+
+

Related Products

  • Blumira
    144 Ratings
    Visit Website
  • ManageEngine Log360
    117 Ratings
    Visit Website
  • Cynet All-in-One Cybersecurity Platform
    388 Ratings
    Visit Website
  • Graylog
    382 Ratings
    Visit Website
  • ConnectWise SIEM
    191 Ratings
    Visit Website
  • Guardz
    96 Ratings
    Visit Website
  • Wiz
    1,059 Ratings
    Visit Website
  • Resolver
    265 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    67 Ratings
    Visit Website
  • Hyperproof
    276 Ratings
    Visit Website

About

We know your job isn’t easy. That’s why we combine log management, machine learning, SOAR, UEBA, and NDR to give you broad visibility across your environment so you can quickly uncover threats and minimize risk. But a mature SOC doesn’t just stop threats. With LogRhythm, you’ll easily baseline your security operations program and track your gains — so you can easily report your successes to your board. Defending your enterprise comes with great responsibility — that’s why we built our NextGen SIEM Platform with you in mind. With intuitive, high-performance analytics and a seamless incident response workflow, protecting your business just got easier. With the LogRhythm XDR Stack, your team has an integrated set of capabilities that deliver on the fundamental mission of your SOC — threat monitoring, threat hunting, threat investigation, and incident response — at a low total cost of ownership.

About

Automate threat analysis of suspected malware and credential phishing threats. Identify and extract associated forensics for accurate and timely detections. Automatic analysis of active threats for contextual insights to accelerate investigations and achieve rapid resolution. Splunk Attack Analyzer automatically performs the actions required to fully execute an attack chain, including clicking and following links, extracting attachments and embedded files, dealing with archives, and much more. The proprietary technology safely executes the intended threat, while providing analysts a consistent, comprehensive view showing the technical details of an attack. When paired together, Splunk Attack Analyzer and Splunk SOAR provide unique, world-class analysis and response capabilities, making the SOC more effective and efficient in responding to current and future threats. Leverage multiple layers of detection techniques across both credential phishing and malware.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT teams

Audience

Companies in search of a tool to detect malicious content and view detailed threat forensics

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Exabeam
Founded: 2012
United States
www.exabeam.com/platform/logrhythm-siem/

Company Information

Cisco
Founded: 1984
United States
www.splunk.com/en_us/products/attack-analyzer.html

Alternatives

Alternatives

Securonix UEBA

Securonix UEBA

Securonix
Alert Logic

Alert Logic

Fortra
Interset

Interset

OpenText Cybersecurity

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

GDPR Compliance Features

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Integrations

Splunk SOAR
Activu
AllSecureX
BackBox
Barracuda PST Enterprise
BeyondTrust Cloud Privilege Broker
Carbon Black EDR
Check Point IPS
Cofense Triage
DatAnswers
Dragos Platform
GTB Technologies DLP
HackGuard
Multi-Domain Security Management
NorthStar Navigator
Optiv Managed XDR
Scuba Database Vulnerability Scanner
Trustwave DbProtect

Integrations

Splunk SOAR
Activu
AllSecureX
BackBox
Barracuda PST Enterprise
BeyondTrust Cloud Privilege Broker
Carbon Black EDR
Check Point IPS
Cofense Triage
DatAnswers
Dragos Platform
GTB Technologies DLP
HackGuard
Multi-Domain Security Management
NorthStar Navigator
Optiv Managed XDR
Scuba Database Vulnerability Scanner
Trustwave DbProtect
Claim LogRhythm SIEM and update features and information
Claim LogRhythm SIEM and update features and information
Claim Splunk Attack Analyzer and update features and information
Claim Splunk Attack Analyzer and update features and information