LogRhythm Mining Log Files for Better Security

Real-time log files contain a wealth of information about enterprises’ data assets, and LogRhythm is betting that there’s a security advantage to be gained by tapping into that well.

The security information and event management vendor has updated its core platform to give enterprises greater visibility into their log data, pulling in information from the host and network layers that aren’t typically included in log management applications. Datamation has the details.


Most IT systems generate log files and hidden within them could be the answer to some enterprise IT security issues. Security information and event management (SIEM) vendor LogRhythm this week announced an update to its platform, providing enterprises with increased visibility into the real-time log files of their IT assets.

The LogRhythm release comes as enterprises continue face both external and internal security threats and are ramping up effort to secure their infrastructure in response. The new release provides new capabilities for monitoring processes and network connection on endpoints as well as providing the ability to correlate that data with geographical location information.



Read the full story at Datamation:


Are Log Files the Key to Better Enterprise Security?

Get the Free Newsletter!

Subscribe to our newsletter.

Subscribe to Daily Tech Insider for top news, trends & analysis

News Around the Web