BOULDER, Colo.—August 19, 2014—LogRhythm, The Security Intelligence Company, today announced the launch of its Threat Intelligence Ecosystem, the industry’s first collective of threat intelligence vendors focused on delivering unprecedented security intelligence via a next-generation security analytics and intelligence platform. The inaugural partners of the ecosystem – CrowdStrike, Norse, Symantec, ThreatStream and Webroot – have joined forces with LogRhythm to collaboratively deliver unparalleled visibility and insight to detect today’s sophisticated, high-risk cyber threats. LogRhythm’s Threat Intelligence Ecosystem represents many of the market’s leading commercial vendors of threat intelligence, each employing a variety of differentiated methods and techniques for successfully acquiring, assessing and verifying their threat intelligence.
Detecting and responding to today’s increasingly sophisticated cyber threats requires pervasive, enterprise-wide visibility and advanced machine analytics, tied with rich external context in the form of relevant, accurate and actionable threat intelligence. This threat intelligence includes data such as low reputation IP addresses and URLs, nefarious email addresses, file names, processes and user agent strings. LogRhythm’s Threat Intelligence Ecosystem enables its award-winning security analytics platform to seamlessly and automatically consume and leverage each ecosystem partner’s unique intelligence. The ecosystem allows customers to choose one or many security intelligence sources, enabling LogRhythm’s platform to deliver faster detection of and response to high-risk cyber threats for mutual customers.
In conjunction with the launch of its Threat Intelligence Ecosystem, LogRhythm has released a corresponding Threat Intelligence Security Analytics Suite to ensure that the threat data unique to each ecosystem partner is accurately captured and recognized by LogRhythm’s Security Intelligence Platform. Mutual customers benefit from LogRhythm’s ability to collect and process all of an organization’s log, flow, event and other machine data, as well as LogRhythm’s endpoint, server and network forensic sensor data, to not only identify activities associated with threat intel, but automatically prioritize incidents corroborated with other high risk events recognized across the IT environment. This pervasive visibility, combined with the rich context provided by one or more Threat Intelligence Ecosystem partners, enables LogRhythm’s Security Intelligence Platform to deliver even faster detection of and response to cyber threats, driving down false positives and reducing meantime to remediate threats.
“We are excited to launch our ecosystem with several of the industry’s leading providers of threat intelligence,” said Chris Petersen, chief technology officer and co-founder of LogRhythm. “Our ecosystem approach ensures that customers can take advantage of broad spectrum intelligence, covering the full gamut of threat intelligence methods. When leveraged via LogRhythm’s industry leading security analytics platform, our out-the-box analytics suites ensure customers can quickly and easily leverage ecosystem intelligence towards the most precise detection of high impact threats possible today.”
LogRhythm’s Threat Intelligence Security Analytics Suite is the latest addition to a growing number of analytics suites developed by LogRhythm Labs and powered by the company’s Security Intelligence Platform. Earlier this month, LogRhythm announced its Honeypot Security Analytics Suite enabling customers to effectively monitor honeypot activity to capture and leverage targeted threat data to fortify network defenses through initiated countermeasures. Other available suites are designed to detect threat vectors such as point-of-sale vulnerabilities, web application exploits and privileged user account misuse.
LogRhythm’s Threat Intelligence Security Analytics Suite is available to customers immediately as part of its award-winning Security Intelligence Platform.
Here’s what several of the Threat Intelligence Ecosystem partners say about the unique collective:
CrowdStrike: “CrowdStrike is thrilled to join LogRhythm’s Threat Intelligence Ecosystem and provide operational, strategic and customized intelligence of the threat environment,” said Adam Meyers, vice president of intelligence. “With today’s ever-changing threat landscape, it’s more important than ever to be able to gain context and prioritization into targeted attacks.”
Norse: “Norse believes it is important for the security community to work together towards achieving a comprehensive approach to threat intelligence, and LogRhythm’s Threat Intelligence Ecosystem is an important step in that direction,” said Sam Glines, chief executive officer. “While current solutions excel at collecting and analyzing an organization's internal data, live external threat intelligence like that provided by Norse has proven to provide critical contextual data necessary for the rapid detection of advanced threats enterprises are encountering today.”
ThreatStream: “Joining LogRhythm’s Threat Intelligence Ecosystems enhances ThreatStream’s existing ability to deliver community-vetted threat intelligence to customers’ current security infrastructure. It also adds another layer of threat intelligence investigation capabilities to LogRhythm, which helps our customers take more informed and timely actions to cyber threats,” said Sam Davis, vice president of business development. “Because of this, joining LogRhythm’s partner ecosystem was a logical choice. The interoperability provides a proven, open and holistic approach to next-generation network security.”
Webroot: “LogRhythm has identified what enterprises need to help them stay ahead of unknown threats, and their Security Intelligence Platform makes it easy to consume,” said Mike Malloy, executive vice president. “Integrating our BrightCloud Security Services provides their customers with the highly-accurate threat intelligence that leading security providers have relied on for years.”
LogRhythm is the largest and fastest growing independent security intelligence company in the world. The company’s patented and award-winning Security Intelligence Platform, unifying SIEM, log management, network forensics, host forensics and advanced security analytics, empowers organizations around the globe to detect and respond to breaches and the most sophisticated cyber threats of today, faster and with greater accuracy than ever before. LogRhythm also provides unparalleled compliance automation and assurance as well as IT intelligence to Global 2000 organizations, government agencies and mid-sized businesses worldwide.
LogRhythm has been consistently recognized as a market leader, including being positioned as a Leader in Gartner’s SIEM Magic Quadrant report for three years running, being named a “Champion” in Info-Tech Research Group’s 2014-15 SIEM Vendor Landscape report, being ranked Best-in-Class (No. 1) in DCIG’s 2014-15 SIEM Appliance Buyer’s Guide, and receiving Frost & Sullivan’s SIEM Global Market Penetration Leadership Award. It has also been named a Top Workplace by the Denver Post. LogRhythm is headquartered in Boulder, Colo., with operations throughout North and South America, Europe and the Asia Pacific region.