LogRhythm

by Mallory Mallory No Comments

LogRhythm to Offer Industry’s First Unlimited Data Plan for SIEM

 

 

 

EVANSVILLE, IN | Wednesday, October 2nd, 2019 – Keller Schroeder is now offering an unlimited data plan for SIEM through its partnership with LogRhythm. While other vendors in the industry have previously claimed to support unlimited data plans, those promises have always come with a catch. LogRhythm is changing that with the industry’s first true unlimited data plan for its NextGen SIEM platform.

The reality is that big data volumes are growing exponentially. To stay within budget, CISOs are being forced to make difficult and risky decisions about which data they choose to protect—and not protect. LogRhythm introduced its unlimited data plan precisely because it believes CISOs shouldn’t be forced to restrict the amount of the data and what they protect. Not only does LogRhythm’s unlimited data plan allow CISOs to free themselves of these restrictions, it also lets them do so at a predictable price point, thus greatly lowering the risk of unprotected data. With the LogRhythm True Unlimited Data Plan, customers can have peace of mind knowing that they can add additional data sources to achieve complete visibility, implement new use cases, and scale as they grow — no tiers, fine print, or contract surprises.

“With unprotected data responsible for 3.2 billion breached records annually, LogRhythm’s model means our customers no longer have to sacrifice security because of cost,” said Corey Ainscough. “The unlimited data plan for LogRhythm’s XDR Stack makes it easy for organizations to get the appropriate level of security they need at a single consistent cost, no matter how much data they have in their environment. This offering represents a tremendous step forward in the fight against cyber threats.” Organizations that select LogRhythm will pay one price—and only one price—for their entire contract, enabling them to protect all their data, users, and systems, even if those numbers increase throughout the year, and even if their deployment architecture changes.

“2019 is set to be the worst year ever for data breaches, but how many of this year’s incidents could have been prevented if organizations had the ability to ingest and protect all of their data?” said Mark Logan, CEO, LogRhythm. “That’s why we created the industry’s first truly unlimited data plan for SIEM. With LogRhythm, CISOs no longer have to sacrifice security because of cost. Instead, they can now monitor and protect all their data while still staying well within their budget.”

The LogRhythm NextGen SIEM Platform combines patented machine-based analytics, user and entity behavior analytics (UEBA), network detection and response (NDR), and security orchestration, automation, and response (SOAR) in a single, unified architecture, delivered from the cloud or as an on-prem solution. The platform strengthens the maturity of security operations by better aligning a customer’s technology, team, and processes.

About LogRhythm
LogRhythm is a world leader in NextGen SIEM, empowering thousands of enterprises on six continents to measurably reduce cyber and operational risk by rapidly detecting, responding to and neutralizing damaging cyberthreats. The LogRhythm NextGen SIEM Platform combines advanced security analytics; user and entity behavior analytics (UEBA); network detection and response (NDR); and security orchestration, automation, and response (SOAR) in a single end-to-end solution. LogRhythm’s technology serves as the foundation for the world’s most modern enterprise security operations centers (SOCs), helping customers successfully secure their cloud, physical, and virtual infrastructures for both IT and OT environments. Built for security professionals by security professionals, the LogRhythm NextGen SIEM Platform has won countless customer and industry accolades. For more information, visit logrhythm.com.

If you have any further questions, please reach out to Corey Ainscough.

Corey Ainscough- Keller Schroeder Leadership Team Corey Ainscough
Director, Information Security
(812) 474-6825
cainscough@kellerschroeder.com

by Carissa Carissa No Comments

Top 4 Ways Hackers Will Attack Your Network

Know Before Think Before You ClickMost small and midsize business (SMB) owners exist in a bubble of blissful ignorance. They focus on the day-to-day operations of their organization, driving growth, facilitating hiring and guiding marketing, without a single thought given to the security of the computer networks these processes depend on. After all, they’re just the little guy – why would hackers go to the trouble of penetrating their systems for the minuscule amount of data they store? And eventually, often after years of smooth sailing through calm seas, they get hacked, fork out thousands of dollars to malicious hackers and collapse beneath the weight of their own shortsightedness.

The facts don’t lie. According to Verizon’s annual Data Breach Investigations Report, a full 71% of cyber-attacks are aimed squarely at SMBs. And while it’s unclear exactly how many of these attacks are actually successful, with the sad state of most small businesses’ security protocols, it’s a safe bet that a good chunk of the attacks make it through. But why? As Tina Manzer writes for Educational Dealer, “Size becomes less of an issue than the security network … While larger enterprises typically have more data to steal, small businesses have less secure networks.” As a result, hackers can hook up automated strikes to lift data from thousands of small businesses at a time – the hit rate is that high.

Today, trusting the security of your company to your son-in-law, who assures you he “knows about computers,” isn’t enough. It takes constant vigilance, professional attention and, most of all, knowledge. Start here with the four most common ways hackers infiltrate hapless small businesses.

PHISHING E-MAILS

An employee receives an e-mail directly from your company’s billing company, urging them to fill out some “required” information before their paycheck can be finalized. Included in the very professional-looking e-mail is a link your employee needs to click to complete the process. But when they click the link, they aren’t redirected anywhere. Instead, a host of vicious malware floods their system, spreading to the entirety of your business network within seconds, and locks everyone out of their most precious data. In return, the hackers want thousands of dollars or they’ll delete everything.

It’s one of the oldest tricks in the hacker toolbox, but today it’s easier than ever for an attacker to gather key information and make a phishing e-mail look exactly like every other run-of-the-mill e-mail you receive each day. Train your employees to recognize these sneaky tactics, and put in safeguards in case someone messes up and clicks the malicious link.

BAD PASSWORDS

According to Inc.com contributing editor John Brandon, “With a $300 graphics card, a hacker can run 420 billion simple, lowercase, eight-character password combinations a minute.” What’s more, he says, “80% of cyber-attacks involve weak passwords,” yet despite this fact, “55% of people use one password for all logins.”

As a manager, you should be bothered by these statistics. There’s simply no excuse for using an easy-to-crack password, for you or your team. Instead, it’s a good idea to make a password out of four random common words, splicing in a few special characters for good measure. To check the strength of your password, type it into HowSecureIsMyPassword.net before you make it official.

MALWARE

As described above, malware is often delivered through a shady phishing e-mail, but it’s not the only way it can wreak havoc on your system. An infected website (such as those you visit when you misspell sites like Facebook.com, a technique called “typosquatting”), a USB drive loaded with viruses or even an application can bring vicious software into your world without you even realizing it. In the past, an antivirus software was all that you needed. These days, it’s likely that you need a combination of software systems to combat these threats. These tools are not typically very expensive to put in place, especially considering the security holes they plug in your network.

SOCIAL ENGINEERING

As fallible as computers may be, they’ve got nothing on people. Sometimes hackers don’t need to touch a keyboard at all to break through your defenses: they can simply masquerade as you to a support team in order to get the team to activate a password reset. It’s easier than you think, and requires carefully watching what information you put on the Internet – don’t put the answers to your security questions out there for all to see.

We’ve outlined some of the simplest ways to defend yourself against these shady techniques, but honestly, the best way is to bring on a company that constantly keeps your system updated with the most cutting-edge security, is ready at a moment’s notice to protect you in a crisis, and can train your end-users. Hackers are going to come for you, but if you’ve done everything you can to prepare, your business will be safe. To discuss how Keller Schroeder can help you develop a comprehensive strategy to protect your business, contact your Keller Schroeder Account Manager today.

by Carissa Carissa No Comments

TechSpot Recap: Targeting Security

 Carissa Eatmon – [Marketing & Communications Coordinator]

Our TechSpot learning series continued with a BANG in Evansville on Thursday, June 15th. In partnership with LogRhythm and Cisco, our Sales & Marketing Team hosted another great event with our clients as we focused on “Targeting Security.”

Targeting Security At Uncle Rudy's Gina MinetteThis event took place at Uncle Rudy’s Indoor Firing Range and not only offered our clients the opportunity to hear valuable information, but also the chance to show off their shooting skills. Whether the client was a complete novice or highly experienced, the staff at Uncle Rudy’s catered to each individual. Congratulations to John Atkison from Deaconess Health System and Bob Moss from Big Rivers Electric Corporation for being our top 2 shooters!

In addition to the fun, we were fortunTargeting Security At Uncle Rudy's Kelley Spurrierate to have Cisco & LogRhythm joining us to discuss important security information. LogRhythm reps were on hand to speak about using their solution to reduce the time to detect and respond to threats and LogRhythm’s Network Monitor. Cisco joined us remotely to detail their FirePower security solution and how you can use it to find and track malware. 

We look forward to hosting more of these types of events in the future! To view a full list of upcoming Keller Schroeder events, including seminars and webinars, visit the “Events” section on our home page. You can also reach out to your Account Manager to be added to our communications list.

 

by Carissa Carissa No Comments

LogRhythm 7 – Next-Gen Security Threat Detection & Response

Brad Mathis[Senior Consultant, Information Security]LogRhythm Platform

 

LogRhythm, The Security Intelligence Company, recently unveiled LogRhythm 7, a major upgrade to their security intelligence and analytics platform.  With new and enhanced features and capabilities, LogRhythm continues to be a leader in the SIEM (Security Information & Event Management) space.

 

Chris Peterson, senior vice-president of products, CTO and co-founder at LogRhythm states, “The sophistication and resolve of today’s cyber adversaries continue to rise, as does the number of successful intrusions.” “The innovations in LogRhythm 7 empower IT security teams to detect, respond to and neutralize cyber intruders faster and more efficiently.”

 

LogRhythm DashboardWith LogRhythm’s HTML5 based dashboard, advanced security analytics and SmartResponse automation capabilities, and the ability to perform full-text unstructured search with the introduction of Elasticsearch, it is no surprise LogRhythm has been positioned as a Leader in Gartner’s SIEM Magic Quadrant report for four consecutive years.  LogRhythm scored highest in Gartner’s Critical Capabilities for Security Information and Event Management.

 

New features with LogRhythm 7 include:

  • Elasticsearch based indexing for expedited investigations
  • Architectural advancements for up to a 300 percent improvement in data indexing performance on a per-node basis
  • Real-time threat activity map
  • New Risk-Based scoring algorithms
  • Incident Response advancements
  • Extensions to the SmartResponse Automation framework, such as the ability to prevent malware outbreak with endpoint shutdown

For more information or to schedule a LogRhythm demonstration, contact your Keller Schroeder Account Manager.

by Carissa Carissa No Comments

2015 Client Appreciation Event : All-Star Bash

Allstar Bash
Carissa Montgomery
– Marketing & Communications Coordinator

On October 2nd, 2015, Keller Schroeder hosted our annual Client Appreciation Event. This year, we held an All-Star Bash to celebrate the TRUE MVPs of our organization. It was a day filled with delicious food from Marx Barbecue and Pacetre, plus fellowship and a lot of fun.

Full SwingGirls

Along with our vendor partners, we also gave attendees the opportunity to win great prizes – including our grand prize – a set of 4 Indianapolis Colts Tickets.

Perhaps our favorite aspect of this event every year is the opportunity we give our clients and employee-owners to give back to the community. The continued generosity shown at this event never ceases to amaze us. This year, the Boys & Girls Club of Evansville was chosen to receive our give back donations. We successfully collected over 2 truckloads of supplies for the organization – things like cleaning supplies, healthy snacks, copy paper, and supplies for the care of their sports field.

Giving BackBasketball

Thank you so much to all of our employee-owners for their hard work in making this event a reality every year. Thank you to our vendor partners for both their resources and for joining us. Most importantly, we owe a huge debt of gratitude to our clients for their continued loyalty and support.

Group ShotRay

Be sure to mark your calendars for next year’s Client Appreciation Event! It’s always the first Friday in October – October 7th in 2016!

 

Top