Story image

LogRhythm dips toes into UEBA market to defend against user-based threats

05 Feb 2018

LogRhythm is dipping its toes into the User and Behaviour Analytics (UEBA) market for organisations that aren’t able to replace their existing legacy solutions - and to protect against insider threats, account takeovers, as well as privilege abuse and misuse.

According to the company, some firms aren’t able to replace their existing legacy Security Information and Event Management (SIEM) solutions – however, a standalone UEBA is able to fit in right alongside.

LogRhythm decided to take an approach to UEBA that is ‘distinct’ in the marketplace by incorporating in-depth analysis of both unknown and known threats. It also uses machine and cloud-based analytics as part of a standalone platform.

According to a recent LogRhythm study, 88% of security professionals name insider threats as a growing concern for their organisation.

LogRhythm VP of products Chris Brazdziunas explains the company’s entrance into the UEBA market by saying that organisations are ‘under siege’ from a variety of threat actors.

 “Meanwhile, many security teams face significant obstacles securing qualified personnel to combat these threats. These challenges are sometimes heightened by organisational pressure to relax controls to unlock business productivity.”

“UEBA arms organisations to detect and respond to user-based threats. Analysts are provided evidence-based starting points for investigation, rich visualisations for effective analysis, and direct access to data for rapid response," Brazdziunas concludes.

The company designed its solution to also conduct analysis of areas such as customer feedback for better accuracy; and the collection of threat training data across an entire organisation and its extended customer footprint.

LogRhythm says this collection strategy makes the product smarter and faster, particularly in situations surrounding insider threats, account takeovers, as well as privilege abuse and misuse.

“A significant number of large enterprises are replacing their legacy SIEMs with LogRhythm’s next-gen platform, but not every organisation is able to do that today,” comments LogRhythm’s vice president of marketing and business development, Matt Winter.

 “With LogRhythm UEBA, customers that aren’t yet ready for full replacement no longer have to settle for an unproven and functionally limited ‘SIEM helper’ or similar point product to get more value out of their existing SIEMs. Instead, LogRhythm now offers them a full-featured solution that’s architected to scale, can seamlessly grow with them as their needs evolve and has been repeatedly proven in large global deployments.”

LogRhythm UEBA is a standalone version of the LogRhythm product set for non-LogRhythm Enterprise or XM customer environments. The product is commercially available, and pricing is based on a per-user model, with hardware included through a subscription.

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.