Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

4/7/2011
04:14 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

LogRhythm Raises $10M In Funding

Company has tripled its customer base and revenue over the past two years

BOULDER, Colo., March 30, 2011 - LogRhythm, the company that makes log data useful, today announced that it recently closed a $10 million Series C round of financing with private equity firm Adams Street Partners joining the company's existing investors Access Venture Partners, Colorado Fund I, Croghan Investments and Grotech Ventures. The company, which has tripled its customer base and revenue over the past two years, will use this new funding to accelerate international expansion, expand product development and build out its service and support infrastructure to meet the needs of its rapidly growing customer base.

"SIEM is increasingly becoming the centralized monitoring infrastructure that serves as the nervous system for security, compliance and operations management," said Andy Grolnick, CEO of LogRhythm. "LogRhythm's SIEM 2.0 solution provides deep visibility across distributed IT environments and allows companies to pinpoint problems that can lead to data breaches, audit violations and downtime. With our new pattern recognition technology we have just scratched the surface in terms of what this platform can do."

"We look for rising star companies with game-changing technology and seasoned management teams that are in high growth markets, criteria that LogRhythm meets in spades," said Dave Welsh, Partner at Adams Street Partners. "We believe the company is positioned for long term leadership in the increasingly strategic SIEM market segment, and look forward to helping LogRhythm reach its potential."

Recent Highlights

. Introduced AI Engine, a next generation pattern recognition technology that exposes previously undetectable intrusions, insider threats, and network abuse . More than tripled customer base and revenues over the past two years . Recognized by Red Herring as one of the Top 100 Private Technology Companies in North America for 2010 . Received the Innovator Hall of Fame Award for SIEM from SC Magazine . Recognized by Cisco as its Global Solution Partner of the Year for the utilities vertical market for 2010 . Received the SC Recommended Award in the SIEM category from SC Magazine . Optimized LogRhythm technology for leading virtualization platforms - VMware ESX, Microsoft Hyper-V, and Citrix XenServer . Received comprehensive log management / SIEM patent (U.S. Patent # 7,653,633)

About LogRhythm

LogRhythm, the leader in log management and SIEM 2.0, delivers log and security event management, file integrity monitoring, and network and user monitoring in a single integrated solution. LogRhythm empowers organizations to comply with regulations, secure their networks, and optimize IT operations. The company received the coveted "Recommended" 5-star designation from SC Labs for SIEM and has received SC Magazine's Innovator of the Year Award, Readers Trust Award for "Best SIEM" solution and the "Best Buy" designation for Digital Forensics. It is a winner of the 2010 Red Herring 100 Award and was placed by Gartner Inc. in the visionaries quadrant of the Security Information and Event Management (SIEM) Magic Quadrant report for 2010. LogRhythm is privately held and based in Boulder, Colorado with European Headquarters in Maidenhead, England, and Asia Pacific operations in Hong Kong. For more information visit: www.logrhythm.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
Edge-DRsplash-10-edge-articles
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
News
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-35210
PUBLISHED: 2021-06-23
Contao 4.5.x through 4.9.x before 4.9.16, and 4.10.x through 4.11.x before 4.11.5, allows XSS. It is possible to inject code into the tl_log table that will be executed in the browser when the system log is called in the back end.
CVE-2021-27649
PUBLISHED: 2021-06-23
Use after free vulnerability in file transfer protocol component in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via unspecified vectors.
CVE-2021-29084
PUBLISHED: 2021-06-23
Improper neutralization of special elements in output used by a downstream component ('Injection') vulnerability in Security Advisor report management component in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to read arbitrary files via unspecified vectors.
CVE-2021-29085
PUBLISHED: 2021-06-23
Improper neutralization of special elements in output used by a downstream component ('Injection') vulnerability in file sharing management component in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to read arbitrary files via unspecified vectors.
CVE-2021-29086
PUBLISHED: 2021-06-23
Exposure of sensitive information to an unauthorized actor vulnerability in webapi component in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to obtain sensitive information via unspecified vectors.