Attacks/Breaches

10/9/2015
11:35 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

LogRhythm 7 Accelerates Cyber Threat Detection & Response via Revolutionary Search, Optimization in Processing and Indexing

Extends Efficiencies and Effectiveness of Next-Gen SOCs

BOULDER, Colo.—October 8, 2015LogRhythm, The Security Intelligence Company, today unveiled LogRhythm 7, a major upgrade to its leading security intelligence and analytics platform. New innovations in search, scalability, performance and security operations efficiencies will help organizations detect and respond faster to advanced cyber threats.

Version 7 of the LogRhythm security intelligence and analytics platform provides the visibility, automation and incident response orchestration capabilities required by the next-generation security operations center (SOC). The platform accomplishes this by collecting information from hundreds of thousands of disparate data sources, then analyzing and prioritizing the data and events. The resulting information becomes instantly available to SOC personnel.

In its 2015 Global Cost of Data Breach Study, the Ponemon Institute cited a continual rise in cyber attack frequency and the costs associated with resolving cyber incidents. As such, IT teams must increase their visibility and analytics capabilities to detect intruders faster and enable rapid, efficient and precise response to avoid a material breach or high-impact cyber incident.

“The sophistication and resolve of today’s cyber adversaries continue to rise, as does the number of successful intrusions,” said Chris Petersen, senior vice president of products, CTO and co-founder at LogRhythm. “But an intrusion doesn’t have to lead to a major breach or cyber incident. The innovations in LogRhythm 7 empower IT security teams to detect, respond to and neutralize cyber intruders faster and more efficiently.”

“LogRhythm 7's incident response orchestration and SmartResponse™ automation capabilities are helping us detect and respond to threats faster than ever,” said Gary Kay, senior information security manager at Checkers Drive-In Restaurants. “Our IT environment is geographically dispersed and ever-evolving, so LogRhythm is an essential tool.”

LogRhythm 7 delivers an abundance of innovation and security intelligence breakthroughs including:

·       Elasticsearch™-Based Indexing to Expedite Investigations: LogRhythm’s new data indexing architecture delivers improved speed and precision of search. The introduction of Elasticsearch enables powerful full-text unstructured search capabilities. When combined with LogRhythm’s contextual search, users benefit from a highly intuitive search experience that provides the power and precision to get to the right data fast—resulting in faster investigations and faster response.

·       Architectural Advancements to Harness and Manage Big Data More Efficiently: LogRhythm 7 introduces significant software innovations and architectural improvements at the data processing and indexing tier.

o   Up to 300 percent improvement in data indexing performance on a per-node basis.

o   The ability to separately and optimally scale data processing and data indexing.

o   Active/active high-availability data processing and indexing.

o   The introduction of Elasticsearch and clustering at the indexing tier.

 

With these combined improvements, LogRhythm 7 supports massive data management workloads with less compute and storage resources, while delivering high availability. Software efficiencies, combined with our focus on ease-of-use, will help customers realize continued lower cost of ownership.

 

·       Powering the Next-Gen SOC

LogRhythm 7 offers myriad innovations that make SOC personnel and management more efficient and informed across monitoring, investigation and incident response workflows. As a whole, these improvements help organizations realize improved operational effectiveness of existing staff, while reducing mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR) to threats.

 

·       New Real-Time Threat Activity Map provides powerful, interactive visualizations depicting geographic origin and targets of active threats, empowering SOC analysts to detect and respond more quickly to concerning attack patterns.

·       New Risk-Based-Scoring Algorithm uses environmental threat and risk factors to yield a higher level of precision in prioritizing alarms, enabling more efficient, risk-aligned monitoring operations.

·       Incident Response Orchestration Advancements improves support for customized SOC workflows, cross-team collaboration capabilities and management visibility into active incidents.

·       Extensions to the SmartResponse™ Automation Framework enable multiple pre-staged actions from a single alarm, as well as centralized management of actions from remote locations. These extensions also allow customers to automate a variety of common investigatory and remediation actions at the endpoint, such as scanning an attacked endpoint and/or quarantining it from the network, easily and effectively.

 

“Today’s next-gen SOC personnel require highly scalable and extremely efficient solutions to detect intruders quickly and initiate appropriate countermeasures fast enough to avoid a material data breach,” said Chris Kissel, industry analyst for Frost and Sullivan. “LogRhythm optimizes enterprise security monitoring, detection and response programs by delivering an integrated product line that supports the end-to-end detection and response workflow. With LogRhythm 7, the company is once again demonstrating its innovation leadership in security intelligence through its use of Elasticsearch, powerful visualizations via its new real-time threat map and with a number of extensions to its automated response framework.” 

 LogRhythm 7 is available immediately. For more information, visit http://www.logrhythm.com/logrhythm-7/

 About LogRhythm

LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s award-winning platform unifies next-generation SIEM, log management, network and endpoint monitoring and forensics, and security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides innovative compliance automation and assurance, and enhanced IT intelligence.

 

Consistently recognized by third-party experts, LogRhythm has been positioned as a Leader in Gartner’s SIEM Magic Quadrant report for four consecutive years and scored highest in Gartner’s Critical Capabilities for Security Information and Event Management, named a "Champion” in Info-Tech Research Group’s 2014-15 SIEM Vendor Landscape report, earned the SANS Institute’s “Best of 2014” award in SIEM and received the SC Magazine Reader Trust Award for “Best SIEM Solution” in April 2015. Additionally, the company earned Frost & Sullivan’s 2015 Global Security Information and Event Management (SIEM) Enabling Technology Leadership Award. LogRhythm is headquartered in Boulder, Colorado with operations throughout North and South America, Europe, the Middle East and the Asia Pacific region.

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-15583
PUBLISHED: 2019-03-25
Cross-Site Scripting (XSS) vulnerability in point_list.php in GNUBOARD5 before 5.3.1.6 allows remote attackers to inject arbitrary web script or HTML via the popup title parameter.
CVE-2017-7340
PUBLISHED: 2019-03-25
A Cross-Site Scripting vulnerability in Fortinet FortiPortal versions 4.0.0 and below allows an attacker to execute unauthorized code or commands via the applicationSearch parameter in the FortiView functionality.
CVE-2014-9187
PUBLISHED: 2019-03-25
Multiple heap-based buffer overflow vulnerabilities exist in Honeywell Experion PKS all versions prior to R400.6, all versions prior to R410.6, and all versions prior to R430.2 modules, which could lead to possible remote code execution or denial of service. Honeywell strongly encourages and recomme...
CVE-2014-9189
PUBLISHED: 2019-03-25
Multiple stack-based buffer overflow vulnerabilities were found in Honeywell Experion PKS all versions prior to R400.6, all versions prior to R410.6, and all versions prior to R430.2 modules that could lead to possible remote code execution, dynamic memory corruption, or denial of service. Honeywell...
CVE-2019-10044
PUBLISHED: 2019-03-25
Telegram Desktop before 1.5.12 on Windows, and the Telegram applications for Android, iOS, and Linux, is vulnerable to an IDN homograph attack when displaying messages containing URLs. This occurs because the application produces a clickable link even if (for example) Latin and Cyrillic characters e...