BeyondTrust And LogRhythm Team Up
Integration enables organizations to identify highly corroborated behavioral anomalies, internal and external threats, and breaches
June 7, 2013
PRESS RELEASE
SAN DIEGO, Calif. – June 6, 2013 – BeyondTrust, the security industry's leading provider of Context-Aware Security Intelligence, today announced the company has joined forces with LogRhythm, the leader in Big Data Security Analytics, to deliver an unparalleled integrated solution for enterprise security analytics and threat management. Combining BeyondTrust's Retina CS vulnerability and threat management capabilities with the multi-dimensional behavioral analytics of LogRhythm's next-generation SIEM platform delivers the visibility and insight needed to detect, defend against and respond to increasingly sophisticated cyber threats while efficiently meeting compliance requirements and proactively responding to operational challenges.
LogRhythm automatically incorporates vulnerability data from Retina CS to deliver real-time cyber threat protection based on up-to-date situational awareness and comprehensive security intelligence. The integration delivers:
Real-time correlation of exposed vulnerabilities including missing patches and configuration weaknesses across the entire IT environment for enterprise threat intelligence
Increased visibility and enhanced breach detection capabilities through the integration of network security data with multi-dimensional behavioral analytics
Accurate threat detection by linking meaningful events with conditional logic and current threat analytics to reduce the number of false positives and false negatives
"As security solutions evolve to correlate a wide variety of relevant data, attacks on organizations and threats to intellectual property become more complex and difficult to identify," said Brad Hibbert, executive vice president of product strategy and operations at BeyondTrust. "The flexibility and power of enterprise threat management tied directly to SIEM and log management complement each other to help close the gap between traditional event correlation and static vulnerability assessment solutions."
Recognized by Frost & Sullivan as the product leader in the vulnerability management market, Retina CS delivers unrivaled vulnerability assessment and compliance automation to its customers by integrating security risk discovery, prioritization, remediation, and reporting for dynamic IT infrastructures. The solution enables IT security professionals and managed service providers to centrally manage organization-wide IT security from a single, web-based console. Retina CS coupled with LogRhythm's big data security analytics platform empowers customers to identify highly corroborated behavioral anomalies, internal and external threats, and breaches based on accurate security intelligence.
"LogRhythm customers derive great value from the terabytes of machine data that they collect and correlate with our SIEM 2.0 solution, whether they're tackling security, compliance or operational use cases." said Matt Winter, vice president of corporate & business development at LogRhythm. "Incorporating BeyondTrust's vulnerability data and security intelligence amplifies this value and enhances risk-based prioritization of events to provide our mutual customers the actionable security insight necessary to address today's increasingly complex and sophisticated threat landscape,"
This integration is available to existing BeyondTrust customers today. As part of this announcement, BeyondTrust will be hosting a joint webinar with LogRhythm on Wednesday, June 19 @ 8:00 AM PDT. To register, please visit: Webinar
About Logrhythm
LogRhythm is the largest and fastest growing independent Security Information and Event Management (SIEM) provider in the world. The company's patented and award-winning SIEM 2.0 Big Data Security Analytics platform empowers organizations around the globe to detect breaches and the most sophisticated cyber threats of today, faster and with greater accuracy than ever before. LogRhythm also provides unparalleled compliance automation and assurance as well as operational intelligence to Global 2000 organizations, government agencies and mid-sized businesses worldwide.
Positioned as a Leader in Gartner's 2012 SIEM Magic Quadrant and listed as a "Champion" in Info-Tech Research's 2012 SIEM Landscape Report, LogRhythm also earned a perfect, 5-star rating and this year's exclusive "BEST BUY" in the SC Magazine SIEM Group Test. Additional awards have included Computing Security's Bench Tested Solution of the Year, SC Labs' "Recommended" 5-star designation twice, SC Magazine's Innovator of the Year Award, Readers Trust Award for "Best SIEM" solution and "BEST BUY" designation for Digital Forensics. LogRhythm is headquartered in Boulder, Colorado with operations in Canada, Europe and the Asia Pacific region.
About BeyondTrust
BeyondTrust is the leading security solution vendor providing Context-Aware Security Intelligence, giving customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting.
BeyondTrust offers consistent policy-driven vulnerability and privilege management, role-based access control, monitoring, logging, auditing and reporting to protect internal assets from the inside out. The company's products empower IT governance to strengthen security, improve productivity, drive compliance, and reduce expense across physical, virtual, mobile and cloud environments.
With more than 25 years of global success, BeyondTrust is the pioneer of both Threat Management and Privileged Identity Management (PIM) solutions for heterogeneous IT environments. More than half of the companies listed on the Dow Jones Industrial Average rely on BeyondTrust to secure their enterprises. Customers include eight of the world's 10 largest banks, eight of the world's 10 largest aerospace and defense firms, and 7 of the 10 largest U.S. pharmaceutical companies, as well as renowned universities across the globe.
You May Also Like
Harnessing the Power of Automation to Boost Enterprise Cybersecurity
Oct 3, 2024DevSecOps/AWS
Oct 17, 2024Social Engineering: New Tricks, New Threats, New Defenses
Oct 23, 202410 Emerging Vulnerabilities Every Enterprise Should Know
Oct 30, 2024Simplify Data Security with Automation
Oct 31, 2024