• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • LogRhythm Goes Multi-Dimensional in Security Analysis

    October 23, 2012 Alex Woodie

    Cyber criminals are getting more clever by the day, and so can the good guys with products like the new SIEM (security information and event management) solution unveiled by LogRhythm last week. The Boulder, Colorado, company claims that its solution is the first multi-dimensional security database capable of tackling “big data”-sized troves of information.

    LogRhythm’s SIEM product, which is also called LogRhythm, gathers security-related data from many sources (including IBM i logs), and mixes it in an attempt to tease real and actionable information out of the noise. Like other products in the SIEM class, LogRhythm has sought a competitive advantage by attempting to simplify the analysis process and make it usable by average humans, but without dumbing down the results.

    LogRhythm’s latest attempt involves a multi-dimensional approach to data categorization. Multi-dimensional databases have typically been used by large organizations looking to find patterns hidden across large amounts of data and stretches of time. LogRhythm claims that it is the first company using multi-dimensional analysis (which is sometimes called online analytical processing, or OLAP) in the security venue.

    The company says the multi-dimensional approach to SIEM is necessary due to the difficulties of establishing a baseline of normal user activity in an organization using a manual approach. In order to get a truly accurate view of baseline activities, LogRhythm says, organizations must monitor all the data collected by the SIEM, rather than a small slice of it. The small slice approach is ineffective because it won’t accurately reflect actual user behaviors and, therefore, will provide cover for cyber criminals to exploit by masking their activities as “normal.”

    In short, the cyber criminals have raised their game to the point where security personnel need to bust out the big guns in response. The OLAP approach offers the unique capability to not only analyze large amounts of data (i.e., “big data”), but also to detect small patterns occurring over stretches of time.

    “Today’s cyber threats are more advanced and, in many cases, more stealthy than ever before. Organizations need to understand what ‘normal’ behavior is across multiple dimensions of their electronic enterprise so they can detect abnormal activity indicative of a threat or breach,” states Chris Petersen, CTO and cofounder of LogRhythm in a press release. “Adding the multi-dimensional behavioral analytics layer to our SIEM 2.0 platform delivers on that need and, once again, sets a new standard for advanced threat and breach detection.”

    RELATED STORIES

    LogRhythm Goes AI with Security Threat Detection Engine

    Security Vendors Take Aim at HITECH Act for Healthcare IT Overhaul

    LogRhythm Debuts New ‘Intelligent’ IT Search

    LogRhythm Partners with PowerTech to Support i OS Log Data



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    ARCAD Software

    [Webinar] Trends for 2026: ARCAD Software’s strategic vision

    Between the acceleration of artificial intelligence, constant pressure to modernize existing systems, and ever-increasing security requirements, 2026 is shaping up to be a decisive year for legacy platforms.

    At the start of this new year, this webinar offers strategic insight into the future of these critical environments, which are at the heart of information systems.

    Join Philippe Magne, CEO of ARCAD Software, as he shares his analysis of the major trends and structural issues facing organizations:

    • DevSecOps: What are the current trends in DevOps transformation?
    • Generative artificial intelligence: What are the concrete use cases and measurable benefits for application development and maintenance?
    • Critical application security: How to respond to growing and sophisticated threats?
    • Cloud and hybridization: How do legacy applications fit into current cloud strategies?

    Save your seat for March 24 at 11 AM EDT!

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    CLOUDFAX400:  Cloud-based enterprise FAX service for AS/400, System i and Power system users
    Bytware:  Protect your IBM Power Systems from security threats. Download the IFS security bundle!
    ITJ Bookstore:  Bookstore BLOWOUT!! Up to 50% off all titles! Everything must go! Shop NOW

    IT Jungle Store Top Book Picks

    Bookstore Blowout! Up to 50% off all titles!

    The iSeries Express Web Implementer's Guide: Save 50%, Sale Price $29.50
    The iSeries Pocket Database Guide: Save 50%, Sale Price $29.50
    Easy Steps to Internet Programming for the System i: Save 50%, Sale Price $24.97
    The iSeries Pocket WebFacing Primer: Save 50%, Sale Price $19.50
    Migrating to WebSphere Express for iSeries: Save 50%, Sale Price $24.50
    Getting Started with WebSphere Express for iSeries: Save 50%, Sale Price $24.50
    The All-Everything Operating System: Save 50%, Sale Price $17.50
    The Best Joomla! Tutorial Ever!: Save 50%, Sale Price $9.98

    Kisco Sends IBM i Reports to Google Drive Cloud Service Attachmate Excited with Combination of Reflection and Windows 7

    Leave a Reply Cancel reply

Volume 12, Number 30 -- October 23, 2012
THIS ISSUE SPONSORED BY:

Help/Systems
CCSS
HiT Software
Tributary Systems
Sirius Computer Solutions

Table of Contents

  • Raz-Lee Tracks IBM i PTFs, Ships Password Reset Product
  • Single Sign-On Service Cuts Costs, Complexity
  • Lavastorm Adopts R for Better Big Data Understanding
  • QlikTech Adapts In-Memory Analytics for External Big Data
  • SAP Sends HANA to the Cloud
  • Kisco Sends IBM i Reports to Google Drive Cloud Service
  • LogRhythm Goes Multi-Dimensional in Security Analysis
  • Attachmate Excited with Combination of Reflection and Windows 7
  • UK Firm Signs On to Resell looksoftware Modernization Tools
  • UNICOM Nabs Versant for Object-Oriented Databases

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • No Joke: Big Memory And Flash Price Hikes Coming April 1
  • Strategic Topics To Think About For 2026, Part 2
  • Guru: IBM i Job Log Detective Brings Structure To Job Log Analysis In VS Code
  • IBM Launches Hybrid Cloud Backup Product With Cobalt Iron
  • IBM i PTF Guide, Volume 28, Number 10
  • Why You Need To Think About Offsite Data Protection
  • IBM Gets Bob 1.0 Off The Ground
  • You Store The Crown Jewels In A Safe, Not In A Bucket
  • More Power Systems Withdrawals, And Some From Red Hat, Too
  • Price Increases Are Here, Or Pending, And For Sure For Memory

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle