|By Business Wire||
|July 21, 2014 08:00 PM EDT||
LogRhythm, The Security Intelligence Company, today announced a new set of product features specifically designed to quickly help identify early indicators of cyber attacks on the payment processing chains of retail organizations. Powered by LogRhythm’s Security Intelligence Platform, the new Retail Cyber Crime Security Analytics Suite provides a complete forensic view into anomalous and malicious activity so that attacks can be quickly spotted and remediated.
“As a growing restaurant chain with nearly 400 locations, PCI (Payment Card Industry) compliance is a priority for us, but obviously the overarching concern and foremost objective is protecting our customer’s data,” said Corey Kline, IT director at LogRhythm customer Noodles & Company. “LogRhythm’s Retail Cyber Crime Security Analytics Suite provides us with the in-depth and enhanced insight needed into our point-of-sale (POS) endpoints.”
The Retail Cyber Crime Security Analytics Suite correlates information about POS endpoints, payment processors, back-office systems and networks—systems that have specific purposes and should behave in predictable ways. LogRhythm’s patented machine analytics technology, the AI Engine, spots activity deviant from normal behavior in real time.
“As an independent QSA (Qualified Security Assessor), Coalfire regularly works with retailers concerned about potential data breaches, and we encourage all of our retail clients to go beyond simply complying with PCI mandates,” said Rick Dakin, chief executive officer and co-founder of Coalfire Systems, Inc. “LogRhythm’s Retail Cyber Crime Security Analytics Suite offers much needed visibility and response capabilities beyond what PCI compliance alone can provide, and it helps retailers shore up their defenses amidst an increasingly daunting cyber threat environment.”
“The Target and P.F. Chang’s data breaches are on a long and growing list of retail industry breaches that might have been detected sooner—or prevented altogether—with better visibility of early threat indicators that were material variances from normal activity,” said David Pack, director of LogRhythm Labs. “The Retail Cyber Crime Security Analytics Suite removes a number of significant visibility gaps for retailers, thereby enabling them to detect and respond sooner to advanced threats.”
Dave Pack discusses the new product features in an online video: https://www.youtube.com/watch?v=8PeAQQT1YwA&feature=youtu.be
The Retail Cyber Crime Security Analytics Suite is available to retailers immediately as part of LogRhythm’s award-winning Security Intelligence Platform.
LogRhythm is the largest and fastest growing independent security intelligence company in the world. The company’s patented and award-winning Security Intelligence Platform, unifying SIEM, log management, network forensics, host forensics and advanced security analytics, empowers organizations around the globe to detect and respond to breaches and the most sophisticated cyber threats of today, faster and with greater accuracy than ever before. LogRhythm also provides unparalleled compliance automation and assurance as well as IT intelligence to Global 2000 organizations, government agencies and mid-sized businesses worldwide.
LogRhythm has been consistently recognized as a market leader, including being positioned as a Leader in Gartner’s SIEM Magic Quadrant report for three years running, being named a “Champion” in Info-Tech Research Group’s 2014-15 SIEM Vendor Landscape report, being ranked Best-in-Class (No. 1) in DCIG’s 2014-15 SIEM Appliance Buyer’s Guide, and receiving Frost & Sullivan’s SIEM Global Market Penetration Leadership Award. It has also been named a Top Workplace by the Denver Post. LogRhythm is headquartered in Boulder, Colo., with operations throughout North and South America, Europe and the Asia Pacific region.
Jul. 3, 2015 07:00 PM EDT Reads: 441
IT data is typically silo'd by the various tools in place. Unifying all the log, metric and event data in one analytics platform stops finger pointing and provides the end-to-end correlation. Logs, metrics and custom event data can be joined to tell the holistic story of your software and operations. For example, users can correlate code deploys to system performance to application error codes. In his session at DevOps Summit, Michael Demmer, VP of Engineering at Jut, will discuss how this can...
Jul. 3, 2015 07:00 PM EDT Reads: 710
Jul. 3, 2015 06:30 PM EDT Reads: 1,207
Jul. 3, 2015 05:30 PM EDT Reads: 466
Jul. 3, 2015 05:00 PM EDT Reads: 906
Jul. 3, 2015 04:45 PM EDT Reads: 825
Jul. 3, 2015 04:15 PM EDT Reads: 603
Jul. 3, 2015 04:15 PM EDT Reads: 409
Jul. 3, 2015 02:45 PM EDT Reads: 813
Jul. 3, 2015 02:45 PM EDT Reads: 909
Jul. 3, 2015 02:00 PM EDT Reads: 2,177
Jul. 3, 2015 02:00 PM EDT Reads: 2,135
Jul. 3, 2015 01:45 PM EDT Reads: 554
Jul. 3, 2015 01:30 PM EDT Reads: 1,161
Jul. 3, 2015 12:30 PM EDT Reads: 1,279