Patented Award Winning Platform
What is LogRhythm?
LogRhythm, is a leader in security intelligence and analytics.
empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats.
The company's patented award winning platform uniquely unifies.
next generation SIEM.
network and endpoint monitoring.
User and Entity Behavior Analytics (UEBA).
security automation and orchestration.
advanced security analytics.
In addition to protecting customers from the risks associated with cyber threats.
LogRhythm provides unparalleled compliance automation and assurance, and enhanced IT intelligence.
The comprehensive patent issued to LogRhythm by the United States Patent & Trademark Office includes claims relating to:
Content-based log processing – parsing logs into content data fields
Intelligent log archiving – archiving log data such that archiving rules are based in part on log content
Content-based log and event prioritization
Event processing – the further processing of logs first designated as events
Log classification – where log processing is related to application monitoring, security, operations, auditing or regulatory compliance
Identification and use of log data content specifying host, log source, IP address, program and login
Application of metadata to parsed logs for use in archiving or restoration
Use of an agent for monitoring and collecting logs, associating metadata with parsed logs, and/or forwarding log data
Tagging logs with metadata and/or use of regular expressions for deeper log processing, analysis, correlation, alerting and/or search
Accessing Windows event log data and collecting those logs via standard logging and message protocols
Identification of Windows event log time stamp
Time stamp normalization of Windows event logs across time zones, local clock offsets and platform times
Begin detecting threats.
Threat Management Foundations Service helps you harness LogRhythm’s threat management capabilities for end-to-end detection and response. It is typically executed in concert with Core Deployment Service.
Implement security analytics to identify threats and prioritize alarms.
Use automation to detect and disable compromised accounts and endpoints.
Integrate open source threat feeds to gain additional visibility and context.
Align your operational procedures with best practices as prescribed by the Threat Management Foundation’s playbook.
The solution is to listen for what has already made its way inside. The LogRythm platform looks deep into the packets moving across your network to provide a state of the art system for deciding what should and shouldn't be there with unprecedented precision.