Sunday, 17 November 2024
25.7 C
Singapore

LogRhythm introduces new enhancements to boost AI-ready security operations

LogRhythm's latest quarterly release enhances AI-ready security operations with superior data quality, boosting efficiency and simplifying compliance.

LogRhythm, a leader in helping security teams prevent breaches, has announced its ninth consecutive quarterly release. This update aims to empower security teams with the highest integrity data in the industry, enhancing the effectiveness of AI tools used to protect organisations from cyber threats. With simplified data retention, these new enhancements improve analyst efficiency and ensure with industry standards and regulations.

Chris O’Malley, CEO of LogRhythm, stated, “At LogRhythm, our relentless focus on customer satisfaction drives us to continuously innovate and deliver solutions that meet our clients’ evolving needs. Our ninth consecutive quarterly release reinforces our commitment to delivering powerful, intuitive tools that enhance the efficiency and effectiveness of security teams worldwide. We are proud to provide our customers with the cleanest, most reliable data possible to empower them to move into AI-driven security strategies with confidence.”

In today’s AI-ready world, the quality of data fed into AI models is crucial. Many vendors tout their AI capabilities but often overlook the importance of data quality. Staying ahead of threats requires not just advanced technology but also data you can trust.

Highlighting the Machine Data Intelligence Fabric

This quarter, LogRhythm is focusing on its advanced Machine Data Intelligence (MDI) Fabric for AI-ready Security Operations Centres (SOCs). The MDI Fabric collects and organises diverse log sources, converting them into structured, searchable datasets. Over the past 20 years, LogRhythm has rigorously refined this fabric to ensure unmatched accuracy and reliability. This high-quality data enhances search, analytics, and investigation capabilities, allowing analysts to work more efficiently and precisely.

Andrew Hollister, CISO at LogRhythm, commented, “Our latest enhancements are designed to drive analyst efficiency and augment the capabilities of security teams. By simplifying tasks like compliance reporting and enabling more precise investigations, we’re empowering security teams to adapt to changing threats and requirements while maintaining peak operational effectiveness in the modern era of AI adoption.”

Boosting efficiency and simplifying compliance

LogRhythm Axon helps security teams enhance their efficiency and simplify compliance reporting. Streaming logs to AWS S3 offers a cost-effective way to retain data in a searchable format for compliance audits and long-term forensic searches. This approach uses “bring your own storage” for cloud storage of logs.

Out-of-the-box compliance frameworks for NIST SP 800-171 and NIST CSF 2.0 allow analysts to generate evidence quickly and accurately. New features, like user and host analysis in search and case management, enable in-depth investigations within a single screen, maintaining the context of the original query. Advanced real-time correlation supports complex, multi-layer analytics for key use cases, such as temporary account usage and lateral movement with account sweep.

New SIEM capabilities for faster log data integration and analysis

LogRhythm’s new Open Collection Architecture allows customers to send JSON data to the SIEM through third-party sources using Lumberjack. A new web-based JSON normalisation creation wizard helps simplify customisations for all users. Additionally, over 70 supported log sources have been enhanced to improve parsing for better correlation and analysis.

Phil Swain, CISO and Vice President of Information Security at Extreme Networks, praised LogRhythm, saying, “Our partnership with LogRhythm has been instrumental in staying ahead of the curve in today’s threat landscape. As a leading network solutions provider, we know firsthand that all technology strategies, including using AI and ensuring a secure network perimeter, rely on having accurate data. The regular quarterly updates from LogRhythm mean that we always have access to the latest innovations and updates to not only maintain but also improve our security posture.”

Dallas Hammer, CISSP and CISO at NDM Technologies, added, “The JSON Policy Builder and Lumberjack JSON Listener allow us to collect and normalise emerging log sources much faster and easier than we could before, giving NDM’s SOC more time to focus on detection rather than collection.”

Hot this week

Ricoh and Fujifilm modernise data management with Informatica’s AI-powered cloud solutions

Ricoh and Fujifilm adopt Informatica's AI-powered cloud solutions to streamline data management, enhance decision-making, and improve global operations.

YugabyteDB: Unveiling the potential of database modernisation in APAC

YugabyteDB proves to be more than just a database; it's a pivotal solution aiding APAC businesses in navigating the digital landscape, showcasing scalability, resilience, and versatility, thereby playing a crucial role in regional digital transformation.

Roboyo expands hyperautomation expertise in Asia Pacific

Roboyo appoints Ignasi Peiris as Automation Engineering Manager to boost UiPath capabilities and drive hyperautomation adoption in Asia Pacific.

T-Mobile network infiltrated by hackers linked to China

China-linked hackers breached T-Mobile, accessing officials' data. T-Mobile says customers' data remains largely unaffected.

YouTube’s new AI music remixer could let you transform songs with ease

YouTube’s experimental AI remixer lets creators transform tracks into new genres, adding personal flair to Shorts with AI-powered custom soundtracks.

Alibaba’s quarterly profit rises 58% on cloud and international growth

Despite a challenging domestic market, Alibaba's quarterly profit jumped 58%, driven by cloud computing and international e-commerce growth.

18 states challenge SEC over crypto regulation enforcement

18 US states filed a lawsuit challenging the SEC’s authority over crypto regulation, seeking state-level control. The legal battle could reshape oversight.

Related Articles

Popular Categories