CO, United States
CO, United States

Time filter

Source Type

News Article | May 18, 2017
Site: www.prnewswire.com

LONDON, May 18, 2017 /PRNewswire/ -- Overview: Enterprise and government spending for cybersecurity products, managed services, and professional services will be substantial over the course of the next few years. According to Cybersecurity Ventures, cumulative global spending on cybersecurity products and services will exceed $1 trillion over the next five years. Furthermore, the firm predicts $6 trillion in cybercrime damages annually by 2021. Accordingly, Mind Commerce sees damage control and mitigation solutions as a critical portion of the cybersecurity market. Download the full report: https://www.reportbuyer.com/product/4897121/ At the macro level, spending is driven by the realization of increasingly more voluminous and sophisticated global threats to digital infrastructure. At the business level, company reliance upon the Internet, open interfaces and communication between customers and other companies necessitates robust cybersecurity solutions. In addition, new technologies and solutions such as the Internet of Things (IoT) will require new approaches to cybersecurity and hence innovative solutions as evaluated in the Mind Commerce report Artificial Intelligence in IoT Security and Fraud Prevention 2017 – 2022. Global Cybersecurity Market Outlook and Forecasts 2017 – 2022 examines cybersecurity technology and solutions. The report assesses risks and security operation issues relative to current and anticipated cybersecurity technologies. The research also assesses the impact regionally including North America, Europe, APAC, Middle East, Africa, and Latin America. The report evaluates leading cybersecurity solution provider companies, product and solutions, and impact on industry verticals. The report includes global and regional cybersecurity forecasts for the period 2017 to 2022 by product and solution, managed services, professional services, security type, deployment model, industry verticals, and threat platforms. Target Audience: · IT services companies · Cybersecurity solution providers · Network and datacenter operators · Managed security service providers · Cloud and network solution providers · Governmental agencies and NGO organizations · Enterprise organizations across all industry verticals Companies in Report: · Accenture PLC · BAE Systems Inc. · Barracuda Networks Inc. · Bayshore Networks · BlackMesh Inc. · Booz Allen Hamilton Inc. · Cassidian Cybersecurity · Centrify Corporation · Check Point Software Technologies Ltd. · Cisco Systems Inc. · DXC Technology · FireEye inc · Fortinet Inc. · Fortscale Security Ltd. · Hewlett Packard Enterprise (HPE) · IBM Corporation · Juniper Networks · Kaspersky Lab · Lockheed Martin · LogRhythm Inc. · McAfee · Northrop Grumman Corporation · Palo Alto Networks Inc. · Pradeo Security Systems · PricewaterhouseCoopers (PwC) · Rapid7, Inc. · RSA Security LLC · Schneider Electric · SecureWorks Inc. · Sophos Ltd. · Symantec Corporation · Thales Group · Trend Micro, Inc. Download the full report: https://www.reportbuyer.com/product/4897121/ About Reportbuyer Reportbuyer is a leading industry intelligence solution that provides all market research reports from top publishers http://www.reportbuyer.com For more information: Sarah Smith Research Advisor at Reportbuyer.com Email: query@reportbuyer.com Tel: +44 208 816 85 48 Website: www.reportbuyer.com To view the original version on PR Newswire, visit:http://www.prnewswire.com/news-releases/global-cybersecurity-market-outlook-and-forecasts-2017---2022-300460260.html


June 6, 2017 live webinar provides insight on cybersecurity requirements and tools to assist in compliance by end-of-year deadline. Sera-Brynn, a top-ranked cybersecurity firm with a message of “Pure-Compliance” is teaming with LogRhythm, The Security Intelligence Company, in a live webinar to provide insight on the cybersecurity requirements of the Defense Federal Acquisition Regulation Supplement (DFARS). To Register Click Here:  Learn More and Register! Description:     The DFARS on cyber incident reporting and cybersecurity requirements impact U.S. Department of Defense Contractors. Compliance is mandatory by year’s end, 2017 and interim reporting requirements are already in effect. In this webinar, Shawn Mastria, sales engineer for LogRhythm, and Heather Engel, Chief Strategy Officer for Sera-Brynn, will outline how LogRhythm can help with your NIST reporting and cyber security initiatives. Heather Engel stated, “Security intelligence provides an organization with the ability to detect attacks in progress, and comply with many of the required NIST controls,” stated Heather Engel. “Defense contractors, subcontractors, and vendors in the supply chain will all benefit from learning about the compliance process and tools to assist.” LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. LogRhythm is headquartered in Boulder, Colorado, with operations throughout North and South America, Europe and the Asia Pacific region. Sera-Brynn is a leading cybersecurity audit and advisory firm. The Virginia-based company offers threat management, compliance and risk assessment, risk control, and incident response services that enable clients to secure their computing environments and meet applicable and mandatory cybersecurity regulatory standards.  This technical expertise is the backbone of their DFARS compliance services. Founded in 2011 by former members of the U.S. intelligence community, Sera-Brynn is ranked #10 worldwide on the Cybersecurity 500 list.


News Article | May 8, 2017
Site: www.prnewswire.com

Today's SOCs have a broad range of capabilities, with 91% providing prevention capabilities through network IDS/IPS, 86% providing detection capabilities through network IDS/IPS, and 77% providing response capabilities through EDR (endpoint detection and response), to name just the highest-rated capabilities. Responses indicate that SOCs gather, analyze and react to tremendous amounts of information on a daily basis. The key is making it useful to all SOC-related functions and improving integration with network operations centers (NOCs). Right now, only 32% of respondents report having close integration between their SOC and NOC, with 12% having strong technical integration. "This lack of integration may, in part, be the variety of architectures respondents' utilize," continues Crowley. "There is no doubt that there are clear opportunities to improve security operations, starting with better relationships and coordination with IT operations." Full results will be shared during a two-part webcast. Part 1 will be held on May 17, 2017 at 1 PM EDT, and the Part 2 webcast will air on May 18, 2017 at 1 PM EDT. Both webcasts are sponsored by Carbon Black, Endgame, LogRhythm, NETSCOUT, ThreatConnect, and Tripwire and hosted by SANS. Register to attend the May 17 webcast at www.sans.org/u/rSo and the May 18 webcast at www.sans.org/u/rSt Those who register for the webcast will also receive access to the published results paper developed by SANS Analyst and security operations center expert, Christopher Crowley. Learn what SOCs are doing now and where they're headed | Part 1, www.sans.org/u/rSD  | Part 2, www.sans.org/u/rSI About SANS Institute The SANS Institute was established in 1989 as a cooperative research and education organization. SANS is the most trusted and, by far, the largest provider of training and certification to professionals at governments and commercial institutions world-wide. Renowned SANS instructors teach over 50 different courses at more than 200 live security training events as well as online. GIAC, an affiliate of the SANS Institute, validates employee qualifications via 30 hands-on, technical certifications in information security. The SANS Technology Institute, a regionally accredited independent subsidiary, offers cyber . SANS offers a myriad of free resources to the InfoSec community including consensus projects, research reports, and newsletters; it also operates the Internet's early warning system--the Internet Storm Center. At the heart of SANS are the many security practitioners, representing varied global organizations from corporations to universities, working together to help the entire information security community. (www.SANS.org) To view the original version on PR Newswire, visit:http://www.prnewswire.com/news-releases/socs-grow-up-results-of-a-sans-survey-300453192.html


News Article | April 25, 2017
Site: www.businesswire.com

BOULDER, Colo.--(BUSINESS WIRE)--LogRhythm, The Security Intelligence Company, today announced that Forrester Research, Inc. named it a Leader in The Forrester Wave™: Security Analytics Platforms, Q1 2017 report.


LogRhythm receives highest possible score in 16 of report's evaluation criteria, including User Behavior Analytics (UBA) and Integrated Network Analytics and Visibility (NAV)


BOULDER, Colo.--(BUSINESS WIRE)--LogRhythm, The Security Intelligence Company, today announced that the company has been named the Gold Award winner in the first Gartner Peer Insights Customer Choice Awards for Security Information and Event Management (SIEM). The Customer Choice Awards are a ranking of vendors by verified end-user professionals, taking into account both the number of end-user reviews, and the overall user ratings. Many users praised LogRhythm’s great customer support, noting that the support team is amazing and responsive, and highlighted that its SIEM product is easy to use and highly customizable. Users also reported that LogRhythm is worth the investment and has more advanced features at a lower cost, with the search, reporting and event management capabilities earning high marks. Here is a sampling of what LogRhythm customers are saying: Gartner Peer Insights transforms the way enterprise software is bought and sold by creating another source of trusted information in the software buying process. Gartner’s review platform is a place for all IT buyers to find advice they can trust from fellow IT professionals—free from conflicts of interest. “It’s an honor to be publicly recognized around the world by real users for our world-class product and support,” said Chris Petersen, chief technology officer, senior vice president of R&D and co-founder at LogRhythm. “We are extremely thankful for the insights provided by our customer community. We believe this Gold Award validates our mission of helping customers quickly detect and respond to cyber-threats.” Gartner Peer Insights Customer Choice Awards are determined by the subjective opinions of individual end-user customers based on their own experiences, the number of published reviews on Gartner Peer Insights and overall ratings for a given vendor in the market, as further described here http://www.gartner.com/reviews-pages/peer-insights-customer-choice-awards/ and are not intended in any way to represent the views of Gartner or its affiliates. LogRhythm, a leader in threat lifecycle management, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s patented award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint monitoring, and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides unparalleled compliance automation and assurance, and enhanced IT intelligence. LogRhythm is consistently recognized as a market leader. The company has been named a ‘Champion’ in Info-Tech Research Group’s 2014-15 SIEM Vendor Landscape report, received SC Labs ‘Recommended’ 5-Star rating for SIEM and UTM for 2016 and earned Frost & Sullivan’s 2015 Global Security Information and Event Management (SIEM) Enabling Technology Leadership Award. LogRhythm is headquartered in Boulder, Colorado, with operations throughout North and South America, Europe and the Asia Pacific region.


Patent
LogRhythm | Date: 2012-03-22

Tools for use in obtaining useful information from processed log messages generated by a variety of network platforms (e.g., Windows servers, Linux servers, UNIX servers, databases, workstations, etc.). The log messages may be processed by one or more processing engines (e.g., log managers) using any appropriate rule base to identify events (i.e., log messages of somewhat heightened importance), and one or more event managers may analyze the events to determine whether alarms should be generated therefrom. The tools may be accessed via any appropriate user interface of a console that is in communication with the various log managers, event managers, etc., to perform numerous tasks in relation to logs, events and alarms.


Patent
LogRhythm | Date: 2014-10-20

An advanced intelligence engine (AIE) for use in identifying what may be complex events or developments on one or more data platforms or networks from various types of structured or normalized data generated by one or more disparate data sources. The AIE may conduct one or more types of quantitative, correlative, behavioral and corroborative analyses to detect events from what may otherwise be considered unimportant or non-relevant information spanning one or more time periods. Events generated by the AIE may be passed to an event manager to determine whether further action is required such as reporting, remediation, and the like.


Patent
LogRhythm | Date: 2013-09-13

An advanced intelligence engine (AIE) for use in identifying what may be complex events or developments on one or more data platforms or networks from various types of structured or normalized data generated by one or more disparate data sources. The AIE may conduct one or more types of quantitative, correlative, behavioral and corroborative analyses to detect events from what may otherwise be considered unimportant or non-relevant information spanning one or more time periods. Events generated by the AIE may be passed to an event manager to determine whether further action is required such as reporting, remediation, and the like.


Patent
LogRhythm | Date: 2016-06-10

Tools for use in obtaining useful information from processed log messages generated by a variety of network platforms (e.g., Windows servers, Linux servers, UNIX servers, databases, workstations, etc.). The log messages may be processed by one or more processing platforms or log managers using any appropriate rule base to identify events (i.e., log messages of somewhat heightened importance), and one or more event managers may analyze the events to determine whether alarms should be generated therefrom. The tools may be accessed via any appropriate user interface of a console that is in communication with the various log managers, event managers, etc., to perform numerous tasks in relation to logs, events and alarms.

Loading LogRhythm collaborators
Loading LogRhythm collaborators