Symtrex Inc.

Cyber Security Specialist

Call - 866-431-8972 | Send an Email | Request a Quote
Visit Us On FacebookVisit Us On TwitterVisit Us On Linkedin

Profile

 [metaslider id=2951] … Read More

  • Home
  • Profile
    • Contact Us
    • Security News
    • White Papers
  • Services
    • Compliance Regulations
      • PCI DSS Suite of Products
      • HIPAA/Hitech
      • SOX – Sarbanes Oxley
      • DCID 6/3/NISPOM Chapter 8/JAFAN DoD
      • NERC/FERC
    • Industry Consulting and Implementation
      • Banking and Financial
      • Energy/Utilities
      • Healthcare
      • Retail/Hospitality
    • Security Assessment
  • Security Solutions
    • Sophos
    • Endpoint Security Solutions
      • Bitdefender Business Solutions
      • Sophos Endpoint Protection
    • Forensic Solution – Threat Hunter
    • Network Access Control
      • NetShield
        • NetShield
    • NGFW – UTM – Perimeter Security
      • Sophos Network Protection
    • Security Awareness Training
      • KnowBe4 – Security Awareness Training
      • Sophos Phish Threat
  • White Papers
    • Sophos Webinar Series
  • Security News
    • Blog
    • Sophos Webinar Series
  • Free Security Tools

LogRhythm – Earns Recommended Designation and 5 Stars

2016/05/05 by admin

Business Wire

Independent Testers Praise LogRhythm as “Most Complete, Pure-play SIEM”

BOULDER, Colo.–(BUSINESS WIRE)–LogRhythm, The Security Intelligence Company, today announced that its Security Intelligence Platform, has earned the “RECOMMENDED” designation and a perfect five-star rating in SC Magazine’s 2016 SIEM and UTM Group Test. The reviewers specifically called out LogRhythm’s “next-gen features and superlative correlation and analytics” as its primary strengths.

As part of the SIEM and UTM Group Review, SC Magazine tested six solutions. The review emphasized that LogRhythm’s security intelligence platform is “a heavy-duty tool made for a demanding large environment. It is scalable and complete with the largest list of supported connectors we’ve seen yet.”

“Information security teams value advanced analytics, efficient incident response, and effective workflow and collaboration in the platform they place at the center of their security operations. It’s not surprising then that LogRhythm received SC Magazine’s “RECOMMENDED” designation in this year’s lab test,” said Mike Reagan, chief marketing officer at LogRhythm. “This review highlights why enterprises around the globe are increasingly selecting LogRhythm’s Security Intelliegence and Analytics Platform to bolster their ability to detect, respond to and neutralize advanced cyber threats through comprehensive threat lifecycle management.”

SC Magazine stated that LogRhythm is the “most complete, pure-play SIEM we’ve seen.” It went on to say about the LogRhythm solution, “It has the intelligence to analyze, correlate and make sense of huge amounts of data.”

LogRhythm’s unified Security Intelligence Platform integrates next-gen SIEM and log management with network forensics, endpoint monitoring and multidimensional security analytics. LogRhythm provides deep visibility into threats and risks to which organizations are otherwise blind. Designed to help prevent breaches before they happen, LogRhythm accurately detects an extensive range of early indicators of compromise, enabling rapid response and mitigation.

The deep visibility and understanding delivered by LogRhythm’s Security Intelligence Platform empowers enterprises to secure their networks and comply with regulatory requirements.

The SC Magazine review can be found online at: http://www.scmagazine.com/utm-and-siem/grouptest/361/.

 

Filed Under: Advanced Persistent Threat, compliance, CyberThreats, LogRhythm, Products, Security News

Let us help answer any questions you may have

requestmoreinformation.fw

Security News and Updates

  • Was my information part of a breach?
  • Phishing and stolen credentials
  • Ransomware is the Biggest Threat for Small to Medium Businesses

RSS SecurityWeek

  • US Charges 20-Year-Old Head of Hacker Site BreachForums
  • Tesla Hacked Twice at Pwn2Own Exploit Contest
  • CISA Ships ‘Untitled Goose Tool’ to Hunt for Microsoft Azure Cloud Infections

Contact

  • Contact Us

Request More Info

  • Request Quote

Site Map

  • Site Map

© Copyright 2016 Symtrex Inc. ; All Rights Reserved · Privacy Statement