LR Security Intelligence Platform Datasheet
LR Security Intelligence Platform Datasheet
INTELLIGENCE PLATFORM
Protecting against todays rapidly evolving threat landscape requires
broad and deep visibility across the entire IT environment. Threats arrive
from many angles and evidence of their existence can be found within
existing log and machine data. Further visibility is gained through targeted endpoint
and network forensic monitoring. When this is applied to multiple, machine-automated
analysis techniques, threats and risks are exposed like never before.
LogRhythm delivers solutions for threat lifecycle management, next-generation SIEM, log
management, endpoint/network monitoring and forensics, and security analytics in a unified
Security Intelligence Platform. The LogRhythm platform provides profound visibility into threats and risks to which
organizations are otherwise blind. Designed to help prevent breaches before they happen, LogRhythm accurately
detects an extensive range of early indicators of compromise, enabling rapid response and mitigation. The deep
visibility and understanding delivered by LogRhythms Security Intelligence Platform empowers enterprises to secure
their networks and comply with regulatory requirements.
Rapid Time-to-Value
Anomaly Detection
Rapid contextual and unstructured search
Data set analysis via visual analytics, pivot, and drill down
Workflow-enabled automatic response via SmartResponse
Integrated Case and Security Incident Management
True visibility can be attained by analyzing all available log and
machine data and combining it with deep forensic visibility at
the endpoint and network levels. This insight is leveraged by AI
Engine, our patented Machine Analytics technology,
to perform continuous, real-time analysis of all
activity observed within the environment. AI
Engine empowers organizations to identify
previously undetected threats and risks.
The integrated architecture ensures that
when threats are detected, customers
can quickly access a unified view of
activity, enabling deep visibility and
INPUT
ANALY TICS
PROCESSING
OUTPUT
MACHINE ANALYTICS
Security Events
Other
Machine
Data
System
Logs
Machine
Learning
USER
97
A N D/O R
83
Contextual
Search
Risk Prioritized
Alarms
% 6 c % 72
Application Logs
Process
Activity
59
Audit Logs
Behavioral
Profiling
File/
Registry
Integrity
ACTIONABLE INTELLIGENCE
H O ST
Time
Normalization
Flow Data
FORENSIC
ANALYTICS
Uniform Data
Classification
Network
Monitoring
...
Statistical
Analysis
DPI/
Application
ID
Layer 7
Flow
Deep
Packet
Analytics
User
Activity
Full
Packet
Capture
Reports
INCIDENT RESPONSE
Whitelisting
Metadata
Extraction & Tagging
30
Network
Comms
Unstructured
Search
Real Time
Dashboards
Visualization
Blacklisting
60
Case
Collaboration
Evidence Locker
Incident
Tracking & Metrics
Automated
Response
90
100
Advanced
Correlation
4301
6400
5400
7400
N/A
N/A
1,000 MPS
N/A
N/A
5,000 MPS
DEDICATED DATA
PROCESSOR (DP)
DEDICATED
AI ENGINE (AIE)
DATA
COLLECTOR
(DC)
WEB
APPLIANCE
3300
5300
7400
5400
7400
3300
3300
5400
3300
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
5,000 MPS
N/A
N/A
N/A
N/A
1 Gbps
2.5 Gbps
N/A
5300
7400
15,000 MPS
MARKS
SANS INSTITUTE
INFOWORLD
LogRhythm Labs
LogRhythm Services
LogRhythm is the industrys largest focused provider of SIEM
and Security Intelligence. Its world class support and professional
services teams are dedicated to maximizing customer success by
providing responsive and practical solutions.
LogRhythm in Action
Detecting Custom Malware with Endpoint
Behavior Anomaly Detection
3. LogRhythm automatically recognizes that the new process 2. AI Engine detects when a user engages in abnormal activity,
like logging in from a suspicious location or deviating from
is non-whitelisted.
a behavioral norm, such as accessing significantly more or
4. LogRhythms machine analytics corroborates the event
different data and uploading that data to a non-whitelisted
against related activity such as abnormal network traffic,
cloud sharing application.
accurately identifying the activity as high risk.
3. SmartResponseTM either automatically disables the account
5. An alarm is sent to a Security Administrator, who easily
or queues up the response for validation pending a more
accesses forensic details to investigate.
detailed forensic investigation into the users activity.
INFO@LOGRHYTHM.COM
WWW.LOGRHYTHM.COM