Company Profile

LogRhythm, a leader in security intelligence and analytics, empowers organisations around the globe to rapidly detect, respond to and neutralise damaging cyber threats. The company’s award-winning platform unifies next-generation SIEM, log management, network and endpoint forensics, and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides innovative compliance automation and assurance, and enhanced IT intelligence.

LogRhythm is consistently recognised as a market leader. The company has been positioned as a Leader in Gartner’s SIEM Magic Quadrant report for five consecutive years, named a “Champion” in Info-Tech Research Group’s 2014-15 SIEM Vendor Landscape report and ranked Best-in-Class (No. 1) in DCIG’s 2014-15 SIEM Appliance Buyer’s Guide. In addition, LogRhythm has received Frost & Sullivan’s SIEM Global Market Penetration Leadership Award and been named a Top Workplace by the Denver Post. LogRhythm is headquartered in Boulder, Colorado, with operations throughout North and South America, Europe and the Asia Pacific region.

LogRhythm Seminars

  • Discover hidden threats with User Behaviour Analytics (UBA) Tom Salmon  |   LogRhythm   |   Wed 5th Oct 12:20 - 12:50

    Cyber Attack, Remediation & Mitigation Theatre

    Wed 5th Oct 12:20 to 12:50

    Discover hidden threats with User Behaviour Analytics (UBA)

    Cyber criminals seek technology attack surfaces to get behind the firewall, onto the network and into your systems. However, they are equally if not more attuned to seeking vulnerabilities in users. Even if they are not acting maliciously, network users can put your business at risk simply by bypassing policies and procedures while doing their job.
    Users can do great damage - their abnormal behaviour is notoriously difficult to detect. So how much at risk is your business if you can't identify user threat activity?
    It's vital that an organisation has visibility of when a user behaves in an erratic and unusual manner to ensure any business risk can be mitigated quickly and effectively.
    Many companies are confronting this challenge with User Behaviour Analytics (UBA), which can help you detect and respond to user threats, such as when:

    · An insider turns against your organisation
    · A cyber-attacker steals a user’s credentials
    · An administrator abuses account privileges
    Join us and see how UBA can be a powerful weapon in your Security arsenal in order to have an effective user threat detection program.


    Photo Speaker Name Profile
    Tom Salmon Tom Salmon View Profile

White papers

LogRhythm Security Intelligence Maturity Model CEO Whitepaper
LogRhythm Security Intelligence Maturity Model CEO Whitepaper.pdf 339.13 kB

LogRhythm Security Intelligence Maturity Model CISO Whitepaper
LogRhythm Security Intelligence Maturity Model CISO Whitepaper.pdf 512.75 kB

Social Media



IP EXPO | LinkedIn

The home of IP EXPO Event Series