Menu
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons

LogRhythm NDR

Real-time threat detections across endpoints, data centers, and the cloud.

Securing your network against advanced persistent threats (APTs) requires greater visibility to detect actors and their actions so that you can reduce your response time. As threats increase, real-time network detection and response (NDR) solutions are more critical than ever.

While other NDR solutions rely solely on machine learning (ML) based threat detection, LogRhythm uses hybrid analytics that combine machine learning, rules-based detection, and threat intelligence to analyze network, user, and host activity. This holistic approach provides a true representation of all activity within the enterprise domain, making it possible to detect lateral movement, exfiltration, malware compromise, ransomware, and other threats in real time.

LogRhythm NDR helps you address new security use cases for desktops, supply chains, data centers, public cloud, and IoT/OT. You can use the SaaS-based threat detection solution alone or with the LogRhythm SIEM Platform to quickly spot threats and minimize your organization’s risk.

Powered by patent-pending TensorMist-AI™ technology, LogRhythm NDR uses mesh computing to scale data collection and analytics and lower operating costs. Key features of LogRhythm NDR include:

  • Real-time detection of actors and actions - Provides end-to-end enterprise activity at the network, host, user, and process level to help you detect threats like lateral movement, exfiltration, malware compromise, and ransomware in real time.
  • Integration with extended detection and response (EDR) and firewall solutions - Adds network visibility to your existing threat detection to extend coverage across endpoints, data centers, and the cloud.
  • Agentless cloud collection - Ingests cloud data and models OS and workload behaviors across virtual machine and Kubernetes/containerized environments.
  • TensorMist-AI - Uses mesh computing to scale data collection and analytics and lower bandwidth costs.
  • Comprehensive and accurate threat detection - Reduces false positives by over 90% and blocks advanced attacks.
  • Built-in MITRE ATT&CK Engine - Provides smart threat hunting of tactics, techniques, and threat groups across multiple attack vectors.
  • Easy deployment - Getting up and running is easy with our cloud-native security stack and out-of-the-box integrations for existing firewall and EDR solutions.
Rating
0 vote
Favoured:
0

Listing Details

Vendor
LogRhythm
Website
Visit the Product Site
Pricing Model
Commercial
Modified
2022-07-14
Owner
michelemjordan
Created
2017-02-20
Tags
PCAP, Network Analysis, Netflow, Deep Packet Analysis, Application Analysis
  • 1276.png
RecommendReport
  • Web Application FW +
  • Cloud Security Services
  • Static Code Analysis
  • Boundary Guards +
  • Network Anomoly Detection +
  • Scanning Products +
  • Network Access Control
  • Server Security Products +
  • Endpoint Security +
  • Forensic Solutions +
    • - Anti Forensic Tools
    • - Forensic Toolkits
    • - Forensic Tools
    • - Network Forensic Tools
    • - Remote Forensics
    • - Porotocol Analyzers
  • Malware Protection +
  • Patch Management +
  • Reputational Intelligence
  • Insider Threat Solutions
  • Phishing Assessment
  • Virtualisation Security
  • SIEM
  • Vulnerability Alert Services
  • Security Training +
  • Security Conferences
  • Password Managers
  • TSCM Bug Sweeping +
  • Geeky Gadgets
  • Visio Stencils
  • Uncategorised

CND Services - Assessing Your Security

  • Risk Assessment
  • Cyber Profile Assessment
  • Cyber Essentials
  • Vulnerability Assessment
  • Web App Scanning
  • Penetration Testing
  • Red Teaming
  • Phishing Assessment
  • Security Compliance
  • Firewall Audit
  • Forensic Readiness
  • vCISO
  • Aviation vCRSM
  • Maritime vCySO

CND Services - Preventing an Attack

  • Superyacht Cyber
  • Secure Cloud Configuration
  • Security Architecture
  • IDS & IPS
  • Blockchain Security
  • Data Loss Prevention
  • System Security Hardening
  • Insider Threat Prevention
  • Cisco Advanced Security
  • Vulnerability Management

CND Services - Detecting an Attack

  • Splunk Services
  • SIEM
  • XDR
  • MDR
  • EDR
  • Building a SOC
  • SOC Maturity
  • Staffing a SOC
  • Cloud Security Monitoring
  • Insider Threat Detection
  • GPG13 Protective Monitoring
  • Cyber Threat Intelligence
  • Branded Radar Console

CND Services - Responding to Incidents

  • Breach Triage
  • Incident Response
  • Incident Support
  • Breach Impact
  • Root Cause Analysis
  • Breach Remediation
  • Risk Assessment
  • Forensic Readiness
  • IR Planning

CND Services - Managed Security

  • Managed SOC
  • Managed Cyber Education
  • Managed Phishing Assessments
  • vCISO
  • Vulnerability Assessments
  • Vulnerability Management
  • XDR
  • MDR
  • EDR
  • Managed SIEM

CND Services - Superyacht Services

  • Complete IMO Cyber
  • Superyacht Intelligence
  • Cyber Assessment
  • Cyber Plan & Policies
  • Cyber Monitoring
  • Cyber Officer CySO
  • Maritime Blog

CND Services - Recruitment

   

© Computer Network Defence Limited 2023

Privacy Notice
Terms & Conditions
Send us a Message