Home Security VIDEO Interview: LogRhythm talks next-gen security, fighting ransomware and more

At the recent Gartner Security and Risk Management Summit, I caught up with the company’s CMO, Mike Regan, to talk about LogRhythm’s latest security solutions.

LogRhythm. The company proudly boasts that its "security intelligence and analytics platform enables organisations to detect, prioritise and neutralise cyber threats that penetrate the perimeter or originate from within".

The company is also listed as a 2016 Leader in Gartner’s SIEM Magic Quadrant, with LogRhythm naturally billing its SIEM (security information and event management) software as being "next-generation", which is unified with "log management, network and endpoint monitoring, and advanced security analytics’ capabilities".

LogRhythm says that "most organisations are blind to a growing number of advanced threats crossing their network today".

The company points to ransomware, which first appeared "in the late 1980s", having evolved "to become a multi-million dollar business".

We’re told that victims are faced with either paying large sums of money or losing access to crucial data files.

And ransomware authors are clear opportunists, shifting their attention "from targeting individuals to businesses and large organisations".

You can surely guess the reason why – "larger victims have more to lose, and larger resources with which to pay demands", ensuring that if ransomware wasn’t already one of the top security concerns for many organisations today, it surely is now.

After all, you don’t have to be a senior managers to understand the potential disruption ransomware can cause to daily activity and the potentially large financial cost usually will face to overcome it.

So, during the video interview below, Regan discussed the dangers and issues of ransomware in 2016, and what companies are doing to defend against these attacks, as well as "the difficulty in detecting beaconing software and how to harness SIEM for cyberthreat intelligence".

After the video, immediately embedded after this sentence, you’ll find a summary of the questions asked – so please watch and enjoy!

In the interview, I introduced Reganand welcomed him. We then spoke about LogRhythm’s in 2016, and his history in the world of tech.

We then discussed the presentation that LogRhythm gave at Gartner’s Security and Risk Management summit, and the top messages Regan wanted to resonate with the audience.

After that, we talked about SIEM or security information and event management in more detail, and LogRhythm’s position as a leader in Gartner’s Magic Quadrant in this area once again.

We spoke about how the range of threats that LogRhythm protects its customers from, the future of the industry, great advice Regan had received in life and his final video interview message to readers, viewers and his current and future customers.

CDAO SYDNEY TURNS 5 IN 2019

With 50+ Speakers, 300+ senior data and analytics executives, over 3 exciting days you will indulge in all things data and analytics before leaving with strategic takeaways that will catapult you ahead on your journey

· CDAO Sydney is designed to bring together senior executives in data and analytics from progressive organisations
· Improve operations and services
· Future proof your organisation in this rapidly changing technological landscape
· CDAO Sydney 2-4 April 2019
· Don’t miss out! Register Today!
· Want to find out more? Download the Agenda

REGISTER HERE!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Alex Zaharov-Reutt

One of Australia’s best-known technology journalists and consumer tech experts, Alex has appeared in his capacity as technology expert on all of Australia’s free-to-air and pay TV networks on all the major news and current affairs programs, on commercial and public radio, and technology, lifestyle and reality TV shows. Visit Alex at Twitter here.

 

Popular News

 

Telecommunications

 

Sponsored News

 

 

 

 

Connect