Aug 11 - 12

Taipei Nangang Exhibition Center, Hall 2

Resilience Matters

CYBERSEC EXPO 2020

參展夥伴

LogRhythm

About the Exhibitor

LogRhythm is a world leader in NextGen SIEM, empowering thousands of enterprises on six continents to successfully reduce cyber and operational risk by rapidly detecting, responding to and neutralizing damaging cyberthreats. The LogRhythm NextGen SIEM Platform combines advanced security analytics; user and entity behavior analytics (UEBA); network detection and response (NDR); and security orchestration, automation, and response (SOAR) in a single end-to-end solution. LogRhythm’s technology serves as the foundation for the world’s most modern enterprise security operations centers (SOCs), helping customers measurably secure their cloud, physical, and virtual infrastructures for both IT and OT environments. Built for security professionals by security professionals, the LogRhythm NextGen SIEM Platform has won countless customer and industry accolades. 

For more information visit: https://logrhythm.com/

Products

Security Information and Event Management

LogRhythm

LogRhythm - The NextGen SIEM Platform - Align your team, technology, and process to see broadly across your environment, uncover threats, and minimize risk — all within a single, unified platform. It’s at the center of thousands of SOCs worldwide.  
For more information visit: https://logrhythm.com/

2019 Awards & Recognition
2019 Gartner Peer Insights Customers' Choice - Gold Award
2019 SC Media Best SIEM Solution
2019 InfoSec Awards Market Leader for User Behavior Analytics
2019 InfoSec Awards Market Leader for Security Information Event Management (SIEM)

White paper

  • Budgeting for a Modern SIEM

    Faced with an unpredictable cost expenditure, CISOs historically had to make tough decisions that increase the enterprise’s risk exposure: Which logs do we collect and analyse? How long do we keep them? How do we balance current needs versus future company growth? How do I maintain flexibility when making a multi-year commitment to a SIEM platform?

    Download
  • LogRhythm Security Operations Maturity Model

    Organizations globally are being compromised by sophisticated cyberattacks at an unprecedented rate and with devastating and costly consequences. A CyberEdge survey of 1,200 global IT security professionals representing organizations with 500 or more employees indicates that 77 percent of surveyed organizations were compromised during the 12 months preceding the study. Modern threat actors include criminal organizations motivated by financial gain, ideologically driven groups that seek to disrupt or discredit their targets, malicious insiders driven by profit or revenge, and nation-states and statesponsored organizations engaged in covert operations and industrial espionage targeting both public and private interests.

    Download
  • Using MITRE ATT&CK in Threat Hunting and Detection

    This paper will introduce you to ATT&CK and related toolsand resources based on ATT&CK. Then it will discuss how to makepractical use of ATT&CK with a focus on threat huntingand detection.

    Download
  • Defeating Threats Through User Data Applying UEBA to Protect Your Environment

    You’re facing a constant barrage of threats, some of which you don’t even know exist. The reality is that your users are behind many threats and breaches—whether maliciously or accidentally. Case in point: 69 percent of organizations reported a recent insider data exfiltration attempt, and 28 percent of breaches involved internal actors.1  As the typical point of entry for an attack, users are a difficult vector to monitor and secure. To confront the tidal wave of attacks, you need to hone your attention on users by harnessing the power of user and entity behavior analytics (UEBA).

    Download
  • 10 Practical Uses of SOAR

    Automation is part of our everyday lives. Yet where security is concerned, organizations are holding back. Some 59 percent of organizations said they use low levels or no automation of key security and incident response (IR) tasks, according to a recent SANS survey.

    Download

Videos

Threat Hunting with LogRhythm

Watch the demo to learn how LogRhythm custom dashboards and security analytics can improve your threat hunting techniques.


LogRhythm User Review Influencing Mean Time to Detect and Respond

This review was recorded by IT Central Station at LogRhythm RhythmWorld 2018 in Denver, Colorado. The review is not subject to editing or approval by LogRhythm.


Unleash the Power of Your SOC: LogRhythm NextGen SIEM Platform Demo

In this product demo, LogRhythm’s analytics detected evidence of malware designed to access a site that downloads a payload. This threat was missed by signature-based endpoint protection…but LogRhythm’s analytics recognized the tactics used by the malware, triggering an alarm with a calculated risk score.


Product Type

Security Information and Event Management