Your Search returned 68 results from our White Paper Library

Logrhythm

Security

Assurity Elevates Security Maturity and Achieves Compliance with LogRhythm’s Embedded Orchestration and Automation

This case study examines how Assurity were able to mature their security and achieve compliance by using LogRhythm’s NextGen SIEM Platform.

Logrhythm

Security

Optimise the Efficiency of Your SOC with Built-In Playbooks

This video looks at how businesses can improve the efficiency of their security operations centre using LogRhythm’s NextGen SIEM platform.

Logrhythm

Security

Applying An Effective UEBA Solution – Experiences from the Trenches Webcast

Security mature organizations are increasingly utilizing user behavior analytics (UEBA) to quickly surface, prioritize and respond to anomalous or alarming user...

Logrhythm

Security

Defeating Threats Through User Data: Applying UEBA to Protect Your Environment

For many companies, their users are often the cause of cyberthreats, whether maliciously or by accident. In fact, 69% of organizations have recently reported an...

Logrhythm

Cloud Computing

Managing User Risk: A Review of LogRhythm CloudAI for User and Entity Behavior Analytics

To facilitate the effective detection of security threats, businesses must accommodate larger data sets and perform more advanced forms of data analysis. Because...

Logrhythm%c2%aelogo securityintelligence color forlightbackgrounds hex

Security

2018 Cybersecurity: Perceptions and Practices

As cybersecurity concerns continue to increase in velocity and frequency, it can be helpful to hear directly from security leaders within the tech industry. First-hand...

Logrhythm%c2%aelogo securityintelligence color forlightbackgrounds hex

Security

Employing Machine Learning in a Security Environment

Machine Learning and Artificial Intelligence are the latest buzzwords in cybersecurity spaces and security vendors are continuously looking to develop these capabilities...

Logrhythm logo0126 150x150

Business Management

Employing Machine Learning in a Security Environment

Machine Learning and Artificial Intelligence are the latest buzzwords in cybersecurity spaces and security vendors are continuously looking to develop these capabilities...

Logrhythm logo

Security

Employing Machine Learning in a Security Environment

Machine Learning and Artificial Intelligence are the latest buzzwords in cybersecurity spaces and security vendors are continuously looking to develop these capabilities...

Logrhythm logo0126 150x150

Business Management

How to Build a SOC with Limited Resources

This paper explains the basics of security operations centres (SOC) and outlines the methodology for how to build one using limited resources.

Previous 1 3 4 5 6 7

Recommended for You

Future-proofing the Middle East

Keri Allan looks at the latest trends and technologies

FinancialForce profits from PSA investment

Martin Veitch's inside track on today’s tech trends

Amazon Cloud looms over China: Bezos enters Alibaba home ground

Lewis Page gets down to business across global tech

Poll

Do you think your smartphone is making you a workaholic?