Story image

Gartner names LogRhythm leader in SIEM solutions

10 Dec 2018

LogRhythm has announced that it has been positioned as a Leader by Gartner in the 2018 Magic Quadrant for Security Information and Event Management research report. According to Gartner, “The SIEM Leaders quadrant is composed of vendors that provide products that are a strong functional match to general market requirements, and have been the most successful in building an installed base and revenue stream within the SIEM market. “Leaders also have a relatively high viability rating (due to SIEM revenue or SIEM revenue in combination with revenue from other sources). In addition to providing technology that is a good match to current customer requirements, Leaders also show evidence of vision and execution for emerging and anticipated requirements. “They typically have relatively high market share and/or strong revenue growth, and have demonstrated positive customer feedback for effective SIEM capabilities and related service and support.” LogRhythm co-founder and chief product and technology officer Chris Petersen says, “As data breaches continue to wreak havoc across the globe, security teams increasingly need end-to-end SIEM solutions with native options for host- and network-level monitoring, as well as industry-leading analytics and workflow automation, to rapidly detect and neutralise the threats targeting their environments.”

Earlier this year, LogRhythm was also recognised as a 2018 Gartner Peer Insights Customers’ Choice for Security Information and Event Management (SIEM) Software.

In addition to SIEM and SOAR capabilities, LogRhythm’s NextGen SIEM Platform delivers solutions for user and entity behaviour analytics (UEBA); network traffic and behaviour analytics; enterprise log management; and network and endpoint monitoring.

These solutions comprise the principal workflow of the next-generation security operations centre (SOC) that aims to seamlessly integrate people, processes and technology across the security organisation and enable security teams to detect and respond to threats quickly and with precision.

About Gartner reports

Gartner does not endorse any vendor, product, or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation.

Gartner research publications consist of the opinions of Gartner’s research organisation and should not be construed as statements of fact.

Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Gartner Peer Insights Customers’ Choice constitutes the subjective opinions of individual end-user reviews, ratings, and data applied against a documented methodology; they neither represent the views of nor constitute an endorsement by Gartner or its affiliates.

Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Princeton study wants to know if you have a smart home - or a spy home
The IoT research team at Princeton University wants to know how your IoT devices send and receive data not only to each other, but also to any other third parties that may be involved.
Organisations not testing incident response plans – IBM Security
Failure to test can leave organisations less prepared to effectively manage the complex processes and coordination that must take place in the wake of an attack.
65% of manufacturers run outdated operating systems – Trend Micro
The report highlights the unique triple threat facing manufacturing, including the risks associated with IT, OT and IP.
WikiLeaks' Julian Assange arrested in London
There’s little doubt that it’s a day of reckoning for WikiLeaks cofounder Julian Assange today, after his seven-year long protection inside London’s Ecquador Embassy came to an abrupt end.