LogRhythm

We use LogRhythm extensively to meet PCI and SOX compliance. It is also used on a day to day security and monitoring basis.

Network Administrator, Large Enterprise Retail Company

The LogRhythm Security Intelligence Maturity Model offers a compelling framework to help organizations advance in their journey to combat advanced cyber attacks while simultaneously restoring confidence in the Internet.

Robert Lentz, Former CISO for the U.S. Department of Defense

Whitepapers

Surfacing Critical Cyber Threats Through Security Intelligence

Read more
ambulance
Whitepapers

Case Study - As a direct result of implementing LogRhythm, St John Ambulance is now fully PCI DSS compliant.

Read more

Get the Full 2016 Gartner SIEM MQ Report

Download

Download

Responding to Today’s Advanced Threats

Download

Download

Anatomy of a hack disrupted white paper

Download

Download
Blog

How to Detect and Respond to Ransomware: A Video Use Case

Read more
Blog

5 steps to defend against ransomware

Read more
Blog

Friend or Foe? A Use Case on How to Detect an Insider Threat

Read more
fist
Whitepaper

Read the Latest from the 2016 CyberEdge Cyberthreat Defense Report

Read more
arm_wrestle
Whitepaper

Power Your Security Operations Center: Arm Your Team to Protect Your Organization

Read more
Video

Do You Really Know Your Users? How User Behavior Analytics Can Help You to Detect User Threats

Read more
Video

Is your business under attack

Read more
Video

Defending Against Insider Threats: James Carder

Read more
Video

Secure Set | Cybersecurity Hero: Greg Foss Video

Read more
Video

CSO Roundtable with Bob Lentz

Read more

Events

22 - 23 Aug

Security & Risk Management Summit in Sydney

Details

Details
18 - 20 Oct

Australian Information Security Association event in Sydney

Details

Details
Opinions

​How to avoid an expensive and disruptive ransomware attack

Read more
Opinions

SIEM review: Splunk, ArcSight, LogRhythm and QRadar

Read more