SIEM 2.0 Big Data security analytics platform

SIEM 2.0 Big Data security analytics platform

SIEM 2.0 Big Data security analytics platform Product Image

BOULDER, Colo.—October 16, 2012—LogRhythm, the leader in cyber threat defense, detection and response, today announced the enhancement of its award-winning SIEM 2.0 Big Data security analytics platform with the industry’s first multi-dimensional behavioral analytics.  Leveraging innovative and patent-pending behavioral whitelisting as well as advanced statistical and heuristic behavioral analysis, the enhanced SIEM 2.0 solution empowers organizations of all sizes to detect breaches and the most sophisticated cyber threats of today, faster and with greater accuracy than ever before.  

 

According to the 2011 Verizon Data Breach Report, 86 percent of breached organizations failed to detect that their networks were hacked.  The tide has turned amongst IT security professionals who now believe it’s no longer a matter of if they’ll be breached but when. In reality, there is a very good chance they have already been breached and simply don’t know it.

 

Today, with its latest innovation to the award-winning SIEM 2.0 platform, LogRhythm is enabling organizations to baseline normal, day-to-day activity across multiple dimensions of the enterprise.  The system then analyzes against that baseline the massive volume of log, flow and machine data generated every second to discover anomalies in real time.  By doing so, LogRhythm is enabling IT administrators and security professionals alike to detect and respond to even the most sophisticated threats and breaches.

 

“Today’s cyber threats are more advanced and, in many cases, more stealthy than ever before.  Organizations need to understand what ‘normal’ behavior is across multiple dimensions of their electronic enterprise so they can detect abnormal activity indicative of a threat or breach,” said Chris Petersen, CTO/CoFounder, LogRhythm.  “Adding the multi-dimensional behavioral analytics layer to our SIEM 2.0 platform delivers on that need and, once again, sets a new standard for advanced threat and breach detection.”

 

Some first generation SIEMs provide behavioral analysis, but it is most often against a silo of data (e.g., Netflow logs, authentication logs), rather than the universe of enterprise activity data (i.e., logs, flow and machine data).  For many organizations, defining normal behavior is a manual process.  But manually determining what is normal is extremely difficult if not impossible for most organizations.  In either scenario, IT and security personnel remain blind to much of the behavior of today’s advanced hackers because the evidence of their activities are buried amidst massive volumes of false positive security events, or they’re miscategorized altogether as benign or ‘normal’ activities.    

 

Further increasing the crippling volume of false positive events in first generation SIEMs is the inherent lack of data corroboration in these tools.  Traditional uses of behavioral and correlative analysis are handled via separate technologies that don’t integrate.  LogRhythm’s multidimensional approach integrates advanced correlative, statistical, behavioral and pattern recognition techniques to corroborate the identification of threats and breaches in real-time with unprecedented accuracy.

 

“Early generation SIEM techniques for correlation and behavioral profiling face a number of challenges in helping midsized-to-large enterprise organizations detect and respond to today’s sophisticated threats,” said Scott Crawford, managing research director, Enterprise Management Associates.  “By adding multi-dimensional behavioral analysis to its SIEM platform, LogRhythm introduces a practical, highly intuitive and easy-to-use approach to building a deep level of analysis of log, flow and machine data, placing richer security analytics within reach for enterprises of all sizes.”    


AVAILABILITY: Early access program is underway.  Solution will be generally available later this quarter.

Expand for more details on this Product

IDS-6300 intelligent security appliance

Product From DB Networks

 

SAN DIEGO – Oct. 23, 2013 -- DB Networks, an innovator of behavioral analysis in database security, today introduced the IDS-6300 intelligent security appliance, the industry’s first next-generation

Get Info Now

LocJack keystone security jacks

Product From Quest Technology International Inc.

Quest Technology now offers a new patented technology for the securing of both data and voice using standard patch cables and our award winning LocJack keystone security jacks. This innovative technology is available in RJ12 and RJ45 versions and requires nothing more than a LocJack keystone security jack and its proprietary security key.

Get Info Now

Secure Global Solutions’ Network Navigator

Product From Secure Global Solutions

Secure Global Solutions announces the release of the Network Navigator, a plug-and-play solution for creating secure remote access and monitoring network performance and devices.

Less than 10% of the 15 trillion IP devices installed on networks are monitored. At a fraction of the cost of competing monitoring systems, the Network Navigator is an affordable solution to all network monitoring needs. The Network Navigator will monitor and send notifications of network anomalies before minor problems become disasters. A Navigator Controller head-end appliance or VMware solution acts as the connector for users and field Network Navigators.

Get Info Now

Emsisoft Emergency Kit 4.0 released

Product From Emsisoft

Salzburg, July 11th, 2013 –As of today, the fourth version of Emsisoft Emergency Kit is available. Popular amongst home users and security professionals alike, the Austrian security specialist‘s powerful software package is freely available to the general public and includes the multi-award winning scanning technology of Emsisoft Anti-Malware. The following features were improved in Emsisoft Emergency Kit 4.0:

Get Info Now

Prolexic releases DDoS protection planning tool

Product From Prolexic


HOLLYWOOD, FL – (June 4, 2013) – Prolexic, the global leader in Distributed Denial of Service (DDoS) protection services, announced today that it has released a role-based version of PLXplanner, the company’s free, online DDoS protection planning tool. PLXplanner is a strategic risk assessment and planning tool to help IT and security professionals build a better defense against increasingly powerful and sophisticated DDoS attacks. Based on answers entered in a role-based quiz, PLXplanner delivers strategic recommendations for improving business, technology or operational strategies to fight DDoS attacks.

Get Info Now

ISD-1000 series data line surge protectors

Product From Moxa

BREA, CA, JUNE 5, 2013 -- Moxa, a provider of hardened networking, communication and computing solutions, today announced the new ISD-1000 Series of data line surge protectors engineered to guard data and hardware from harmful transient energies resulting from the "switching" of nearby equipment.

Get Info Now

EventTracker Log Manager

Product From EventTracker

COLUMBIA, MD July 01, 2013
EventTracker, a leading provider of comprehensive SIEM solutions, announced today the general availability of EventTracker Log Manager, a robust log management solution designed to provide significant business value through proactive monitoring and real-time alerting for network and system administrators.

Get Info Now

Technology Lifecycle Management Assessment for security

Product From Dimension Data

NEW YORK – June 4, 2013 – Dimension Data, the $5.8 billion global ICT solutions and services provider, today announced the availability of its Technology Lifecycle Management Assessment for Security. The assessment helps organizations determine which devices on their corporate network require immediate attention over other devices, based on the network location and severity.

Get Info Now

New Model 0202 OMD Optical Media Destroyer

Product From Security Engineered Machinery (SEM)

WESTBORO, MA — The new Model 0202 OMD Optical Media Destroyer from Security Engineered Machinery (SEM) has the highest-rated throughput capacity of all such shredders evaluated and listed by the National Security Agency (NSA) — 2,400 CDs or DVDs per hour. Exceeding the requirements of the NSA/CSS 04-02 Standards, it reduces discs to tiny 2.0 mm x 3.9 mm particles. Unlike competing models, the Model 0202 has Auto Sync dual voltage capability and two power cords to operate on either 110-120V/60Hz or 220-230V/50Hz power, making it ideal for overseas deployment.

Get Info Now

Model 0300 Jackhammer Hard Drive Shredder from Security Engineered Machinery (SEM)

Product From Security Engineered Machinery (SEM)

WESTBORO, MA — The new Model 0300 Jackhammer Hard Drive Shredder from Security Engineered Machinery (SEM) has a small footprint and is easy to use. Only 37” high, 45” wide, and 21” deep, it destroys hard drives, other electronic devices (cell phones, BlackBerrys®, PDAs, etc.), optical media (CDs and DVDs), and computer backup tapes. Its specially designed sawtooth, hooked cutters can handle 125 to 500 drives per hour (depending on type), reducing them to random 1½” shreds.

Get Info Now