Magazine Button
LogRhythm enhances security analytics with expanded operations capabilities

LogRhythm enhances security analytics with expanded operations capabilities

CloudCybersecurityEnterprise SecurityTop Stories

LogRhythm, the company empowering security teams to navigate the ever-changing threat landscape with confidence, has announced a series of expanded capabilities and integrations for its security operations solutions.

The updates propel LogRhythm’s ability to be a much-needed force multiplier for overwhelmed security teams who are expected to confidently, effectively, and efficiently defend against cyberattacks.

Following the October launch of LogRhythm Axon, a groundbreaking, cloud-native security operations platform, the company is introducing new visualizations and powerful analytics that offer seamless visibility into potential security risks. Designed to streamline the experience of security analysts, Axon and its latest updates make it easier for teams to detect, investigate and report on potential threats, reducing the burden of managing threats and the operating infrastructure.

Enhancements this quarter span LogRhythm’s product portfolio to collectively enable SOC teams to detect and resolve threats more easily, improving analyst productivity and effectiveness. 

“This quarter, we are especially excited about the number of groundbreaking and enhanced capabilities coming to our market-leading solutions,” said Kish Dill, Chief Product and Customer Officer of LogRhythm. “These enhancements and integrations have been curated with the goal of simplifying the lives of security analysts and enabling them to detect threats faster through seamless visibility, enhanced collection and an intuitive analyst experience.” 

Additional enhancements and integrations with LogRhythm’s Axon in this quarterly rollout include new custom and out-of-the box analytics rules, new markdown widget and histogram widget to cut data search time and easier investigation of log observations raised by analytics through the Observation Workflow. 

Click below to share this article

Browse our latest issue

Intelligent CISO

View Magazine Archive