Story image

LogRhythm SIEM gets a boost with Webroot threat intelligence & IP reputation services

31 Jan 18

LogRhythm and Webroot have joined forces to boost SIEM intelligence to new levels with the addition of IP reputation and threat intelligence services.

The two companies have released a new fulfilment option for LogRhythm’s next-generation SIEM customers, which will allow Webroot’s BrightCloud IP reputation service to be added to customers’ SIEM platforms.

The joint solution will also feature Webroot BrightCloud Threat Intelligence capabilities for comprehensive, real-time threat visibility and contextual security analytics.

According to the companies, the integrated solution will automatically take action and respond to events generated in LogRhythm’s SIEM. It will also use Webroot’s BrightCloud IP Reputation service to help customers identify malicious IPs in their network traffic.

When the SIEM discovers the threat, the solution will provide deep visibility into both network behavioural changes and malicious IPs. It will also automate remediation.

According to Webroot’s VP of worldwide OEM sales, Michael Neiswender, advanced cyber threats are challenging customers more often.

"Through our partnership, LogRhythm can provide its customers with proactive protection against modern threats. The Webroot BrightCloud IP Reputation Service protects LogRhythm users from malicious IP traffic by integrating accurate and timely threat intelligence into the network perimeter and services."

Webroot and LogRhythm have been working together as part of a group of intelligence vendors in LogRhythm’s Threat Intelligence Ecosystem. The group’s aim is to provide security intelligence through a next-generation security analytics and intelligence platform.

"Webroot's new fulfillment site is a welcomed addition to the LogRhythm Threat Intelligence Ecosystem,” adds LogRhythm VP of marketing and business development, Matthew Winter.

“The Webroot BrightCloud IP Reputation Service greatly enhances the analytics and incident response workflow of the LogRhythm next-gen SIEM platform. This integrated solution gives our customers highly-accurate threat intelligence, allowing them to detect and respond to threats more quickly and efficiently."

In December 2017, LogRhythm’s Threat Lifecycle Management Platform gained a place as leader in the Gartner “Magic Quadrant for Security Information and Event Management” research report.

The SIEM Leaders quadrant recognises vendors that provide a strong match to market requirements, are successful in building revenue, have superior vision and execution for emerging requirements.

It’s an honor to be consistently recognised as a SIEM Leader by Gartner,” commented LogRhythm CTO Chris Petersen at the time.

 “As data breaches continue to come fast and furious, it’s critical that companies rapidly detect, neutralize and recover from security threats. I believe this research report speaks volumes about LogRhythm’s leadership in the market and our ability to meet the challenges of today’s continually evolving threat landscape for enterprise Security Operations Centres (SOCs) across the globe,” Petersen concluded.

Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”
McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.
Symantec and Fortinet partner for integration
The partnership will deliver essential security controls across endpoint, network, and cloud environments.
Is Supermicro innocent? 3rd party test finds no malicious hardware
One of the larger scandals within IT circles took place this year with Bloomberg firing shots at Supermicro - now Supermicro is firing back.
25% of malicious emails still make it through to recipients
Popular email security programmes may fail to detect as much as 25% of all emails with malicious or dangerous attachments, a study from Mimecast says.
Google Cloud, Palo Alto Networks extend partnership
Google Cloud and Palo Alto Networks have extended their partnership to include more security features and customer support for all major public clouds.