• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • LogRhythm Goes AI with Security Threat Detection Engine

    February 22, 2011 Alex Woodie

    LogRhythm this month unveiled a new security threat detection engine for its security information and event management (SIEM) software. With its advanced pattern-matching capabilities, LogRhythm says its new Advanced Intelligence (AI) engine will help users identify complex and blended security attack methods faster than before.

    Like most SIEM systems, the LogRhythm product does double-duty. On the one hand, it tracks application and server logs for compliance purposes. And as a SIEM product, it gathers and correlates information about events that may pose a security risk.

    The Boulder, Colorado, company says its new AI Engine goes beyond simple correlation to provide advanced pattern recognition. Instead of requiring an administrator to scroll through a pre-filtered subset of security events or write scripts to narrow the possible intrusion methods, the AI Engine brings more intelligence to bear on the problem by identifying statistical deviations and behavioral abnormalities occurring in real time or against archived data.

    LogRhythm says the new AI Engine will be particularly adept at spotting sophisticated intrusions that can be difficult to detect using traditional signature-based security solutions. These types of intrusions often involve custom malware and are used to perpetrate zero-day attacks, so-called advanced persistent threats (APTs) fraud, and inside attacks that might otherwise go unnoticed.

    The AI Engine is an optional component of the LogRhythm product. The company has taken pains to make sure it’s easy for customers to use. Users can get started quickly with a setup wizard that offers some basic customization of pre-defined rules. Beyond that, users can further refine the rules by working within a “building block workflow palette” that includes common events written in plain English and 50 pre-defined metadata fields, the company says.

    “Until now, building correlation rules in SIEM products has effectively required a PhD in scripting languages and a very precise understanding of the activity, condition, or exception you were looking for,” LogRhythm co-founder and CTO Chris Petersen states in a press release. “We designed the LogRhythm AI Engine to harness hybrid analysis techniques applied across all log data to deliver next generation pattern recognition capabilities, including complex correlation.”

    LogRhythm has supported IBM i source data since August 2008, when the company partnered with PowerTech to gain access to the platform and its rich treasure-trove of log data. LogRhythm uses PowerTech’s Interact product to translate IBM i-specific messages and queues from the security audit journal and the system and system operator message queues into the industry standard Syslog format that can be digested by SIEMs.

    RELATED STORIES

    Security Vendors Take Aim at HITECH Act for Healthcare IT Overhaul

    LogRhythm Debuts New ‘Intelligent’ IT Search

    LogRhythm Partners with PowerTech to Support i OS Log Data



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    ARCAD Software

    DevSecOps & Peer Review – The Power of Automation

    In today’s fast-paced development environments, security can no longer be an afterthought. This session will explore how DevSecOps brings security into every phase of the DevOps lifecycle—early, consistently, and effectively.

    In this session, you’ll discover:

    • What DevSecOps is and why it matters?
    • Learn how to formalize your security concerns into a repeatable process
    • Discover the power of automation through pull requests, approval workflows, segregation of duties, peer review, and more—ensuring your data and production environments are protected without slowing down delivery.

    Whether you’re just getting started or looking to enhance your practices, this session will provide actionable insights to strengthen your security posture through automation and team alignment to bring consistency to the process.

    Watch Now!

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    PowerTech:  FREE Webinar! An Auditor's View: Assessing IBM i Security Risks in 15 minutes. March 2
    RJS Software Systems:  Integrate RPG, SQL and Excel for maximum ROI with RPG2SQL Integrator
    Northeast User Groups Conference:  21th Annual Conference, April 11 - 13, Framingham, MA

    IT Jungle Store Top Book Picks

    BACK IN STOCK: Easy Steps to Internet Programming for System i: List Price, $49.95

    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The iSeries Pocket Database Guide: List Price, $59
    The iSeries Pocket SQL Guide: List Price, $59
    The iSeries Pocket WebFacing Primer: List Price, $39
    Migrating to WebSphere Express for iSeries: List Price, $49
    Getting Started with WebSphere Express for iSeries: List Price, $49
    The All-Everything Operating System: List Price, $35
    The Best Joomla! Tutorial Ever!: List Price, $19.95

    Novell Shareholders Vote Yes for $2.2 Billion Attachmate Acquisition Secure DB2 for i Database Server Access by IP Address

    Leave a Reply Cancel reply

Volume 11, Number 7 -- February 22, 2011
THIS ISSUE SPONSORED BY:

Help/Systems
PowerTech
Maxava
ASNA
RJS Software Systems

Table of Contents

  • Infor Has High Hopes for New S&OP Application
  • At mindSHIFT, IBM i Hosting Options Abound
  • nuBridges Unveils TaaS, a Hosted Data Tokenization Service
  • Qualys Launches Open Source Web App Firewall Project
  • IBM Delivers Super Fast IPS
  • Attunity Signs OEM Deal with Microsoft for SSIS
  • LogRhythm Goes AI with Security Threat Detection Engine
  • QlikView Looks Inside the Criminal Mind
  • IBM Updates LTO Storage Gear
  • Lawson Unveils Cloud-Based PLM for Clothes Makers

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • What You Will Find In IBM i 7.6 TR1 and IBM i 7.5 TR7
  • Three Things For IBM i Shops To Consider About DevSecOps
  • Big Blue Converges IBM i RPG And System Z COBOL Code Assistants Into “Project Bob”
  • As I See It: Retirement Challenges
  • IBM i PTF Guide, Volume 27, Number 41
  • Stacking Up Power11 Entry Server Performance To Older Iron
  • Big Blue Boosts IBM i Support In Instana, Adds Tracing
  • It Is Time To Tell Us What You Are Thinking And Doing
  • IBM i PTF Guide, Volume 27, Number 40
  • The GenAI Boom Is Only Slightly Louder Than The Dot Com Boom

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle