Story image

Gartner names LogRhythm leader in SIEM solutions

10 Dec 18

LogRhythm has announced that it has been positioned as a Leader by Gartner in the 2018 Magic Quadrant for Security Information and Event Management research report.

According to Gartner, “The SIEM Leaders quadrant is composed of vendors that provide products that are a strong functional match to general market requirements, and have been the most successful in building an installed base and revenue stream within the SIEM market.

“Leaders also have a relatively high viability rating (due to SIEM revenue or SIEM revenue in combination with revenue from other sources). In addition to providing technology that is a good match to current customer requirements, Leaders also show evidence of vision and execution for emerging and anticipated requirements.

“They typically have relatively high market share and/or strong revenue growth, and have demonstrated positive customer feedback for effective SIEM capabilities and related service and support.”

LogRhythm co-founder and chief product and technology officer Chris Petersen says, “As data breaches continue to wreak havoc across the globe, security teams increasingly need end-to-end SIEM solutions with native options for host- and network-level monitoring, as well as industry-leading analytics and workflow automation, to rapidly detect and neutralise the threats targeting their environments.”

Earlier this year, LogRhythm was also recognised as a 2018 Gartner Peer Insights Customers’ Choice for Security Information and Event Management (SIEM) Software.

In addition to SIEM and SOAR capabilities, LogRhythm’s NextGen SIEM Platform delivers solutions for user and entity behaviour analytics (UEBA); network traffic and behaviour analytics; enterprise log management; and network and endpoint monitoring.

These solutions comprise the principal workflow of the next-generation security operations centre (SOC) that aims to seamlessly integrate people, processes and technology across the security organisation and enable security teams to detect and respond to threats quickly and with precision.

About Gartner reports

Gartner does not endorse any vendor, product, or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation.

Gartner research publications consist of the opinions of Gartner’s research organisation and should not be construed as statements of fact.

Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Gartner Peer Insights Customers’ Choice constitutes the subjective opinions of individual end-user reviews, ratings, and data applied against a documented methodology; they neither represent the views of nor constitute an endorsement by Gartner or its affiliates.

Hillstone CTO's 2019 security predictions
Hillstone Networks CTO Tim Liu shares what key developments could be expected in the areas of security compliance, cloud, security, AI and IoT.
Can it be trusted? Huawei’s founder speaks out
Ren Zhengfei spoke candidly in a recent media roundtable about security, 5G, his daughter’s detainment, the USA, and the West’s perception of Huawei.
Oracle Java Card update boosts security for IoT devices
"Java Card 3.1 is very significant to the Internet of Things, bringing interoperability, security and flexibility to a fast-growing market currently lacking high-security and flexible edge security solutions."
Sophos hires ex-McAfee SVP Gavin Struther
After 16 years as the APAC senior vice president and president for McAfee, Struthers is now heading the APJ arm of Sophos.
Half of companies unable to detect IoT device breaches
A Gemalto study also shows that the of blockchain technology to help secure IoT data, services and devices has doubled in a year.
Huawei founder publically denies spying allegations
“After all the evidence is made public, we will rely on the justice system.”
Malware downloader on the rise in Check Point’s latest Threat Index
Organisations continue to be targeted by cryptominers, despite an overall drop in value across all cryptocurrencies in 2018.
IoT breaches: Nearly half of businesses still can’t detect them
The Internet of Thing’s (IoT’s) rapid rise to prominence may have compromised its security, if a new report from Gemalto is anything to go by.