TMCNet:  BeyondTrust Joins Partners with LogRhythm to Bring Enterprise Security Analytics and Threat Management to Customers [Professional Services Close - Up]

[June 11, 2013]

BeyondTrust Joins Partners with LogRhythm to Bring Enterprise Security Analytics and Threat Management to Customers [Professional Services Close - Up]

(Professional Services Close - Up Via Acquire Media NewsEdge) BeyondTrust, a security industry provider of Context-Aware Security Intelligence, announced the company has joined forces with LogRhythm, a company focusing on Big Data Security Analytics, to deliver an integrated solution for enterprise security analytics and threat management.


Combining BeyondTrust's Retina CS vulnerability and threat management capabilities with the multi-dimensional behavioral analytics of LogRhythm's next-generation SIEM platform delivers the visibility and insight needed to detect, defend against and respond to cyber threats while meeting compliance requirements and proactively responding to operational challenges.

According to a release, LogRhythm automatically incorporates vulnerability data from Retina CS to deliver real-time cyber threat protection based on up-to-date situational awareness and security intelligence. The integration delivers: -Real-time correlation of exposed vulnerabilities including missing patches and configuration weaknesses across the entire IT environment for enterprise threat intelligence -Increased visibility and enhanced breach detection capabilities through the integration of network security data with multi- dimensional behavioral analytics -Accurate threat detection by linking meaningful events with conditional logic and current threat analytics to reduce the number of false positives and false negatives "As security solutions evolve to correlate a wide variety of relevant data, attacks on organizations and threats to intellectual property become more complex and difficult to identify," said Brad Hibbert, executive vice president of product strategy and operations at BeyondTrust. "The flexibility and power of enterprise threat management tied directly to SIEM and log management complement each other to help close the gap between traditional event correlation and static vulnerability assessment solutions." "LogRhythm customers derive great value from the terabytes of machine data that they collect and correlate with our SIEM 2.0 solution, whether they're tackling security, compliance or operational use cases," said Matt Winter, vice president of corporate & business development at LogRhythm. "Incorporating BeyondTrust's vulnerability data and security intelligence amplifies this value and enhances risk-based prioritization of events to provide our mutual customers the actionable security insight necessary to address today's increasingly complex and sophisticated threat landscape." LogRhythm is an independent Security Information and Event Management (SIEM) provider.

BeyondTrust is a security solution vendor providing Context- Aware Security Intelligence, giving customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting.

((Comments on this story may be sent to newsdesk@closeupmedia.com)) (c) 2013 ProQuest Information and Learning Company; All Rights Reserved.

[ Back To Homepage ]


FOLLOW US
Software Telco Congress

Virtualization has taken the IT world by storm but to date the comms market has been mostly unaffected – relying instead on proprietary appliances for numerous functions. A recent industry push to establish network standards virtualization will potentially shake-up the telecommunications market even more than the move to IP communications. As network hardware begins to be released as software, carriers are expected to save money and benefit greatly from new levels of flexibility related to hosting their network in private and virtual private clouds.

Software Telco Congress Benefits:


Who Will Attend:

Tier 1, 2 and 3 Telcos