Stand: AA6

LogRhythm, a leader in Threat Lifecycle Management, empowers organisations around the globe to rapidly detect, respond to and neutralise damaging cyberthreats. The company’s patented award-winning platform unifies next-generation SIEM, log management, network and endpoint monitoring, user entity and behaviour analytics (UEBA), security automation and orchestration (SAO) and advanced security analytics. In addition to protecting customers from the risks associated with cyberthreats, LogRhythm provides compliance automation and assurance, and enhanced IT intelligence.

Among its many industry accolades, LogRhythm has been positioned as a Leader in Gartner’s SIEM Magic Quadrant, received SC Labs’ “Recommended” rating for SIEM and UTM for 2017 and won “Best SIEM” in SANS Institute’s “Best of 2016 Awards.”

Exhibitor Website

Twitter LinkedIn

LogRhythm Seminars

  • Threats are evolving. A new approach to cyber security is required. Wed 4th Oct 11:00 - 11:30

    Threats are evolving. A new approach to cyber security is required.

    “By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches,” according to Gartner Research. 

    It’s a simple concept: The earlier you detect and mitigate a threat, the less the ultimate cost to your business. By implementing an effective end-to-end threat management process that focuses on reducing detection and response times, you will have the ability to prevent high-impact security incidents, such as major data breaches. This process is known as Threat Lifecycle Management (TLM) and can help you improve the efficiency of your security operations.

    TLM is a series of aligned security operations capabilities and processes. It begins with the ability to see broadly and deeply across your IT environment and ends with the ability to quickly mitigate and recover from a security incident. You can enable effective TLM at a scale appropriate to your business through modern technology specifically in the areas of:

    • Advanced machine analytics, which are key to discovering potential threats quickly. 
    • Security automation and orchestration capabilities, which increase analyst efficiency to support the entire threat investigation, through to full remediation and recovery.


    Adam BradyMore

    Time / Place

    Wed 4th Oct 11:00 to 11:30

    CARM Theatre

White papers

LogRhythm Security Intelligence Maturity Model CEO Whitepaper
LogRhythm Security Intelligence Maturity Model CEO Whitepaper.pdf 339.13 kB

LogRhythm Security Intelligence Maturity Model CISO Whitepaper
LogRhythm Security Intelligence Maturity Model CISO Whitepaper.pdf 512.75 kB

The Threat Lifecycle Management Framework
Discover how to prevent major data breaches by reducing your time to detect and respond to cyberthreats in this whitepaper by LogRhythm CTO & Co-Founder, Chris Petersen.

LogRhythm_Threat_Lifecycle_Management_Whitepaper_UK.pdf 3.81 MB