFIN), headquartered in Abilene, TX, is one of the nation’s most financially secure banking institutions, ranked number 1, 2, or 3 by Bank Director Magazine for the past seven years. With 69 locations throughout Texas and more than $7.5 billion in total assets, First Financial offers the best of “Big Ba...
LogRhythm
LogRhythm
Blog Post

New blog articles detected.

LogRhythm
LogRhythm
Blog Post

New blog articles detected.

  • Using LogRhythm to Support Preventative Cybersecurity Strategies
    Preventing WannaCry and Petya / NotPetya Attacks With the recent WannaCry and Petya / NotPetya cyberattacks, I wanted to provide an alternative view on how organizations can utilize the LogRhythm Platform to bolster your preventative cybersecurity strategies. After all, while LogRhythm is very good at enhancing your detection and response capabilities (as seen in a couple of recent blogs: NotPet...
LogRhythm
LogRhythm
Blog Post

New blog articles detected.

  • NotPetya Technical Analysis
    In our Detecting Petya/NotPetya post earlier this week, we described the way in which NotPetya (or “Nyetna” as it has also been named) spreads to other systems on the network without use of the ETERNALBLUE/ETERNALROMANCE SMBv1 exploits. (Although the code contains the ability to spread by this exploit as well, so patching is still imperative). The malware harvests SMB and user credentials from th...
LogRhythm
LogRhythm
Blog Post

New blog articles detected.

  • Deploying NetMon Freemium at Home to Monitor IoT Devices
    Why Monitor IoT Devices at Home? LogRhythm’s NetMon Freemium is a powerful and easy-to-use product, so why not fully realize its potential both at home and in the office? In-home Internet of Things (IoT) devices, such as sensors, lights, cameras, and so forth, have seen a steady rise in usage. However, with this rise comes an increase in cyberattacks targeting these devices, such as the Mirai Bo...
LogRhythm
LogRhythm
Blog Post

New blog articles detected.

  • Detecting Petya/NotPetya Ransomware
    Petya / NotPetya Poses Risk to Even Patched Systems On the morning of June 27, 2017, a new ransomware outbreak—similar to the recent WannaCry malware—was discovered in the Ukraine. The malware quickly spread across Europe, affecting varied industries such as banks, government, retail, and power, among others. Although at first, it seemed that the ransomware was a variant of the Petya family, res...
LogRhythm
LogRhythm
Blog Post

New blog articles detected.

  • Winner! Winner! Black Hat Dinner!
    We’re pleased to announce we have a winner for our “Win a Trip to Black Hat” contest. Thank you to the several hundred who entered. Over 200 of you passed the test! Curious to see how you may have fared on the quiz? Check out the answer thread in our LogRhythm Community. So how did we choose the winner? Rob McGovern, Network Monitor senior technical product manager, pulled the winner out of a bi...
LogRhythm
LogRhythm
Blog Post

New blog articles detected.

  • Using Deep Packet Analytics to Extract Specific Bytes
    Why Extract Specific Bytes Out of a Packet? Pulling specific bytes out of a packet is the best way to get to the real truth of the content. Getting to this level of the content can help you in many use cases. One of the hidden features of NetMon’s DPA language is that you can extract specific bytes out of a packet inside of a packet rule. Although NetMon classifies over 3,100 applications and ex...
LogRhythm
LogRhythm
Blog Post

New blog articles detected.

  • PCI-DSS Compliance 3.2 Updates
    Whether you swipe it, chip it, tap it, or phone it in, if you are involved in capturing payments from a credit card, you are most likely required to comply with Payment Card Industry Data Security Standard (PCI-DSS) requirements. PCI-DSS compliance is ultimately about securing card based payment information to protect the sanctity of each transaction. PCI-DSS 3.2 is Live PCI-DSS is in a transiti...
LogRhythm
LogRhythm
SlideShare Presentation

New SlideShare presentations detected.

  • 6 Ways You Can Use NetMon Freemium to Secure Your Network
    You want to detect threats on your network, but you don’t have the budget for a solution to help you accomplish your goal. Have no fear, NetMon Freemium is here! NetMon Freemium provides enterprise-wide visibility to your network for network-based threat detection and network-based incident response. And the best part is that NetMon Freemium is completely free and feature rich. Read on to find ou...
LogRhythm
LogRhythm
YouTube Video

New YouTube videos detected.

  • Using Sysmon to Really See What’s Happening on Endpoints Webcast 2017
    Sysmon v6.01 is out from Windows Sysinternals and is even better than ever. This free tool runs in the background of your machine, and provides efficient and powerful tracking of key security activity data that you can use for threat hunting. In this on-demand webcast, Jake Reynolds joins Randy Franklin Smith, Windows Security subject matter expert, to discuss how Sysmon works and how to set it u...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.