LOGRHYTHM


Logrhythm, is the analytics and security intelligence leader. It guides and boosts organizations from all the world to detect, respond and neutralize in a quick way the harmful cyber-attacks that exist nowadays.


As part of the solutions which we provide and that are promoted by Logrhythm we have:

SIEM

Network Monitoring and Forensics

Aiming to provide a complete solution for security and protection for each of the technological elements that conform your organization.


SIEM


LogRhythm SIEM is an unified platform that provides a whole management of the cyber threats through:


Logs management

Network monitoring

Endpoints monitoring

Analysis from the users entities (UEBA)


SIEM will allow your organization:


Detect threats and alerts in real time

Correlating events and pattern recognition

Log management

Fast and intelligent search of events

Forensic analysis of data and records


NETWORK FORENSICS


Network Forensics is a sub-branch of digital forensics. It involves monitoring and network traffic analysis for the purposes of intrusion detection, legal evidence, or information gathering.


Attackers are gaining access through:

Phishing

Ransomware

Point-of-sale hacking

And a lot of more attacks


Once in, they command and control across your network boundaries.



Collecting Forensic Data for Incident Response

Forensic data collection, including network forensics, is an essential element for your incident response capabilities.

Detect Incident

Baseline network behavior to pinpoint abnormal activity.


Isolate and Identify Data for Incident Analysis

Use network forensics to expedite network threat investigations.


Capture and Maintain Evidence

Use chain-of-custody evidence to formulate a response to the incident.


Measure Time to Respond

Baslining this metric will be a critical indicator of the success of your incident response efforts.


SAFETY REGULATIONS


Besides protecting the clients from the associated risks to the cyber threats, LogRhythm provides an automation and support for compliance of the safety regulations such as :


ISO 27001

PCI DSS

SOX

NRC

NERC CIP

HIPAA

FISMA

GLBA


PRODUCTS AND SOLUTIONS

LOGRHYTHM'S SECURITY INTELLIGENCE

LOGRHYTHM’S SECURITY INTELLIGENCE PLATFORM

Detecting threats and alerts on real time.

Correlating events and pattern recognizing.

Logs management.

Intelligent and quick search of events.

Forensic analysis of data and records.

LOG MANAGEMENT & LOG ANALYSIS

Integral presentation of reports and statements from the events.

Flexible and quick search.

Identifying abnormalities in apps, data bases, systems and devices on real time.

Trends analysis through millions of records in only just one check in.

Forensic analysis from data and records.

COMPLIANCE AUTOMATION & ASSURANCE

LogRhythm helps to do with effectiveness audit processes.

Compacting the effectiveness stock records in long term.

Simplifying the search and recovery from specific records for the specific analysis and forensic research.

NETWORK FORENSICS

Detecting the activity from non-authorized apps.

Avoiding sensitive data loss.

Monitoring the wide band consumptions from the apps.

HOST FORENSICS

Host activity monitoring gives you a detailed and independent view from what is been happening in a host.

It provides a protection layer against events and attacks such as Zero Day, critical failures and prevents non-authorized interchange of data.

FEATURES / COMPONENTS

ADVANCED INTELLIGENCE ENGINE

Allows the organizations to predict, detect and response to internal threats, frauds and abnormal behaviors from the network.


ADVANCED AGENT TECHNOLOGY

Encryption and monitoring files trustworthiness.

TCP Forwarding.

SSL Encrypted Communication.


GEOLOCATION & VISUALIZATION

Obtaining the geographical context around a security incident.

The origin of the event or incident can be associated with the country of origin, region or state.


HOST ACTIVITY MONITORING

Host Activity Monitoring provides a whole view from what is happening at the host.


INTELLIGENT IT SEARCH

LogRhythm processes records and labels using a 3-granular level of classification that allows the users to make intelligent IT researches.


REPORTING

It can be drafted to send alerts and reports directly to the individual, groups, shared compartments, help services or whatever possible combination which allows effectiveness in sharing information.


SMARTRESPONSE

Immediate action in case of suspicious behaviors.

Internal politics recognition.

Advices from critical performance thresholds crossed.


ARCHITECTURE OPTIONS

HIGH PERFOMANCE APPLIANCES

All-in-one high performance Platforms.

Flexible storage for any kind of size.

Centralized management with global control from one console.

High performance collectors with the encryption and compaction.

SOFTWARE & VIRTUAL DEPLOYMENTS

Agile virtual environments with bigger profitability.

Management inclusion from records.

With support for the three main virtualization platforms Mware ESX, Microsoft Hyper-V and SIEMv and Citrix XenServer.

HIGH-AVAILABILITY SOLUTIONS

Flexible options of implementation for accomplishing the requirements, fulfillment and the budget.

Automate the recovering of disasters and continuing the business with a minimum quantity of the personnel.

Business and information continuity guarantee.

WEBRHYTHM REMOTE ACCESS

WebRhythm provides a business class performance for all the remote users in one, 1u server for montage in a rack that can be easily deployed.

Multiple options for the remote connections, including RDP, HTTP and HTTPS.

Dedicated access.

Browser based access.