This morning, SIEM solution provider LogRhythm announced their latest enterprise security solution: LogRhythm NDR. LogRhythm NDR serves as an automated network security solution; it provides network-based threat detection, investigation, and remediation capabilities.
According to their press release, LogRhythm NDR boasts numerous network security capabilities including appliance leveraging, application identification, full packet capture, and deep inspection of traffic metadata for known indicators of compromise. The solution also provides behavioral profiling and scenario modeling for comprehensive network threat analytics.
Additionally, LogRhythm emphasized the automation capabilities of their LogRhythm NDR solution as a balm for the cybersecurity staffing crisis. Their automation allows for real-time security event alert monitoring, automatic case management, and guided playbooks. Also, automated capabilities relieves some of the burden placed on enterprise IT security teams, freeing up their time and resources for serious investigations.
Chris Petersen, Co-Founder and Chief Product and Technology Officer at LogRhythm, shared his thoughts on the context of the LogRhythm NDR release. “Security teams are often understaffed, overwhelmed by false positives and lack the necessary network visibility and analytics required to detect and respond to advanced network-borne threats.”
LogRhythm NDR in Context
Gartner recognized LogRhythm as a Leader in their 2018 SIEM Magic Quadrant Report. Moreover, LogRhythm received the title of Leader in the Forrester Wave for Security Analytics Platforms for Q3 2018 report.
Network security monitoring has taken especial prominence in enterprise cybersecurity strategy in recent years. The cybersecurity paradigm continues to shift from a prevention model to a detection and remediation model. Moreover, enterprises now recognize the importance of improving their network visibility to aid their security policies and solutions; you cannot protect against what you do not see.
Jon Oltsik, Senior Principal Analyst at ESG, commented on this. “Incident response teams need detailed network information and key forensics insight to investigate incidents — yet they may not have network forensics expertise, or the time needed for detailed forensic investigation and packet analysis.”
You can read more about the LogRhythm NDR release here.
Latest posts by Ben Canner (see all)
- Why Due Diligence Matters to Determining Third-Party Risk - August 15, 2019
- The 11 Top Enterprise Threat Intelligence Platforms of 2019 - August 14, 2019
- What Makes Next-Generation SIEM So Essential? - August 8, 2019