News Feed Item
Bromium and LogRhythm Team Up to Deliver Industry-Leading Security Intelligence
|By Business Wire
|May 19, 2014 09:30 AM EDT
Inc., the pioneer of a new model of endpoint security using
micro-virtualization, and LogRhythm,
the world’s largest and fastest growing independent provider of Security
Intelligence solutions, today announced a technology partnership and
integration between Bromium Live
Attack Visualization and Analysis (LAVA™) and LogRhythm’s
award-winning Security Intelligence platform. The joint solution
allows organizations to automatically isolate and defeat advanced
malware and gather accurate, actionable threat intelligence in real-time.
Through this integration, once Bromium isolates advanced malware, it
sends detailed information about the targeted endpoints and the
infection source to LogRhythm’s Security Intelligence platform in real
time via Bromium LAVA, which works in conjunction with Bromium vSentry
software protecting endpoints throughout an organization. Bromium
vSentry hardware-isolates and defeats advanced, targeted attacks against
endpoint devices without requiring signatures or updates, automatically
discarding malware and reducing the need for timely patching or costly
“With 71% of breaches a result of user devices being targeted, according
to the 2013 Verizon Data Breach Investigations Report, enterprises are
seeking new methods to address threats that break through traditional
perimeter defenses,” said Gaurav Banga, Co-founder & CEO, Bromium, Inc.
“Bromium’s innovative approach to endpoint security is helping
organizations isolate user tasks and defeat these malicious threats.
This relationship with LogRhythm provides our customers with additional
actionable intelligence necessary for automatically removing malware and
closing attackers’ means of entry without unnecessary business
LogRhythm’s Security Intelligence platform identifies and prioritizes
advanced security threats by integrating and correlating real-time
threat information from Bromium LAVA with log, flow, event and other
machine data collected and generated by LogRhythm from across the
network environment. Through the integration, customers can leverage
LogRhythm’s advanced security analytics to model malware behavior based
on Bromium telemetry and leverage those insights to identify other
compromised hosts in their environments.
In addition, LogRhythm’s Security Intelligence platform can take
automated actions based on threats identified with Bromium, such as
adding threat intelligence to internal watch lists or black lists,
disabling active sessions with source IPs known to be bad or
quarantining compromised hosts. The combined solution helps security
operations teams prioritize actions, slash response times and adjust
defenses to counter today’s most severe threats.
“Bromium’s ability to defeat the entire spectrum of known and unknown
malware through hardware isolation and real-time reporting through
vSentry and LAVA yields crucial information LogRhythm customers can now
factor into their ongoing, adaptive cyber defenses,” said Matt Winter,
Vice President of Corporate and Business Development. “Coupling Bromium
LAVA with LogRhythm’s Security Intelligence platform delivers actionable
security intelligence, helping organizations identify threats,
understand which assets and processes represent significant security
risks and reduce response times.”
LogRhythm seamlessly combines next-generation SIEM, log management, file
integrity monitoring and machine analytics, with host and network
forensics, in a unified enterprise-class Security Intelligence platform.
It is designed to address an ever-changing landscape of threats and
challenges, with a full suite of high-performance tools for security,
compliance, and operations. LogRhythm delivers comprehensive, useful and
actionable insight into what is really going on in and around an
enterprise IT environment.
About Bromium, Inc.
Bromium is re-inventing enterprise security with its powerful new
technology, micro-virtualization, which was designed to protect
businesses from advanced malware, while simultaneously empowering users
and delivering unmatched threat intelligence to IT. Unlike traditional
security methods, which rely on complex and ineffective detection
techniques, Bromium protects against malware from the Web, email or USB
devices, by automatically isolating each user-task at the endpoint in a
hardware-isolated micro-VM, preventing theft or damage to any enterprise
resource. Bromium’s technological innovations have earned the company
numerous industry awards including being named as a CNBC Disruptor and a
Gartner Cool Vendor for 2013. Bromium counts a rapidly growing set of
Fortune 500 companies and government agencies as customers, including
NYSE and BlackRock.
LogRhythm is the largest and fastest growing independent security
intelligence company in the world. The company’s patented and
award-winning Security Intelligence Platform, unifying SIEM, log
management, file integrity monitoring, network forensics and host
forensics, empowers organizations around the globe to detect and respond
to breaches and the most sophisticated cyber threats of today, faster
and with greater accuracy than ever before. LogRhythm also provides
unparalleled compliance automation and assurance as well as IT
predictive intelligence to Global 2000 organizations, government
agencies and mid-sized businesses worldwide.
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively.
What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
Sep. 28, 2016 11:30 PM EDT Reads: 2,719
"My role is working with customers, helping them go through this digital transformation. I spend a lot of time talking to banks, big industries, manufacturers working through how they are integrating and transforming their IT platforms and moving them forward," explained William Morrish, General Manager Product Sales at Interoute, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Sep. 28, 2016 11:30 PM EDT Reads: 3,922
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments.
In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbraith, a principal engineer at HPE, discussed how to build a fully functional Kubernetes cluster on a number of virtual machines or bare-metal hosts. Also included will be a brief demonstration of running a Galera M...
Sep. 28, 2016 10:30 PM EDT Reads: 3,050
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
Sep. 28, 2016 09:15 PM EDT Reads: 343
As ridesharing competitors and enhanced services increase, notable changes are occurring in the transportation model. Despite the cost-effective means and flexibility of ridesharing, both drivers and users will need to be aware of the connected environment and how it will impact the ridesharing experience. In his session at @ThingsExpo, Timothy Evavold, Executive Director Automotive at Covisint, will discuss key challenges and solutions to powering a ride sharing and/or multimodal model in the a...
Sep. 28, 2016 08:30 PM EDT Reads: 449
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
Sep. 28, 2016 08:30 PM EDT Reads: 1,712
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises.
The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
Sep. 28, 2016 08:15 PM EDT Reads: 338
IoT is fundamentally transforming the auto industry, turning the vehicle into a hub for connected services, including safety, infotainment and usage-based insurance. Auto manufacturers – and businesses across all verticals – have built an entire ecosystem around the Connected Car, creating new customer touch points and revenue streams.
In his session at @ThingsExpo, Macario Namie, Head of IoT Strategy at Cisco Jasper, will share real-world examples of how IoT transforms the car from a static p...
Sep. 28, 2016 07:00 PM EDT Reads: 1,626
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things.
And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
Sep. 28, 2016 06:45 PM EDT Reads: 4,150
From wearable activity trackers to fantasy e-sports, data and technology are transforming the way athletes train for the game and fans engage with their teams.
In his session at @ThingsExpo, will present key data findings from leading sports organizations San Francisco 49ers, Orlando Magic NBA team. By utilizing data analytics these sports orgs have recognized new revenue streams, doubled its fan base and streamlined costs at its stadiums.
John Paul is the CEO and Founder of VenueNext. Prior ...
Sep. 28, 2016 06:30 PM EDT Reads: 3,117
One of biggest questions about Big Data is “How do we harness all that information for business use quickly and effectively?” Geographic Information Systems (GIS) or spatial technology is about more than making maps, but adding critical context and meaning to data of all types, coming from all different channels – even sensors.
In his session at @ThingsExpo, William (Bill) Meehan, director of utility solutions for Esri, will take a closer look at the current state of spatial technology and ar...
Sep. 28, 2016 06:15 PM EDT Reads: 298
The Internet of Things can drive efficiency for airlines and airports.
In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports.
The session will include a working demo and a technical d...
Sep. 28, 2016 06:00 PM EDT Reads: 1,775
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Sep. 28, 2016 05:15 PM EDT Reads: 255
Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it.
In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap...
Sep. 28, 2016 05:15 PM EDT Reads: 258
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT.
In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
Sep. 28, 2016 05:00 PM EDT Reads: 1,725