Hi [[ session.user.profile.firstName ]]

Detecting Malicious Traffic on Your Network

Too often, when looking for malicious network traffic you either search for known bad or investigate anomalous traffic that doesn’t look normal. That reactive approach is time consuming, and potentially over-reliant on searching for larger concerns. Fortunately, new solutions use advanced analytics to proactively identify, enrich and alert on malicious traffic.

Why is this important?

Detecting known bad traffic is great when it works, but it’s a lot like signature-based AV (which is rigid and unable to detect unknown threats):
**Only really effective for widespread, generalized attacks – not so great for unique targeted attacks
**There’s an indefinite amount of time before the malicious traffic signature, domain name or IP makes it into the pattern updates and threat intel feeds from your vendors
**Detecting anomalous traffic can address the aforementioned weaknesses, but in practice it depends heavily on how – and how well – you define anomalous traffic, and how quickly (accurately) you can spot it.

Security practitioners are getting better by the day at looking for anomalies. Here’s just a few:

**Protocols
**Unrecognized port protocol numbers
**Malformed/non-compliant traffic compared to protocol expected on known port
**Protocols you don’t want or at least don’t expect to see in the given context
**High bandwidth usage for that protocol
**Traffic patterns
**Disproportionate inbound/outbound bandwidth usage for a given endpoint
**Suspicious Destination/Source IP combinations

In this real training for free event, we will explore how to analyze your network so that you can learn and understand its traffic patterns and get a handle for what’s normal. You’ll then be able to take this information and look for anomalous traffic, build known-bad detections and make your network detection and response (NDR) technologies and efforts smarter.
Recorded Apr 25 2019 91 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Luis Rico (LogRhythm) and Randy Franklin Smith (UWS)
Presentation preview: Detecting Malicious Traffic on Your Network

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Maintaining Cyber Resiliency During Times of Disruption Apr 15 2020 5:00 pm UTC 60 mins
    Rocky Rosas, Director of Sales Engineering at LogRhythm, Valerie Wrenholt, OEM Partner Enablement Manager at Webroot
    For the majority of us, our work routines have changed dramatically due to the novel coronavirus, COVID-19. Bad actors, looking to capitalize on the headlines, continue to accelerate their malicious efforts.

    During this webinar, Rocky Rosas, Director of Sales Engineering - LogRhythm, and Val Wrenholt, OEM Partner Enablement Manager – Webroot will discuss how to implement safeguards as the workforce rapidly pivots to a remote environment.

    We’ll also be joined by Tyler Moffit, Security Analyst at Webroot for a panelist Q&A session and tips on how best to proactively plan for threats to your data.

    Topics covered in this webinar will include:
    •Leveraging threat intelligence to accelerate and optimize your detection and threat hunting capabilities
    •Protecting yourself against malicious IP activity
    •Priority use cases while working remote
    •Q&A panel

    Register Today!
  • AMA: Learn How LogRhythm Implemented the WFH Change Recorded: Apr 7 2020 59 mins
    Rex Young, LogRhythm CIO; Zack Rowland, LogRhythm Strategic Integration Engineer
    As a result of recent events and the COVID-19 pandemic, most organizations are implementing work-at-home policies. Yet company-wide remote environments present unique challenges for IT and cybersecurity professionals.

    During this webinar, Rex Young, chief information officer, and Zack Rowland, strategic integrations engineer, will reveal how LogRhythm rapidly migrated employees from in-office to remote work.

    The two will discuss the steps LogRhythm took to prepare for such an event and how they put that plan in action as remote work became necessary. Rex and Zack will then answer your questions to help you implement the same work-from-home environment while keeping IT and security best practices top of mind.

    Topics covered during this webinar will include:

    - How LogRhythm prepared its IT and security operations to accommodate
    a global work-from-home event
    - A personalized Q&A session to help your IT and security teams accommodate a remote team
    - How to balance business continuity with security measures
    - IT and security implications to consider when implementing a work-at-home set-up

    Before the webinar, send your questions to DigitalMarketing@logrhythm.com and our security and IT experts will answer them during this live event.

    Register today!
  • Securing a Remote Workforce: How to Get Started Recorded: Mar 31 2020 48 mins
    James Carder, Andrew Hollister, and Brian Emond (LogRhythm)
    In light of COVID-19, we’ve seen businesses across industries implement remote work policies. This brings about new security concerns, many of which either weren’t considered or prioritized beforehand.

    During this webinar LogRhythm experts including James Carder, CSO and VP of LogRhythm Labs, reviewed best practices for securing a remote workforce and what to expect when your employees make this kind of shift, whether it needs to happen now or in the future. Specific topics included:

    - Getting started with log collection for remote systems
    - Priority use cases you should employ, such as monitoring VPN access and collaboration security
    - The types and levels of activity you should expect to see on your network, depending on your industry

    We also discussed the impacts we’ve seen from the rush to support remote work due to COVID-19. These reveal lessons that others can implement now or work into a future plan to support a rise in remote workers.
  • The CMO Imperative: Adapting your 2020 strategy during the pandemic Recorded: Mar 27 2020 81 mins
    Cindy Zhou, CMO (LogRhythm), Daniel Frohnen, CMO (Sendoso), and David Pitta, CMO (BrightTALK)
    Marketing leaders need to immediately embrace change and find creative solutions to add value with an increased emphasis on the digital world. This talk brings CMOs from around the US to share how they're adapting to our new reality with an emphasis on:
    - Reaching your audience when travel is restricted and conferences are cancelled
    - Adapting your content and standing out when everyone is doubling down on digital
    - Pivoting your field marketing and event strategy to focus on digital opportunities
    - Filling the lead gen and brand building gap
    - Shifting channel strategies, plans, budget and resources
    - Keeping your employees motivated during the crisis
    - Messaging effectively around coronavirus

    BrightTALK has teamed up with Boston Content, DC MarTech Talks and Obility B2B to deliver this special talk.
  • SANS 2020 Women in Cybersecurity Survey Recorded: Mar 18 2020 60 mins
    Heather Mahalik of SANS, sponsored by LogRhythm
    Women are rising through the cybersecurity ranks to become recognized leaders, experts, and mentors. The 2020 SANS Women in Cybersecurity Survey drew on the shared experiences of successful women in cybersecurity to provide practical advice on becoming leaders in their organizations.

    Watch the webinar and learn why opportunities for women in security have never been better, including survey data points such as:

    - More than 70% of respondents feel respected by their teammates

    - 64% report that they are sought out for their opinions on cybersecurity issues

    - 37% are advancing rapidly, moving into a senior position within one to four years

    In this on-demand webcast, we discuss gender bias, the effects of mentorship, and practical advice on how to get ahead.
  • 4 Trending Phishing Techniques: Real-Life Examples and Tips for Detection Recorded: Mar 5 2020 90 mins
    Randy Franklin Smith of Ultimate Windows Security | Eric Brown and Brian Coulson of LogRhythm
    Many successful attacks begin with a phishing email that some user falls for. And that’s why MITRE prominently features Spearphishing (T1192) as an Initial Access technique in ATT&CK.

    In this webinar, LogRhythm and Ultimate Windows Security explore the latest phishing techniques used by attackers and how MITRE ATT&CK can help detect and remediate these threats.

    In this on-demand webinar, we’ll show you actual examples of phishing attempts executed through:

    - Legitimate file-sharing sites
    - Fake Office 365 websites
    - Spoofed executive emails
    - The baseStriker vulnerability

    Watch now to learn more.
  • Cisco + LogRhythm: Smarter, Faster Security Through Integrations Recorded: Dec 19 2019 55 mins
    Jake Reynolds (LogRhythm) and Doug Hurd (Cisco)
    Smarter, faster security through LogRhythm and Cisco integrations

    LogRhythm and Cisco are committed to helping you enhance your security operations through the seamless integration and powerful capabilities of the LogRhythm Threat Lifecycle Management platform and Cisco’s Threat Grid, Umbrella, Firepower and ISE.

    Currently integrating with over three dozen Cisco products, LogRhythm provides centralized visibility and advanced security analytics across the Cisco-enabled environment and makes security events actionable in the network. Stay in front of cyber adversaries and proactively detect, respond to and remediate cyberthreats with this powerful integration.

    In this technical webinar, you’ll learn how to:

    Gain immediate insight with Cisco and LogRhythm’s comprehensive visibility
    Streamline investigations with Umbrella and Threat Grid
    Accelerate and enable endpoint and perimeter remediation with ISE and ASA
  • Webinar: Threat Hunting Overview with 7 Common Hunts Recorded: Dec 18 2019 95 mins
    Nathan "Q" Quist (LogRhythm) and Randy Franklin Smith (UWS)
    Dabble or Deep Dive: 7 Different Threat Hunts You Can Do With Available Resources

    In this real training for free session, we will discuss the minimum toolset and data requirements (and not necessarily volume) you need for successful threat hunting. We will take into account that while some of you can devote most of your time to threat hunting, most of us have limited time and resources for this activity. The good news is that threat hunting is flexible and anyone can do it, ranging from a few hours a week to full-time.

    As just one example, a great type of threat hunting is to look for unrecognized/suspicious executables running on you network. You can dip your toe in the water with this type of hunt with a small commitment of time and resources or you can plunge in deep with a major data collection and analysis effort. Starting out simple means you just focus on EXE names; baseline the EXE names being executed on your network, and then perform a daily review of new EXE names showing up for the first time. You can get this information from event ID 4688 and the query capabilities are very light. But I think you’ll be surprised what you are able to learn and catch.

    We will take the same approach with a total of 7 types of threat hunting:

    Recognizing suspicious software
    Scripting abuse
    AV follow-up
    Lateral movement
    Persistence
    DNS abuse
    Bait-the-bad-guy

    LogRhythm is sponsoring this real training for free event and Nathan Quist (aka “Q”) is helping me on this event. Q is LogRythm’s Threat Research Engineer and works with LogRhythm’s internal SOC team and its clients to perform deep dives into their environments to uncover threats facing our industry.
  • Optiv / LogRhythm Joint Webinar: Healthcare and Cybersecurity Recorded: Dec 17 2019 57 mins
    Todd Weber, CTO Optiv / James Carder, CISO & VP LogRhythm Labs, LogRhythm / Larry Vaughan, VP WW Partnerships and Alliances
    In this webinar, Optiv and LogRhythm discuss the current landscape of cybersecurity in the healthcare industry and how LogRhythm’s new True Unlimited Data Plan can help you reduce risk in your environment without spending millions of dollars to do so.

    Join Todd Weber, Chief Technology Officer at Optiv and James Carder, Chief Security Officer & VP of LogRhythm Labs as they discuss the current landscape of cybersecurity in the healthcare industry, and how LogRhythm’s new True Unlimited Data Plan can help you reduce risk in your environment without spending millions of dollars to do so.
  • Open Source Security Tools for Defending Enterprise Organizations Recorded: Dec 11 2019 56 mins
    Steve Kaufman (LogRhythm) and Paul Asadoorian (Security Weekly)
    Tips & Tricks for Defending the Enterprise Using Open Source Tools

    One of the common complaints I hear from security professionals is, “I don’t have the budget for that.” Do you know many of the tools that can solve problems in the enterprise are free, as in free beer? You don’t have to buy commercial products to secure your entire enterprise. Sure, there are some areas that do require a PO, however, there are also several areas of your security program that can be implemented using free and/or open source tools.

    Learn which aspects of your security program can benefit the most from these tools, and how to configure and use them. (Free beer will NOT be provided during this webcast, however, you are encouraged to bring your own, as the presenter’s jokes may be funnier if you are enjoying an adult beverage.)

    Outline:
    – Lightweight threat intelligence: pi-hole in the cloud (+TacyonNet)
    – Vulnerability profiling: Integration with vFeed
    – Patching your systems with Ansible
    – Network monitoring with Bro
    – High-performance firewalls with OpnSense
    – The best free training resources

    Steve Kaufman, a Technical Product Manager from LogRhythm, will be joining the webinar to cover how security technology vendors are aligning with open source tools. He’ll explore how LogRhythm’s architecture, including elasticsearch, enables the product to integrate with open source tools.
  • LogRhythm True Unlimited Data Plan for SIEM Recorded: Dec 10 2019 39 mins
    Bill Smith (LogRhythm) and Todd Weber (Optiv)
    If the volume of data in your environment is expanding exponentially, you have likely been surprised to see a rise in your SIEM contract each year. You may have even had to make the difficult — and risky — decision of which data not to protect to stay within your budget. Starting now, you don’t have to.

    With LogRhythm’s new True Unlimited Data Plan, your organization will pay one price to protect all data, users, and systems, even if those numbers increase year to year.

    Join Optiv and LogRhythm as we discuss how the True Unlimited Data Plan can help you reduce risk in your environment without spending millions of dollars to do so.

    This webinar will review how together, Optiv and LogRhythm can help you overcome the following challenges:

    > Increased headcount: more people means more data.
    > Infrastructure growth: adding networking and hardware increases your log volumes.
    > Increased revenue: the more your organization is worth, the larger the target it becomes.
    > Cloud-first initiatives: apps in the cloud generate more logs.
  • Optiv / LogRhythm Joint Webinar: Healthcare and Cybersecurity Recorded: Dec 4 2019 58 mins
    Todd Weber, CTO Optiv / James Carder, CISO & VP LogRhythm Labs, LogRhythm / Larry Vaughan, VP WW Partnerships and Alliances
    In this webinar, Optiv and LogRhythm discuss the current landscape of cybersecurity in the healthcare industry and how LogRhythm’s new True Unlimited Data Plan can help you reduce risk in your environment without spending millions of dollars to do so.

    Join Todd Weber, Chief Technology Officer at Optiv and James Carder, Chief Security Officer & VP of LogRhythm Labs as they discuss the current landscape of cybersecurity in the healthcare industry, and how LogRhythm’s new True Unlimited Data Plan can help you reduce risk in your environment without spending millions of dollars to do so.
  • LogRhythm True Unlimited Data Plan for SIEM/Security Recorded: Nov 21 2019 40 mins
    Bill Smith (LogRhythm) and Todd Weber (Optiv)
    If the volume of data in your environment is expanding exponentially, you have likely been surprised to see a rise in your SIEM contract each year. You may have even had to make the difficult — and risky — decision of which data not to protect to stay within your budget. Starting now, you don’t have to.

    With LogRhythm’s new True Unlimited Data Plan, your organization will pay one price to protect all data, users, and systems, even if those numbers increase year to year.

    Join Optiv and LogRhythm as we discuss how the True Unlimited Data Plan can help you reduce risk in your environment without spending millions of dollars to do so.

    This webinar will review how together, Optiv and LogRhythm can help you overcome the following challenges:

    > Increased headcount: more people means more data.
    > Infrastructure growth: adding networking and hardware increases your log volumes.
    > Increased revenue: the more your organization is worth, the larger the target it becomes.
    > Cloud-first initiatives: apps in the cloud generate more logs.
  • Threat Detection and Hunting with MITRE ATT&CK Recorded: Nov 20 2019 103 mins
    Randy Franklin Smith (UWS) with Dan Kaiser and Brian Coulson
    The MITRE ATT&CK framework is quickly becoming a focal point in the security world — and for good reason. This framework provides a consistent, industry-wide standard on which you can assess the effectiveness of your security monitoring and alerting capabilities.

    In this webinar, we will zero in on using the MITRE ATT&CK framework to focus and prepare your threat detection capabilities.

    Here are the 5 techniques we’ve selected, based off the tactic prevalence:

    T1090 -- Connection Proxy
    T1048 -- Service Execution
    T1036 -- Exfiltration
    T1189 -- Masquerading
    T1035 -- Drive-by Compromise

    We’ll explore each one of these techniques with you, highlighting how the attackers use them and how you can detect them. We will discuss which logs you need to be collecting, what audit policy needs to enabled, and what you need to look for in those logs.These 5 techniques each come from a different Tactic category in ATT&CK, and relate to different phases in an attack’s lifecycle. Mature threat detection and response requires that you have capabilities across the threat lifecycle, from initial access through command and control and into exfiltration.

    Dan Kaiser and Brian Coulson from, LogRhythm, will demonstrate how to use each of these techniques with an actual SIEM. Brian and Dan are part of a large project at LogRhythm Labs in which they are aligning MITRE ATT&ACK with their SIEM platform.

    When coupled with a SIEM solution, the MITRE ATT&CK framework allows you to effectively test your security monitoring environment against attack techniques to validate that your technology and rules are truly working and alert you to the right anomalous behavior.

    In this webinar, you’ll learn:

    1. How to incorporate ATT&CK to work in your environment
    2. Building out practical, technical threat detection
    3. How to use SIEM technology and logs for threat hunting
  • Migration of Security Products to the Cloud Recorded: Nov 7 2019 58 mins
    Paul Asadoorian, Matt Alderman (Security Weekly), Stephen Smith, and Jeff Braucher (LogRhythm)
    The Cloud, The Cloud - What Security Products do you Need in the Cloud?

    We’ve been hearing it for years, everything is moving to the cloud. Maybe not fully true, but there is a good amount of cloud migration projects all around us. What does this mean for security and security products?

    In this webinar, Paul Asadoorian and Matt Alderman will discuss the evolution of cloud security products, including challenges, maturity, and latest trends. The pace and adoption of cloud security products have varied depending on the type of cloud you’re adopting (IaasS, PaaS, or SaaS).

    Stephen Smith and Jeff Braucher from LogRhythm, will discuss the migration of security services/products to the cloud, including topics such as:

    - What products should be heading for the cloud
    - Thoughts on cloud service providers entering the security market
    - Benefits/disadvantages to SaaS security products
  • Kubernetes Audit Logging Recorded: Oct 25 2019 84 mins
    Randy Franklin Smith (UWS) with Rich Bakos and Kyle Senescu
    Applications are increasingly being containerized, and when that happens, they are likely to find their way to a cluster within a container-orchestration system like Kubernetes. However, containerized applications are only as safe as the Kubernetes cluster they run in. So how do you ensure a secure environment? The answer is visibility.

    In this on-demand webinar, LogRhythm sales engineers join Ultimate Security Windows Host Randy Franklin Smith to introduce you to Kubernetes audit logging. The presenters demonstrate how to use the LogRhythm NextGen SIEM Platform to gain visibility into your Kubernetes clusters.

    Explore Kubernetes audit logging and learn how to isolate important events to reduce the noise from all other events. Smith provides examples of real Kubernetes audit events to show you audit policies in action.

    LogRhythm sales engineers build on Smith’s introduction and apply those learnings with security considerations in mind to show you how to:

    - Ensure you create an approved container image
    - Ensure the API isn’t open to the outside world
    - Track inbound and outbound traffic from the cluster and pods
    - Monitor and visualize container log data
  • SANS Evaluator's Guide to NextGen SIEM Recorded: Sep 26 2019 56 mins
    Christopher Crowley (SANS) and Sara Kingsley, (LogRhythm)
    There’s no question about it: Legacy SIEMs hinder your ability to achieve your security objectives. Traditional solutions are limited and often lack the flexibility to scale and grow as your security needs increase. To combat today’s threats, you need a next-gen SIEM that leverages the architecture and security capabilities that are best suited to detect both known and unknown threats within your environment. But what makes a SIEM “next-gen”? And how do you know if the SIEM technology you’re looking at possesses these requirements?

    In this on-demand webcast, Christopher Crowley, senior instructor at SANS, and Barbara Filkins, senior analyst at SANS, join Sara Kingsley, senior product marketing manager at LogRhythm, to explain what comprises a modern SIEM solution and share tips for evaluating a next-gen SIEM platform.

    In this webcast, you’ll learn:

    How next-gen SIEM capabilities map to the modern security team’s needs
    The architectural requirements for a solution to support these needs
    The evaluation steps you can take to select the best SIEM for you
    The questions you should ask SIEM vendors to support your evaluation process

    Watch the webcast now to get the tools you need to evaluate and choose a next-gen SIEM that fits the needs of your organization’s requirements.
  • Cisco + LogRhythm: Smarter, Faster Security Through Integrations Recorded: Sep 11 2019 55 mins
    Jake Reynolds (LogRhythm) and Doug Hurd (Cisco)
    Smarter, faster security through LogRhythm and Cisco integrations

    LogRhythm and Cisco are committed to helping you enhance your security operations through the seamless integration and powerful capabilities of the LogRhythm Threat Lifecycle Management platform and Cisco’s Threat Grid, Umbrella, Firepower and ISE.

    Currently integrating with over three dozen Cisco products, LogRhythm provides centralized visibility and advanced security analytics across the Cisco-enabled environment and makes security events actionable in the network. Stay in front of cyber adversaries and proactively detect, respond to and remediate cyberthreats with this powerful integration.

    In this technical webinar, you’ll learn how to:

    Gain immediate insight with Cisco and LogRhythm’s comprehensive visibility
    Streamline investigations with Umbrella and Threat Grid
    Accelerate and enable endpoint and perimeter remediation with ISE and ASA
  • Malicious Traffic: Understanding What Does and Doesn’t Belong on Your Unique Net Recorded: Aug 22 2019 91 mins
    Rick Fernandez (LogRhythm) and Randy Franklin Smith (UWS)
    Too often, when looking for malicious network traffic, you either search for known bad network traffic or investigate anomalous traffic that doesn’t look normal. That reactive approach is time consuming, and potentially over-reliant on searching for larger concerns. Fortunately, new solutions use advanced network analytics to proactively identify, enrich and alert on malicious traffic.

    Why is this important?

    Detecting known bad network traffic is great when it works, but it’s a lot like signature-based AV (which is rigid and unable to detect unknown threats). Often it is only really effective for widespread, generalized attacks – not so great for unique targeted attacks. Further, there’s an indefinite amount of time before the malicious traffic signature, domain name or IP makes it into the pattern updates and threat intel feeds from your vendors.

    Detecting anomalous traffic can address the aforementioned weaknesses, but in practice it depends heavily on how – and how well – you define anomalous traffic, and how quickly (accurately) you can spot it.

    Security practitioners are getting better by the day at looking for anomalies. Here’s just a few we’ll focus on in our webinar:
    - Unrecognized port protocol numbers
    - Malformed/non-compliant traffic compared to protocol expected on known port
    - Protocols you don’t want or at least don’t expect to see in the given context
    - Disproportionate inbound/outbound bandwidth usage for a given endpoint
    - Suspicious Destination/Source IP combinations

    In this webinar, Randy Franklin Smith (of Ultimate Windows Security) and Rick Fernandez (of LogRhythm) will explore how to analyze your network so that you can learn and understand its traffic patterns and get a handle for what’s normal. You’ll then be able to take this information and look for anomalous traffic, build known-bad detections and make your network detection and response (NDR) technologies and efforts smarter.
  • Optimize Phishing Detection and Response with LogRhythm and Office 365 Recorded: Aug 20 2019 77 mins
    Randy Franklin Smith (UWS) | Greg Foss (LogRhythm)
    Today’s hackers often favor the phishing email as their weapon of choice. Phishing attacks are not only common, but are also very difficult to defend against. What if you could detect and mitigate a phishing attack before its intended target clicks on that fatal link or opens that malicious attachment?

    When your Exchange server is in the Office 365 cloud, solutions such as constant inbox scanning or relying on synchronous mail flow aren’t viable options. Instead, you can find a strong defense against phishing emails in the Message Tracking log in Exchange.

    The Message Tracking log is available in both on-prem Exchange and Office 365 Cloud’s Exchange Online. Message Tracking logs include valuable information about the client, servers, sender, recipients, message subject, and more. If you can access this information and know how to mine it, you can detect likely phishing emails.

    In this webinar, you’ll learn how to:

    - Recognize the format of message tracking logs
    - Pull message tracking logs from Office 365 using PowerShell’s Get-MessageTrackingLog cmdlet
    - Work through a list of checks to perform against message tracking events to detect phishing emails
    - Move suspect emails to a sandbox where you can use analysis tools like PhishTank, ThreatGRID, or OpenDNS
    - Remove copies of phishing emails from other recipients
    - Automatically detect and respond to phishing attacks with no analyst intervention
    - To optimize your phishing response efficiency, LogRhythm has introduced a new open-source Phishing Intelligence Engine (PIE). PIE is a PowerShell framework focused on phishing attack detection and response.

    Register for the webinar now to learn how you can use LogRhythm’s PIE and Office 365 to better detect and respond to phishing attacks.
Big Data Doesn't Have to Mean Big Problems
LogRhythm empowers more than 4,000 customers across the globe to measurably mature their security operations program. LogRhythm's award-winning NextGen SIEM Platform delivers comprehensive security analytics; user and entity behavior analytics (UEBA); network detection and response (NDR); and security orchestration, automation, and response (SOAR) within a single, integrated platform for rapid detection, response, and neutralization of threats.

To learn more, please visit logrhythm.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Detecting Malicious Traffic on Your Network
  • Live at: Apr 25 2019 5:00 pm
  • Presented by: Luis Rico (LogRhythm) and Randy Franklin Smith (UWS)
  • From:
Your email has been sent.
or close