CO, United States
CO, United States
SEARCH FILTERS
Time filter
Source Type

LogRhythm receives highest possible score in 16 of report's evaluation criteria, including User Behavior Analytics (UBA) and Integrated Network Analytics and Visibility (NAV)


News Article | April 25, 2017
Site: www.businesswire.com

BOULDER, Colo.--(BUSINESS WIRE)--LogRhythm, The Security Intelligence Company, today announced that Forrester Research, Inc. named it a Leader in The Forrester Wave™: Security Analytics Platforms, Q1 2017 report.


News Article | May 18, 2017
Site: www.prnewswire.com

LONDON, May 18, 2017 /PRNewswire/ -- Overview: Enterprise and government spending for cybersecurity products, managed services, and professional services will be substantial over the course of the next few years. According to Cybersecurity Ventures, cumulative global spending on cybersecurity products and services will exceed $1 trillion over the next five years. Furthermore, the firm predicts $6 trillion in cybercrime damages annually by 2021. Accordingly, Mind Commerce sees damage control and mitigation solutions as a critical portion of the cybersecurity market. Download the full report: https://www.reportbuyer.com/product/4897121/ At the macro level, spending is driven by the realization of increasingly more voluminous and sophisticated global threats to digital infrastructure. At the business level, company reliance upon the Internet, open interfaces and communication between customers and other companies necessitates robust cybersecurity solutions. In addition, new technologies and solutions such as the Internet of Things (IoT) will require new approaches to cybersecurity and hence innovative solutions as evaluated in the Mind Commerce report Artificial Intelligence in IoT Security and Fraud Prevention 2017 – 2022. Global Cybersecurity Market Outlook and Forecasts 2017 – 2022 examines cybersecurity technology and solutions. The report assesses risks and security operation issues relative to current and anticipated cybersecurity technologies. The research also assesses the impact regionally including North America, Europe, APAC, Middle East, Africa, and Latin America. The report evaluates leading cybersecurity solution provider companies, product and solutions, and impact on industry verticals. The report includes global and regional cybersecurity forecasts for the period 2017 to 2022 by product and solution, managed services, professional services, security type, deployment model, industry verticals, and threat platforms. Target Audience: · IT services companies · Cybersecurity solution providers · Network and datacenter operators · Managed security service providers · Cloud and network solution providers · Governmental agencies and NGO organizations · Enterprise organizations across all industry verticals Companies in Report: · Accenture PLC · BAE Systems Inc. · Barracuda Networks Inc. · Bayshore Networks · BlackMesh Inc. · Booz Allen Hamilton Inc. · Cassidian Cybersecurity · Centrify Corporation · Check Point Software Technologies Ltd. · Cisco Systems Inc. · DXC Technology · FireEye inc · Fortinet Inc. · Fortscale Security Ltd. · Hewlett Packard Enterprise (HPE) · IBM Corporation · Juniper Networks · Kaspersky Lab · Lockheed Martin · LogRhythm Inc. · McAfee · Northrop Grumman Corporation · Palo Alto Networks Inc. · Pradeo Security Systems · PricewaterhouseCoopers (PwC) · Rapid7, Inc. · RSA Security LLC · Schneider Electric · SecureWorks Inc. · Sophos Ltd. · Symantec Corporation · Thales Group · Trend Micro, Inc. Download the full report: https://www.reportbuyer.com/product/4897121/ About Reportbuyer Reportbuyer is a leading industry intelligence solution that provides all market research reports from top publishers http://www.reportbuyer.com For more information: Sarah Smith Research Advisor at Reportbuyer.com Email: query@reportbuyer.com Tel: +44 208 816 85 48 Website: www.reportbuyer.com To view the original version on PR Newswire, visit:http://www.prnewswire.com/news-releases/global-cybersecurity-market-outlook-and-forecasts-2017---2022-300460260.html


News Article | May 8, 2017
Site: www.prnewswire.com

Today's SOCs have a broad range of capabilities, with 91% providing prevention capabilities through network IDS/IPS, 86% providing detection capabilities through network IDS/IPS, and 77% providing response capabilities through EDR (endpoint detection and response), to name just the highest-rated capabilities. Responses indicate that SOCs gather, analyze and react to tremendous amounts of information on a daily basis. The key is making it useful to all SOC-related functions and improving integration with network operations centers (NOCs). Right now, only 32% of respondents report having close integration between their SOC and NOC, with 12% having strong technical integration. "This lack of integration may, in part, be the variety of architectures respondents' utilize," continues Crowley. "There is no doubt that there are clear opportunities to improve security operations, starting with better relationships and coordination with IT operations." Full results will be shared during a two-part webcast. Part 1 will be held on May 17, 2017 at 1 PM EDT, and the Part 2 webcast will air on May 18, 2017 at 1 PM EDT. Both webcasts are sponsored by Carbon Black, Endgame, LogRhythm, NETSCOUT, ThreatConnect, and Tripwire and hosted by SANS. Register to attend the May 17 webcast at www.sans.org/u/rSo and the May 18 webcast at www.sans.org/u/rSt Those who register for the webcast will also receive access to the published results paper developed by SANS Analyst and security operations center expert, Christopher Crowley. Learn what SOCs are doing now and where they're headed | Part 1, www.sans.org/u/rSD  | Part 2, www.sans.org/u/rSI About SANS Institute The SANS Institute was established in 1989 as a cooperative research and education organization. SANS is the most trusted and, by far, the largest provider of training and certification to professionals at governments and commercial institutions world-wide. Renowned SANS instructors teach over 50 different courses at more than 200 live security training events as well as online. GIAC, an affiliate of the SANS Institute, validates employee qualifications via 30 hands-on, technical certifications in information security. The SANS Technology Institute, a regionally accredited independent subsidiary, offers cyber . SANS offers a myriad of free resources to the InfoSec community including consensus projects, research reports, and newsletters; it also operates the Internet's early warning system--the Internet Storm Center. At the heart of SANS are the many security practitioners, representing varied global organizations from corporations to universities, working together to help the entire information security community. (www.SANS.org) To view the original version on PR Newswire, visit:http://www.prnewswire.com/news-releases/socs-grow-up-results-of-a-sans-survey-300453192.html


Patent
LogRhythm | Date: 2012-03-22

Tools for use in obtaining useful information from processed log messages generated by a variety of network platforms (e.g., Windows servers, Linux servers, UNIX servers, databases, workstations, etc.). The log messages may be processed by one or more processing engines (e.g., log managers) using any appropriate rule base to identify events (i.e., log messages of somewhat heightened importance), and one or more event managers may analyze the events to determine whether alarms should be generated therefrom. The tools may be accessed via any appropriate user interface of a console that is in communication with the various log managers, event managers, etc., to perform numerous tasks in relation to logs, events and alarms.


Patent
LogRhythm | Date: 2011-07-01

Tools for use in obtaining useful information from processed log messages generated by a variety of network platforms (e.g., Windows servers, Linux servers, UNIX servers, databases, workstations, etc.). The log messages may be processed by one or more processing platforms or log managers using any appropriate rule base to identify events (i.e., log messages of somewhat heightened importance), and one or more event managers may analyze the events to determine whether alarms should be generated therefrom. The tools may be accessed via any appropriate user interface of a console that is in communication with the various log managers, event managers, etc., to perform numerous tasks in relation to logs, events and alarms.


Patent
LogRhythm | Date: 2014-10-20

An advanced intelligence engine (AIE) for use in identifying what may be complex events or developments on one or more data platforms or networks from various types of structured or normalized data generated by one or more disparate data sources. The AIE may conduct one or more types of quantitative, correlative, behavioral and corroborative analyses to detect events from what may otherwise be considered unimportant or non-relevant information spanning one or more time periods. Events generated by the AIE may be passed to an event manager to determine whether further action is required such as reporting, remediation, and the like.


Patent
LogRhythm | Date: 2013-09-13

An advanced intelligence engine (AIE) for use in identifying what may be complex events or developments on one or more data platforms or networks from various types of structured or normalized data generated by one or more disparate data sources. The AIE may conduct one or more types of quantitative, correlative, behavioral and corroborative analyses to detect events from what may otherwise be considered unimportant or non-relevant information spanning one or more time periods. Events generated by the AIE may be passed to an event manager to determine whether further action is required such as reporting, remediation, and the like.


Patent
LogRhythm | Date: 2011-11-23

An advanced intelligence engine (AIE) for use in identifying what may be complex events or developments on one or more data platforms or networks from various types of structured or normalized data generated by one or more disparate data sources. The AIE may conduct one or more types of quantitative, correlative, behavioral and corroborative analyses to detect events from what may otherwise be considered unimportant or non-relevant information spanning one or more time periods. Events generated by the AIE may be passed to an event manager to determine whether further action is required such as reporting, remediation, and the like.


Patent
LogRhythm | Date: 2016-06-10

Tools for use in obtaining useful information from processed log messages generated by a variety of network platforms (e.g., Windows servers, Linux servers, UNIX servers, databases, workstations, etc.). The log messages may be processed by one or more processing platforms or log managers using any appropriate rule base to identify events (i.e., log messages of somewhat heightened importance), and one or more event managers may analyze the events to determine whether alarms should be generated therefrom. The tools may be accessed via any appropriate user interface of a console that is in communication with the various log managers, event managers, etc., to perform numerous tasks in relation to logs, events and alarms.

Loading LogRhythm collaborators
Loading LogRhythm collaborators