Wednesday March 6, 2019 0 comments
While LogRhythm NDR benefits all organizations and security teams of any size, it is especially well-suited for those with operational technology (OT) security needs and short-staffed teams, the company said.
“Incident response teams need detailed network information and key forensics insight to investigate incidents, yet they may not have network forensics expertise, or the time needed for detailed forensic investigation and packet analysis,” said Jon Oltsik, senior principal analyst at ESG.
“A solution like LogRhythm NDR is a welcome addition to the marketplace, because it can help provide the automation that security teams need to detect and respond to threats earlier in their lifecycle.
“As a result, LogRhythm NDR can help eliminate time-consuming manual tasks, while allowing security analysts to focus on the higher-value activities that require direct human touch.”
This automation is especially important in today’s world, LogRhythm said, where security teams are notoriously understaffed. According to a new study by (ISC)2, the world’s largest nonprofit association of certified cybersecurity professionals, there is a dramatic deficit of almost three million cybersecurity jobs globally, putting organizations at greater risk of cyberattack.
“Security teams are often understaffed, overwhelmed by false positives and lack the necessary network visibility and analytics required to detect and respond to advanced network-borne threats,” said Chris Petersen, LogRhythm co-founder and chief product and technology officer.
“With the introduction of LogRhythm NDR, security teams now have the necessary visibility, analytics and automation to not only successfully surface hard-to-see threats, but to also do so faster and more accurately no matter how resource-constrained they might be.”
LogRhythm said NDR uniquely combines Layer 7 network traffic monitoring, full packet capture, multi-method threat detection, and workflow automation. This highly integrated offering empowers organizations to detect and respond to a wide variety of network-borne threats that might otherwise fly under the radar.
LogRhythm NDR leverages appliance and software sensors that deliver deep network traffic visibility into data centers, OT infrastructure, remote sites, and public/private cloud. Capabilities include:
- Application identification and deep meta-data extraction of encrypted and unencrypted network sessions
- Recognition of 19 Supervisory Control and Data Acquisition (SCADA) protocols
- Always-on or selective, full packet capture, enabling full-fidelity forensic analysis
LogRhythm said NDR is the most comprehensive offering in a rapidly growing market segment.
“The combination of real-time monitoring and full-response capabilities have been critical for enabling us to detect and respond to threats quickly and efficiently,” said Dan Ney, Baker Tilly enterprise technology security and risk lead.
“We’re confident in LogRhythm NDR’s ability to help other security teams realize the same time to value that LogRhythm has allowed us to realize.”