2019 CYBERSEC EXPO

全臺最大資安博覽會,最完整的資安防禦產品

MAR.19 - 21

臺北國際會議中心 & 世貿一館 2 樓

白金級

LogRhythm

LogRhythm 為資安威脅生命週期管理( TLM )技術先鋒,創立於2003年,總部位美國科羅拉多州,員工近700名,逾 4 千多家客戶橫跨 6 大洲,原生卓越的開發技術已取得多項國際專利。LogRhythm 專注原生系統開發,協助企業組織面對已知、未知威脅時進行快速偵測、回應與緩解,其 NextGen SIEM 智慧型資安情資數據即時分析平台深受全球客戶肯定,專業研調機構及媒體高度稱許,連續7年 Gartner Magic Quadrant SIEM 評比持續攀升, 2016 躍居全球前三大領導品牌, 2017 蟬聯前三大領導地位,並獲 Gartner Peer Insights Customers' Choice 金質獎與 Frost & Sullivan  亞太區企業安全產品線戰略領導獎殊榮。 2018 續攀高鋒,保持 Gartner Magic Quadrant 前三大領導地位,再度獲 Gartner Peer Insights Customers' Choice 金質獎,The Forrester Wave™  2018 度評比「 Security Analytics Platforms 」擊敗眾家大廠,榮登王者寶座。

Threat IntelligenceArtificial IntelligenceThreat Hunting

LogRhythm 智慧型資安情資數據即時分析平台

LogRhythm 智慧型資安情資數據即時分析平台為獨步全球的 NextGen SIEM 領導者,緊密整合其原生開發之日誌管理、網路深層封包分析 (DPI )、系統端點監控 Agent 、使用者與實體行為分析 (UEBA),運用人工智慧 AI 引擎與機器學習自動進行關聯性與進階分析,快速偵測已知及未知進階攻擊,其 SmartResponse™ 機制具備進階資安事件協同合作、自動化與回應 (Security Orchestration , Automation and Response , SOAR) 能力,內建多套資安事件回應程序手冊 (Case Playbook),在面對資安事件發生時,迅速提供跨單位協同合作標準處理程序、事件調查及自動化回應之依循。LogRhythm 內建、可客製化調整之自動化作業,已協助全球眾多企業組織之資安事件小組有效縮短應變時間至數分鐘之內,提供完整 End-to-End 威脅生命週期流程管理。

 

【產品特色】

  1. 快速收集各式日誌,無須任何特殊程式語言學習與開發工具或客製化,可即時完整的蒐集各種類型的資料來源,包含: System Logs 、 Security Events 、 Flow Data 、 Application Logs 、 Audit Logs 與其他設備資料。
  2. 獨家專利 MDI 機器資料智慧分類模組,可針對多達近一千種以上各類裝置之設備資料,自動萃取 Metadata 並進行資安事件分類及正規化,大幅降低導入時程、複雜度以及導入成本。
  3. 內建 900 多種事件關聯性規則,人工智慧 AI 引擎以多維方式進行比對並透過機器學習建立 Baseline,以利分辨日常與異常之行為。
  4. SmartResponse™  自動威脅回應機制,可依不同資安威脅與風險狀態,選擇自動或依照 SOP 進行回應與處理,大幅縮短事件回應時間 (MTTR)。內建數十種自動回應 Plug-in 套件,迅速達成資安事件之進階協同合作、自動化與回應 (Security Orchestration ,  Automation and Response ,  SOAR)。
  5. 內建事件協同平台 Case Management 與多套事件回應程序手冊 (Case Playbook),可強化資安事件發生時,各層級人員協同調查事件之關聯性,以利事件回應、對策及防禦措施之一致性。
  6. 內建強大 Crystal Report 報表引擎可快速產生各式客製化分析報表, 內建 800 多種各類報表與 100 多種 SOX 、PCI 、FISMA 、GLBA 、HIPAA 、NERC CIP 、GPG 13 、ISO27001 範本報表。
  7. 採用強大 Elasticsearch™,方便快速進行進階分析及同步交叉搜尋原始資料與分類事件。
  8. 無縫整合符合 STIX / TAXII 規範之供應商所提供的 Rich Context 格式、Commercial 與 Open Source 情資 、以及內部 Honeypots 的威脅情報。使用該類資料可減少假警報的發生、偵測出隱藏的威脅,同時依優先順序排出待處理的警報。
  • 8 Cyber Security Predictions for 2019

    Cybersecurity programs will grow but continue to lag behind the talent gap’s growth by at least 25 percent. Unfortunately, we don’t expect the acceptance rate to suddenly increase, meaning cybersecurity program growth will lag behind the talent gap by at least 25 percent in the coming year.

  • Employing Machine Learning in a Security Environment: A Data Science-Driven Approach

    Recently, the terms “machine learning” (ML) and “artificial intelligence” (AI) have proliferated the security space. While there is a great deal of potential as to how these technologies can improve your security posture, there is also a lot of hype and misinformation surrounding what machine learning and AI can do today to improve security.

    In this white paper, you will discover the most critical things you need to know about applying ML and AI in your security environment. You will also learn to recognize the most significant opportunities and challenges for using ML and AI to improve your team’s ability to swiftly detect and respond to cyber threats.

  • Industry 4.0 Defending Manufacturing Systems from Cyberthreats

    The manufacturing sector is on the cusp of its own digital revolution. Industry 4.0—as it has become known—will harness the connected sensors embedded in machinery and logistics operations across the supply chain. The Internet of Things (IoT) is also picking up rapid momentum in its support of Industry 4.0.

    But there is a downside. Connecting machines in to external information flows means the machines are susceptible to hackers, industrial spies, and even nation states.

  • How to Build a SOC with Limited Resources

    In a perfect world, your organisation would staff a 24x7 SOC—and have no trouble finding the budget or talent to do so. But the truth is, most organisations can’t afford a 24x7 SOC. The cost of having well-trained analysts onsite at all times outweighs the benefits.

    If your organisation is making do with an informal SOC, you may be facing delays in responding to incidents. You may even fear that incidents are going unnoticed. It’s a dangerous situation.

    But there is a solution: building a SOC that automates as much of the security operations work as possible.

Optimize the Efficiency of your SOC with Built-In Playbooks | LogRhythm Demo

Your team is overwhelmed. And you’re worried that potential security events are being overlooked or mishandled — meaning a breach could be imminent. With LogRhythm, you can enhance analyst incident response capabilities and improve the efficiency of your SOC, effectively maximizing available resources.


A Day in the Life of an Analyst | LogRhythm Demo

LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats.  The company’s award-winning platform unifies next-generation SIEM, log management, network and endpoint forensics, and advanced security analytics.


Introducing LogRhythm Cloud AI

The complexity and volume of cyberthreats are evolving at a dangerously rapid pace, and security operations centers (SOCs) are struggling to stay ahead.

With the shortage of qualified analysts, the inefficiency of manual processes, and the growing cost of securing a business, your organization is exposed to a world of risk.
But there is a solution: incorporate security technology that can automate tasks associated with threat detection, incident response, and administration with artificial intelligence (AI).


Rapidly Detect and Respond to Cyber Threats with Threat Lifecycle Management

LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s award-winning platform unifies next-generation SIEM, log management, network and endpoint forensics, and advanced security analytics.


產品類型

Threat IntelligenceArtificial IntelligenceThreat Hunting