LogRhythm

We use LogRhythm extensively to meet PCI and SOX compliance. It is also used on a day to day security and monitoring basis.

Network Administrator, Large Enterprise Retail Company

The LogRhythm Security Intelligence Maturity Model offers a compelling framework to help organizations advance in their journey to combat advanced cyber attacks while simultaneously restoring confidence in the Internet.

Robert Lentz, Former CISO for the U.S. Department of Defense

Whitepapers

The Ransomware Threat : A Guide to Detecting an Attack Before it’s Too Late

Read more
Whitepapers

Surfacing Critical Cyber Threats Through Security Intelligence

Read more
ambulance
Whitepapers

Case Study - As a direct result of implementing LogRhythm, St John Ambulance is now fully PCI DSS compliant.

Read more

Security Intelligence Platform Group Test SIEM and UTM

Download

Download

2015 Analytics and Intelligence Survey

Download

Download

LogRhythm 7 Review: Reducing Detection and Response Times

Download

Download

Frost and Sullivan SIEM Total Cost of Ownership 2016

Download

Download

Ransomware Infographic

Download

Download
fist
Whitepaper

Read the Latest from the 2016 CyberEdge Cyberthreat Defense Report

Read more
arm_wrestle
Whitepaper

Power Your Security Operations Center: Arm Your Team to Protect Your Organization

Read more
Video

Security Intelligence in Healthcare

Read more
Video

Do You Really Know Your Users? How User Behavior Analytics Can Help You to Detect User Threats

Read more
Video

Defending Against Insider Threats: James Carder

Read more
Video

Secure Set | Cybersecurity Hero: Greg Foss Video

Read more

Events

22 - 23 Aug

Security & Risk Management Summit in Sydney

Details

Details
18 - 20 Oct

Australian Information Security Association event in Sydney

Details

Details
Blog

How to Detect and Respond to Ransomware: A Video Use Case

Read more
Blog

5 steps to defend against ransomware

Read more
Blog

Friend or Foe? A Use Case on How to Detect an Insider Threat

Read more
Opinions

​How to avoid an expensive and disruptive ransomware attack

Read more
Opinions

SIEM review: Splunk, ArcSight, LogRhythm and QRadar

Read more