LogRhythm Unveils Network Security Solution LogRhythm NDR

LogRhythm Unveils Network Security Solution LogRhythm NDR

This morning, SIEM solution provider LogRhythm announced their latest enterprise security solution: LogRhythm NDR. LogRhythm NDR serves as an automated network security solution; it provides network-based threat detection, investigation, and remediation capabilities.

According to their press release, LogRhythm NDR boasts numerous network security capabilities including appliance leveraging, application identification, full packet capture, and deep inspection of traffic metadata for known indicators of compromise. The solution also provides behavioral profiling and scenario modeling for comprehensive network threat analytics.    

Additionally, LogRhythm emphasized the automation capabilities of their LogRhythm NDR solution as a balm for the cybersecurity staffing crisis. Their automation allows for real-time security event alert monitoring, automatic case management, and guided playbooks. Also, automated capabilities relieves some of the burden placed on enterprise IT security teams, freeing up their time and resources for serious investigations.  

Chris Petersen, Co-Founder and Chief Product and Technology Officer at LogRhythm, shared his thoughts on the context of the LogRhythm NDR release. “Security teams are often understaffed, overwhelmed by false positives and lack the necessary network visibility and analytics required to detect and respond to advanced network-borne threats.”

LogRhythm NDR in Context

Gartner recognized LogRhythm as a Leader in their 2018 SIEM Magic Quadrant Report. Moreover, LogRhythm received the title of Leader in the Forrester Wave for Security Analytics Platforms for Q3 2018 report.  

Network security monitoring has taken especial prominence in enterprise cybersecurity strategy in recent years. The cybersecurity paradigm continues to shift from a prevention model to a detection and remediation model. Moreover, enterprises now recognize the importance of improving their network visibility to aid their security policies and solutions; you cannot protect against what you do not see.  

Jon Oltsik, Senior Principal Analyst at ESG, commented on this. “Incident response teams need detailed network information and key forensics insight to investigate incidents — yet they may not have network forensics expertise, or the time needed for detailed forensic investigation and packet analysis.”

You can read more about the LogRhythm NDR release here

   

Ben Canner

Ben Canner is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large. He holds a Bachelor of Arts Degree in English from Clark University in Worcester, MA. He previously worked as a corporate blogger and ghost writer. You can reach him via Twitter and LinkedIn.
Ben Canner

Leave a Reply

Your email address will not be published. Required fields are marked *