LogRhythm Whitepapers


Sort by: Date | Company | Title


Employing machine learning in a security environment
By LogRhythm | 9/7/2018

No matter where you look in the security world today, you’ll see the terms machine learning and artificial intelligence (AI). There’s been a great deal of interest in machine learning and AI as security vendors and their customers look for better ways to improve their security posture and fight against advancing cyberattacks. Machine learning and AI offer breakthroughs in solving problems in many other areas of our lives, so it’s only natural to try to use them to make similar breakthroughs in the field of security

Download this now


Your Guide to Detecting and Responding to Threat Fast- Even if you dont have a 24x7 SOC
By LogRhythm | 9/7/2018

The paper first explains the basics of the Cyber Attack Lifecycle and the need to address it through the Threat Lifecycle Management framework. Next, the paper explains the basics of SOCs, providing details of what SOCs mean in terms of people, processes, and technology. Finally, the paper walks you through a methodology for building a SOC with limited resources, focusing on tactics to make your rollout smooth and successful.

Download this now


Speed and Scalability Matter: Review of LogRhythm 7 SIEM and Analytics Platform
By LogRhythm | 28/6/2018

This SANS product review will focus on the LogRhythm 7.2 Threat Lifecycle Management Platform and will focus on specifically:

• Ease of use

• Scalability and performance across large, distributed data sets

• Host-based policies and configuration capabilities

• Rapid searching, analysis and incident correlation

• Case management tools that can help security operations teams operate more effectively

Download this now


The General Data Protection Regulation (GDPR)
By LogRhythm | 28/6/2018

In this paper, we’ll look at some of the key principles of the GDPR, what those principles mean for security and compliance teams and how you can prepare your organisation for the 2018 deadline. Make no mistake: The GDPR will require organisations that collect and process EU citizen data to undertake major operational reforms. The GDPR is a huge body of legislation, so this paper will focus on some specific areas where security, communications and compliance specialists will need to prepare.

Download this now


2018 Cybersecurity: Perceptions & Practices
By LogRhythm | 28/6/2018

As uncertainties — cybersecurity and otherwise — swim around us with increased velocity and frequency, it’s always helpful to hear directly from security leaders in the trenches of our industry. These first-hand accounts have the unique ability to shed light on the challenges security professionals and their teams face nearly every day of their work lives. That’s precisely what this “2018 Cybersecurity: Perceptions & Practices” benchmark survey accomplishes. It provides insights into the state of the cybersecurity practice of 751 mid- to large-sized organisations in the United States, United Kingdom, and AsiaPacific regions.

Download this now


The Ransomware Threat
By LogRhythm | 14/9/2017

A guide to detecting an attack before it’s too late NOTPETYA SPECIAL EDITION

Download this now


How To Build A SOC With Limited Resources
By LogRhythm | 14/9/2017

Your Guide to Detecting and Responding to Threats Fast—Even if You Don’t Have a 24x7 SOC

Download this now


The Ransomware Threat: A guide to detecting an attack before it’s too late
By LogRhythm | 2/11/2016

Is your organisation prepared for a ransomware attack? Successfully defending your organisation against such an attack takes preparation and an understanding of what to look for if an attack begins. This guide shares the expert knowledge that researchers at LogRhythm have gathered about how ransomware attacks begin, how they progress through your endpoints and network, and what you can do to prevent them, or at least shut them down, to avoid serious repercussions.

Download this now


SANS 2015 Analytics and Intelligence Survey
By LogRhythm | 2/11/2016

In 2014, security professionals who took the SANS Analytics and Intelligence Survey1 told SANS that they were struggling with visibility into their environments. During that survey period, few organisations were actively leveraging analytics and intelligence tools and services, and even fewer teams had highly or fully automated processes in place for analysing data and producing effective detection and response strategies. Due to their ineffective programs, 24% of respondents also didn’t know whether they had been hacked or not.

Download this now


SIEM’s Total Cost of Ownership – Key Considerations
By LogRhythm | 2/11/2016

We believe that organisations that take a holistic view on SIEM platform capabilities and the SIEM’s impact on people and process are best positioned to choose a SIEM platform that delivers both resiliency on the business protection mission and certainty in total cost. To that end, we describe in this paper factors to include in assessing SIEM’s total cost of ownership.

Download this now
[]