LogRhythm, The Security Intelligence Company, today announced that it has, once again, been positioned as a Leader by Gartner, Inc. in the 2017 “Magic Quadrant for Security Information and Event Management”* research report, for its Threat Lifecycle Management Platform.
“We feel it’s an honour to be consistently recognied as a Leader in this Gartner Magic Quadrant,” said LogRhythm CTO and Senior Vice President of Research & Development, Chris Petersen. “As data breaches continue to come fast and furious, it’s critical that companies rapidly detect, neutralise and recover from security threats. We believe this research report speaks volumes about LogRhythm’s leadership in the market and our ability to meet the challenges of today’s continually evolving threat landscape for enterprise Security Operations Centers (SOCs) across the globe.”
According to Gartner, “the SIEM Leaders quadrant is composed of vendors that provide products that are a strong functional match to general market requirements, have been the most successful in building an installed base and revenue stream within the SIEM market, and have a relatively high viability rating (due to SIEM revenue or SIEM revenue in combination with revenue from other sources). In addition to providing technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for emerging and anticipated requirements. They typically have relatively high market share and/or strong revenue growth, and have demonstrated positive customer feedback for effective SIEM capabilities and related service and support.”
In addition to SIEM, LogRhythm’s Threat Lifecycle ManagementTM (TLM) Platform delivers solutions for user and entity behavior analytics (UEBA), network traffic and behavior analytics (NTBA), enterprise log management, network and endpoint monitoring, and security automation and orchestration. These solutions comprise the principal workflow of the next-generation security operations centre, seamlessly integrating people and processes across the security organisation and enabling security teams to detect and respond to threats quickly and with great precision. LogRhythm’s customers include some of the largest enterprises and government agencies across the world.
Gartner’s 2017 Magic Quadrant for Security Information and Event Management can be viewed here: https://logrhythm.com/2017-gartner-magic-quadrant-siem-report-a. For further information on LogRhythm and its solutions, please visit www.LogRhythm.com.
*Gartner, “Magic Quadrant for Security Information and Event Management,” Kelly M. Kavanagh, Toby Bussa, 4 December 2017.
Gartner does not endorse any vendor, product, or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organisation and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
LogRhythm is the pioneer in Threat Lifecycle ManagementTM (TLM) technology, empowering organisations on six continents to rapidly detect, respond to and neutralise damaging cyberthreats. LogRhythm’s TLM platform unifies leading-edge data lake technology, artificial intelligence, security analytics and security automation and orchestration in a single end-to-end solution. LogRhythm serves as the foundation for the AI-enabled security operations center, helping customers secure their cloud, physical and virtual infrastructures for both IT and OT environments. LogRhythm has received numerous accolades from various industry analysts and publications to demonstrate its leadership position in the SIEM market.
Email fraud is nothing new, but online criminals have become ever more-effective at spoofing their identities to trick employees into sending them money. The Australian Centre for Cyber Security (ACSC) recorded losses of over $20M to business email compromise (BEC) attacks last year alone, up 230 percent over the previous year – and the full amount is certain to be much larger.
Cybersecurity Insights - Attack
No matter how robust your security, or how diligent your employees, network credentials are a free pass for cybercriminals. This is mostly because employees are relied upon for their own password management. And with more than 4.8 billion sets of stolen credentials said to be available online, odds are that at least a few of your employees’ user IDs and passwords are just waiting to be used by unscrupulous outsiders. Are you ready to stop them?
Cybersecurity Insights - People
Cyber resilience will be particularly important as Australian organisations face increased pressure to quickly detect, respond to, and manage the repercussions of breaches in the wake of 2018’s Notifiable Data Breaches (NDB) scheme.