LogRhythm Whitepapers


Sort by: Date | Company | Title


Employing machine learning in a security environment
By LogRhythm | 9/7/2018

No matter where you look in the security world today, you’ll see the terms machine learning and artificial intelligence (AI). There’s been a great deal of interest in machine learning and AI as security vendors and their customers look for better ways to improve their security posture and fight against advancing cyberattacks. Machine learning and AI offer breakthroughs in solving problems in many other areas of our lives, so it’s only natural to try to use them to make similar breakthroughs in the field of security

Download this now


Your Guide to Detecting and Responding to Threat Fast- Even if you dont have a 24x7 SOC
By LogRhythm | 9/7/2018

The paper first explains the basics of the Cyber Attack Lifecycle and the need to address it through the Threat Lifecycle Management framework. Next, the paper explains the basics of SOCs, providing details of what SOCs mean in terms of people, processes, and technology. Finally, the paper walks you through a methodology for building a SOC with limited resources, focusing on tactics to make your rollout smooth and successful.

Download this now


Speed and Scalability Matter: Review of LogRhythm 7 SIEM and Analytics Platform
By LogRhythm | 28/6/2018

This SANS product review will focus on the LogRhythm 7.2 Threat Lifecycle Management Platform and will focus on specifically:

• Ease of use

• Scalability and performance across large, distributed data sets

• Host-based policies and configuration capabilities

• Rapid searching, analysis and incident correlation

• Case management tools that can help security operations teams operate more effectively

Download this now


The General Data Protection Regulation (GDPR)
By LogRhythm | 28/6/2018

In this paper, we’ll look at some of the key principles of the GDPR, what those principles mean for security and compliance teams and how you can prepare your organisation for the 2018 deadline. Make no mistake: The GDPR will require organisations that collect and process EU citizen data to undertake major operational reforms. The GDPR is a huge body of legislation, so this paper will focus on some specific areas where security, communications and compliance specialists will need to prepare.

Download this now


2018 Cybersecurity: Perceptions & Practices
By LogRhythm | 28/6/2018

As uncertainties — cybersecurity and otherwise — swim around us with increased velocity and frequency, it’s always helpful to hear directly from security leaders in the trenches of our industry. These first-hand accounts have the unique ability to shed light on the challenges security professionals and their teams face nearly every day of their work lives. That’s precisely what this “2018 Cybersecurity: Perceptions & Practices” benchmark survey accomplishes. It provides insights into the state of the cybersecurity practice of 751 mid- to large-sized organisations in the United States, United Kingdom, and AsiaPacific regions.

Download this now


The Ransomware Threat
By LogRhythm | 14/9/2017

A guide to detecting an attack before it’s too late NOTPETYA SPECIAL EDITION

Download this now


How To Build A SOC With Limited Resources
By LogRhythm | 14/9/2017

Your Guide to Detecting and Responding to Threats Fast—Even if You Don’t Have a 24x7 SOC

Download this now


The Threat Lifecycle Management Framework
By LogRhythm | 10/5/2017

Prevent major data breaches by reducing time to detect and respond to threats.

You can lessen your organisation's risk of experiencing a damaging cyber incident or data breach by investing in effective Threat Lifecycle Management. Although internal and external threats will exist, the key to managing their impact within your environment and reducing the likelihood of costly consequences is through faster detection and response capabilities.

Download this now


CASE STUDY: Sub-Zero Reduces Time Spent Investigating Incidents with LogRhythm
By LogRhythm | 10/5/2017

As Sub-Zero Group, Inc grows and the network becomes more complex, the inhouse IT security staff remains lean. For the IT security team monitoring the network, it was becoming too cumbersome to work with separate device logs and monitoring tools. They couldn’t extract the information on network activity quickly or easily. Setting up a solution with LogRhythm has significantly improved the efficiency of Sub-Zero’s security operations.

Download this now


The Ransomware Threat: A guide to detecting an attack before it’s too late
By LogRhythm | 2/11/2016

Is your organisation prepared for a ransomware attack? Successfully defending your organisation against such an attack takes preparation and an understanding of what to look for if an attack begins. This guide shares the expert knowledge that researchers at LogRhythm have gathered about how ransomware attacks begin, how they progress through your endpoints and network, and what you can do to prevent them, or at least shut them down, to avoid serious repercussions.

Download this now