Products

Screen Shot 2017-09-23 at 3.38.26 PM.png
 
CapExCustomer Owned.png

Option1

Option 2

CapExCustomer Owned (2).png

Option 3

Patented Award Winning Platform

What is LogRhythm?

  • LogRhythm, is a leader in security intelligence and analytics.

  • empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats.

  • The company's patented award winning platform uniquely unifies. 

    • next generation SIEM.

    • log management.

    • network and endpoint monitoring. 

    • User and Entity Behavior Analytics (UEBA). 

    • security automation and orchestration.

    • advanced security analytics.

  • In addition to protecting customers from the risks associated with cyber threats.

  • LogRhythm provides unparalleled compliance automation and assurance, and enhanced IT intelligence. 

 

  • The comprehensive patent issued to LogRhythm by the United States Patent & Trademark Office includes claims relating to:

  • Content-based log processing – parsing logs into content data fields

  • Intelligent log archiving – archiving log data such that archiving rules are based in part on log content

  • Content-based log and event prioritization

  • Event processing – the further processing of logs first designated as events

  • Log classification – where log processing is related to application monitoring, security, operations, auditing or regulatory compliance

  • Identification and use of log data content specifying host, log source, IP address, program and login

  • Application of metadata to parsed logs for use in archiving or restoration

  • Use of an agent for monitoring and collecting logs, associating metadata with parsed logs, and/or forwarding log data

  • Tagging logs with metadata and/or use of regular expressions for deeper log processing, analysis, correlation, alerting and/or search

  • Accessing Windows event log data and collecting those logs via standard logging and message protocols

  • Identification of Windows event log time stamp

  • Time stamp normalization of Windows event logs across time zones, local clock offsets and platform times

Begin detecting threats. 

Threat Management Foundations Service helps you harness LogRhythm’s threat management capabilities for end-to-end detection and response. It is typically executed in concert with Core Deployment Service.

  • Implement security analytics to identify threats and prioritize alarms.

  • Use automation to detect and disable compromised accounts and endpoints.

  • Integrate open source threat feeds to gain additional visibility and context.

  • Align your operational procedures with best practices as prescribed by the Threat Management Foundation’s playbook.

The Solution?

The solution is to listen for what has already made its way inside. The LogRythm platform looks deep into the packets moving across your network to provide a state of the art system for deciding what should and shouldn't be there with unprecedented precision.

 

If you are interested in pricing please fill out the form below and a Representative will contact you.

This information is sacred to us. We will not share it.