Your Search returned 72 results from our White Paper Library

Logrhythm

Security

Definitive Guide to SOAR

This eGuide shows businesses how they can stop security threats faster with security orchestration, automation, and response (SOAR).

Logrhythm

Security

Using MITRE ATT&CK in Threat Hunting and Detection

This white paper introduces ATT&CK and related tools based on ATT&CK, it also discusses how to make practical use of ATT&CK with a focus on threat hunting and detection....

Logrhythm

Security

Security Operations Maturity Model

This white paper shows businesses how they can assess and improve the maturity of their security operations by utilising threat lifecycle management solutions.

Logrhythm

Security

Definitive Guide to SOAR

This eGuide shows businesses how they can stop security threats faster with security orchestration, automation, and response (SOAR).

Logrhythm

Security

Assurity Elevates Security Maturity and Achieves Compliance with LogRhythm’s Embedded Orchestration and Automation

This case study examines how Assurity were able to mature their security and achieve compliance by using LogRhythm’s NextGen SIEM Platform.

Logrhythm

Security

Optimise the Efficiency of Your SOC with Built-In Playbooks

This video looks at how businesses can improve the efficiency of their security operations centre using LogRhythm’s NextGen SIEM platform.

Logrhythm

Security

Applying An Effective UEBA Solution – Experiences from the Trenches Webcast

Security mature organizations are increasingly utilizing user behavior analytics (UEBA) to quickly surface, prioritize and respond to anomalous or alarming user...

Logrhythm

Security

Defeating Threats Through User Data: Applying UEBA to Protect Your Environment

For many companies, their users are often the cause of cyberthreats, whether maliciously or by accident. In fact, 69% of organizations have recently reported an...

Logrhythm

Cloud Computing

Managing User Risk: A Review of LogRhythm CloudAI for User and Entity Behavior Analytics

To facilitate the effective detection of security threats, businesses must accommodate larger data sets and perform more advanced forms of data analysis. Because...

Logrhythm%c2%aelogo securityintelligence color forlightbackgrounds hex

Security

2018 Cybersecurity: Perceptions and Practices

As cybersecurity concerns continue to increase in velocity and frequency, it can be helpful to hear directly from security leaders within the tech industry. First-hand...

Previous1345678

Poll

Do you think your smartphone is making you a workaholic?