LogRhythm File Integrity Monitoring Software

Are you from this Company ?
LOGRHYTHM
Online
Colorado, USA
2003
$101MN to $500MN
Enterprise
59 Likes
87 Buyers are Negotiating "Group Buyer Deal"

LOGRHYTHM USP

LogRhythm is among the leading security intelligence companies. The company offers a comprehensive portfolio of solutions such as SIEM, log management, and endpoint protection. It also provides its customers compliance and automation solutions. The company offers the FIM solution, which strengthens security and streamlines compliance by protecting critical files in organizations. It also provides alert on improper access of confidential files, malware-related registry changes, and theft of sensitive data. The solution constantly monitors all files and informs about modifications done to sensitive files. Request LOGRHYTHM Pricing to get more information.

Summary

LogRhythm offers an FIM solution that can address over 80 different control requirements of PCI DSS and many core HIPAA requirements, along with other regulatory compliances. With its pre-configured FIM policies, it provides alerts and reports regarding activities done in any file. It enables organizations to focus better on critical security priorities by streamlining compliance objectives. The solution alerts the user during various activities such as file creation, file views, file modifications, file deletion, or changes in group ownership. The solution enables users to assign multiple policies to the same endpoint, thus reducing ongoing management overheads as policies are updated. It can monitor different types of files such as executables, content files, configuration files, point-of-sale (PoS) systems, log and audit files, and web files. LogRhythm offers an FIM solution that can address over 80 different control requirements of PCI DSS and many core HIPAA requirements, along with other regulatory compliances. With its pre-configured FIM policies, it provides alerts and reports regarding activities done in any file. It enables organizations to focus better on critical security priorities by streamlining compliance objectives. The solution alerts the user during various activities such as file creation, file views, file modifications, file deletion, or changes in group ownership. The solution enables users to assign multiple policies to the same endpoint, thus reducing ongoing management overheads as policies are updated. It can monitor different types of files such as executables, content files, configuration files, point-of-sale (PoS) systems, log and audit files, and web files.

Discussions

1
Add Requirements
Added Requirements
“I am looking for a File Integrity Monitoring Software in north America. My budget is $50,000. Looking to buy in 15 days.”
2
Select Vendors
LOGRHYTHM
87 Buyers Negotiating
3
Send Requirement
Get Vendors & Experts Response To Each Requirement Within Hours.
Requirements submitted successfully.
ops! Something went wrong. Please try again later.
Strengths
  • +5
    Agent Based
  • +6
    Agent Less
  • +5
    Professional Services
  • +8
    Hosted / On-Cloud
  • +9
    Hybrid
  • +7
    On-Premise
  • +14
    Linux
  • +5
    Unix
  • +13
    Windows
  • +11
    log management
  • +10
    security configuration management
  • +12
    SIEM
  • +7
    Product Features and Functionality
  • +9
    Product Quality and Reliability
  • +13
    Web application Servers, DNS Servers
  • +6
    Active Directories/DLAP
  • +14
    CSA
  • +5
    Databases
  • +8
    Desktops
  • +8
    FISMA
Weaknesses
  • -11
    Achieve Rapid Time-to-Value
  • -6
    Breadth and Depth of Product Offerings
  • -13
    Differential Pricing and Features to Meet Customer Needs
  • -6
    Scalability
  • -10
    Remote Support
  • -8
    Focus on Product Innovation
  • -5
    New Product Launches
  • -11
    product enhancement
  • -13
    R&D Spend
  • -14
    Product Upgradation
  • -7
    Customer Support
  • -8
    Sales Support
  • -6
    Technical Support
  • -6
    Managed Services
  • -9
    On-Site Support
  • -7
    DIACAP
  • -14
    Network Devices
  • -5
    SANA
  • -9
    Other Support Services
  • -5
    Status of the file before and after the change
LOGRHYTHM Presence in File Integrity Monitoring Software
LogRhythm offers FIM to protect sensitive files in an organization stored at various locations. The solution provides a holistic view of user and file activities and enables users to select files to be monitored for views, modifications, deletions, permission changes, and other activities. The company has adopted the business growth strategies of new product launches and partnerships with strong companies to integrate into the FIM market. For instance, in August 2015, the company released the latest version of its Endpoint Threat Analytics Module, which provided advanced endpoint behavioral anomaly detection, enabling enterprises to identify systems affected by zero-day attacks and advanced malware. The strategy of collaborating with strong companies have helped the company to expand its market reach and deliver advanced security solutions in the market. In June 2017, the company collaborated with Deloitte to support Deloitte’s MSS and other cybersecurity offerings. Similarly, the partnership with Dell EMC in October 2016 helped the company to boost innovation and deliver cutting-edge security solutions for protecting organizations from advanced threats. In March 2016, the company collaborated with Lockheed Martin to share its security intelligence platform and best practices in cybersecurity with Lockheed Martin. These strategies have kept the company a step ahead in the FIM market.
I agree to 360Quadrants Terms of use and privacy policy
Success
info
Error

360Quadrants