Symtrex Inc.

Cyber Security Specialist

Call - 866-431-8972 | Send an Email | Request a Quote
Visit Us On FacebookVisit Us On TwitterVisit Us On Linkedin
  • Home
  • Profile
    • Contact Us
    • Security News
    • White Papers
  • Services
    • Compliance Regulations
      • PCI DSS Suite of Products
      • HIPAA/Hitech
      • SOX – Sarbanes Oxley
      • DCID 6/3/NISPOM Chapter 8/JAFAN DoD
      • NERC/FERC
    • Industry Consulting and Implementation
      • Banking and Financial
      • Energy/Utilities
      • Healthcare
      • Retail/Hospitality
    • Security Assessment
  • Security Solutions
    • Sophos
    • Endpoint Security Solutions
      • Bitdefender Business Solutions
      • Sophos Endpoint Protection
    • Forensic Solution – Threat Hunter
    • Network Access Control
      • NetShield
        • NetShield
    • NGFW – UTM – Perimeter Security
      • Sophos Network Protection
    • Security Awareness Training
      • KnowBe4 – Security Awareness Training
      • Sophos Phish Threat
  • White Papers
    • Sophos Webinar Series
  • Security News
    • Blog
    • Sophos Webinar Series
  • Free Security Tools

LogRhythm scores High

2015/11/10 by admin

LogRhythm scores high on the Gartner report - Critical Capabilities for Security Information and Event Management. (September 2015).

Gartner’s 2015 Critical Capabilities for Security Information and Event Management report enables IT security managers to align their needs with one of the three most common use cases. And LogRhythm Scores high on all three.

  • Compliance
  • Threat Management
  • SIEM

Compliance

Contact us to find out more

Filed Under: Advanced Persistent Threat, compliance, CyberThreats, Log Management, LogRhythm, Malware, Network Monitoring, Products, Security News

Looking for an SIEM?

2015/11/02 by admin

Reviewing the logs of your organization has long been a standard for organizations to analyze the activity of their networks. In recent years however, organizations are requiring more from their Security Information and Event Management tool. An SIEM Tool should have the following capabilities at a minimum:

  • Data aggregation
  • Correlation
  • Alerting
  • Dashboards
  • Compliance - Data Gathering and Reporting
  • Retention
  • Forensic analysis

According to one industry leader - SIEM products and services serve two purposes: providing centralized security logging and reporting for an organization, and aiding in the detection, analysis and mitigation of security incidents.

While the list of SIEM products is growing, a number of organizations are looking to independent third party analysis of these tools. If you are in the market for an SIEM or to replace your existing system, we invite you to review the following report.

Download Report

Filed Under: Advanced Persistent Threat, compliance, CyberThreats, Log Management, LogRhythm, Network Monitoring, PCI, Security News

LogRhythm 7 Accelerates Cyber Threat Detection

2015/10/13 by admin

LogRhythm 7 Accelerates Cyber Threat Detection & Response via Revolutionary Search, Optimization in Processing and Indexing

Extends Efficiencies and Effectiveness of Next-Gen SOCs

BOULDER, Colo.—October 8, 2015—LogRhythm, The Security Intelligence Company, today unveiled LogRhythm 7, a major upgrade to its leading security intelligence and analytics platform. New innovations in search, scalability, performance and security operations efficiencies will help organizations detect and respond faster to advanced cyber threats.

Version 7 of the LogRhythm security intelligence and analytics platform provides the visibility, automation and incident response orchestration capabilities required by the next-generation security operations center (SOC). The platform accomplishes this by collecting information from hundreds of thousands of disparate data sources, then analyzing and prioritizing the data and events. The resulting information becomes instantly available to SOC personnel.

In its 2015 Global Cost of Data Breach Study, the Ponemon Institute cited a continual rise in cyber attack frequency and the costs associated with resolving cyber incidents. As such, IT teams must increase their visibility and analytics capabilities to detect intruders faster and enable rapid, efficient and precise response to avoid a material breach or high-impact cyber incident.

Go to full Article ->

Filed Under: Advanced Persistent Threat, compliance, CyberThreats, Log Management, LogRhythm, Security News

Frost & Sullivan Declares LogRhythm as SIEM / Log Management Market Leader

2015/09/30 by admin

The accolades continue for LogRhythm as Frost & Sullivan Declares LogRhythm as the Market Leader - SIEM/Log Managment

Read full Report from the Business Wire

LogRhythm cited for ability to reduce mean-time-to-detect and mean-time-to-respond to incidents for better threat mitigation and remediation.

September 29, 2015 08:00 AM Eastern Daylight Time

BOULDER, Colo.-(BUSINESS WIRE)-Based on its recent analysis of the security information and event management/log management (SIEM/LM) market, Frost & Sullivan has recognized LogRhythm with the Enabling Technology Leadership Award in the SIEM/Log Management (LM) industry. LogRhythm earned this honor by scoring better than the competition when evaluated for technology leverage and customer impact, the criteria applied by Frost & Sullivan analysts.

“Frost & Sullivan’s distinction, for the third year in a row, validates that organizations striving to improve their cyber threat detection and response capabilities turn to LogRhythm”

According to the report describing the award and the evaluation against the competition, LogRhythm showed superiority in commitment to innovation and creativity; success in taking new technology solutions to market; efficiency in managing new solution innovations; and application diversity. For customer impact, LogRhythm finished first in brand equity; customer service experience; price/performance value; customer purchase experience; and customer ownership experience.

The report further explained how enterprises purchase the LogRhythm SIEM for its combination of strong analytics and compliance and auditing platforms. The LogRhythm SIEM architecture treats each SIEM function as an integrated process and can perform over multiple locations due to its excellent scalability. Search and Intelligent Indexing are interconnected, and advanced correlation includes visibility of all network infrastructure and end-use devices. The report also commended how LogRhythm’s ability to transition between SIEM functions directly affects the mean-time-to-detect and mean-time-to-respond to cyber threats.

“To achieve enabling technology leadership is never an easy task, but it is one made even more difficult due to today’s competitive intensity, customer volatility and economic uncertainty—not to mention the difficulty of innovating in an environment of escalating challenges to intellectual property,” said Chris Kissel, industry analyst at Frost & Sullivan. “Within this context, LogRhythm’s award signifies an even greater accomplishment as the company has achieved excellence in technology and customer loyalty and experience within a critical technology market. SIEM technologies have become an integral part of the post-breach incident response process.”

“Frost & Sullivan’s distinction, for the third year in a row, validates that organizations striving to improve their cyber threat detection and response capabilities turn to LogRhythm,” said Mike Reagan, chief marketing officer of LogRhythm. “The award also highlights LogRhythm’s ongoing commitment to innovation to help our customers continuously improve their ability to detect, respond to and neutralize cyber threats before they cause damage.”

 

 

Filed Under: Advanced Persistent Threat, compliance, CyberThreats, Log Management, LogRhythm, Security News

LogRhythm Leader in SIEM - Magic Quadrant

2015/09/03 by admin

LogRhythm was acknowledged for the fourth time as a leader in the SIEM in the Magin Quadrant report by Gartner, sharing this title with four other SIEM Products. The security information and event management (SIEM) market is defined by the customer’s need to apply security analytics to event data in real time for the early detection of targeted attacks and data breaches, and to collect, store, analyze and report on log data for incident response, forensics and regulatory compliance.

According to the report: LogRhythm is an especially good fit for organizations that require an integrated combination of SIEM, endpoint and network monitoring capabilities, and those organizations that value ease of deployment and predefined function over a “build your own” approach to monitoring.

The strengths of the product included

  • LogRhythm combines SIEM capabilities with endpoint monitoring, network forensics and incident management capabilities to support security operations use cases.
  • Gartner receives consistent user feedback stating that LogRhythm’s solution is straightforward to deploy and maintain, and provides effective out-of-the-box use cases and reporting templates.
  • The average of LogRhythm reference customers satisfaction scores for scalability and performance, effectiveness of predefined rules, usefulness of predefined reports, ease of use and effectiveness of predefined queries, product quality and stability, and support experience support is higher than the average scores for all reference customers in those areas.
  • LogRhythm continues to be very visible in the competitive SIEM technology evaluations of Gartner clients.

To learn more about LogRhythm, or to setup a demonstration, give us a call at 866-431-8972 ext 221.

Filed Under: Advanced Persistent Threat, compliance, CyberThreats, industry, Log Management, LogRhythm, Network Monitoring, Security News

  • « Previous Page
  • 1
  • …
  • 4
  • 5
  • 6

Let us help answer any questions you may have

requestmoreinformation.fw

Security News and Updates

  • Was my information part of a breach?
  • Phishing and stolen credentials
  • Ransomware is the Biggest Threat for Small to Medium Businesses

RSS SecurityWeek

  • 'Critical Severity' Warning for Malware Embedded in Popular JavaScript Library
  • REvil Ransomware Gang Hit by Law Enforcement Hack-Back Operation
  • Microsoft Introduces Security Program for Non-Profits

Contact

  • Contact Us

Request More Info

  • Request Quote

Site Map

  • Site Map

© Copyright 2016 Symtrex Inc. ; All Rights Reserved · Privacy Statement