sb-au logo
Story image

LogRhythm reports higher-than-anticipated SOAR adoption rate

01 Nov 2018

Security company LogRhythm has announced that a recent survey of its customers found that 33% of them have adopted the company’s embedded security orchestration, automation and response (SOAR) capabilities.

This adoption rate exceeds Gartner’s 2018 estimate that standalone SOAR products have been adopted by less than one percent of security organisations with five or more security professionals, an adoption rate expected to reach only 15% by 2020. The embedded SOAR features in LogRhythm’s security information and event management (SIEM) platform provide security teams with customisable workflows and controls to streamline and accelerate the investigation and neutralisation of qualified cyber threats.

LogRhythm’s end-to-end platform provides insights into how to improve security operations centre (SOC) performance.

With clear, trackable metrics, security leaders can quickly identify and address potential areas for improvement to increase the efficiency and effectiveness of their security operations teams. These performance metrics also enable security leaders to prove and quantify the overall business value driven by their teams. “In cybersecurity, automation and orchestration are becoming more and more important,” says US Acute Care information systems security engineer Rob Haller.

“LogRhythm’s NextGen SIEM Platform’s SmartResponse feature and back-end API connections allow us to automate common actions, while LogRhythm’s case management and playbooks allow us to standardise our investigation methods and responses, adding speed, reliability and consistency to our security practice." Three new features of LogRhythm’s most recent 7.4 software release empower security teams to implement effective, end-to-end security operations workflows: Case Playbooks, SmartResponse automation actions and SOC metrics.

Building on the existing case management and automation framework of LogRhythm’s NextGen SIEM Platform, these new capabilities enable security teams to deliver consistent, measurable results for threat investigation and neutralisation:   ·     Case Playbooks, native within the platform, give resource-strapped security teams the ability to deliver consistent results with greater confidence. Playbooks capture institutional process methodology, senior analyst knowledge and best practices into easy-to-follow procedures for all analysts — even those that are new to the team or less experienced.

Deadlines and due dates are auto-populated to ensure consistent cadences for workflow. Prebuilt Case Playbooks, available out of the box, can be customised. Security teams can also create new playbooks to meet the unique needs of their organisations and integrate them with third-party incident response systems/runbooks. ·       Automated response actions drive best practices and consistency in incident response and can be activated to perform repetitive and mundane tasks, enabling security teams to drive faster and more efficient threat qualification and neutralisation.

LogRhythm’s Community site hosts a growing library of SmartResponse plugins, providing over 100 automated and semi-automated actions, including actions developed by LogRhythm Labs, by the LogRhythm user community and in partnership with LogRhythm’s Technology Alliance Partners.

LogRhythm’s automated contextual lookups enable rapid collection of third-party threat intelligence and other contextual information, expediting threat investigation.

These lookup actions do not require outside script development, allowing analysts of varying skill levels and experience to be immediately effective.

Out-of-the-box automations also include triggering vulnerability scans, conducting URL link analysis, performing memory dumps, resetting passwords, disabling users and adding IPs/FQDNs to blacklists, among others.    ·       SOC metrics improve an organisation’s overall security maturity by delivering actionable information about the speed and efficiency of threat qualification, investigation and response processes.

Security teams can collect and view key metrics from their LogRhythm deployment to better understand their mean time to detect (MTTD) and mean time to respond (MTTR) to threats.

More granular measurements, such as time to qualify (TTQ) and time to investigate (TTI), help analysts understand workflow effectiveness.

These performance metrics help uncover opportunities to improve operational efficiency, including identifying tasks better suited for automation, and enable security leaders to measure and report on the effectiveness of their security programs. 

Story image
Sophos unearths origin of prominent cryptominer
The cryptominer was recently discovered when attackers targeted internet-facing database servers (SQL servers), and the MrbMiner was downloaded and installed.More
Story image
IronNet expands Asia Pacific presence with new strategic partnership
“The combination of M.Tech’s extensive network in Asia Pacific and our unparalleled expertise in threat intelligence and detection will help more enterprises across the region to proactively identify and take down known and unknown threats before they happen.”More
Story image
CompTIA forms Cybersecurity Advisory Council, led by 16 security execs
The new body will be co-chaired by Tech Data director of security solutions Tracy Holtz, and Alvaka Networks chief operating officer and chief information security officer Kevin McDonald.More
Story image
One Identity reaches out to SolarWinds customers following breach
According to the company, this free assessment seeks to help organisations navigate through times of uncertainty as attacks continue to grow in sophistication and complexity across the broad range of identity-centric risks.More
Story image
Google Cloud announces availability of zero trust platform BeyondCorp Enterprise
The platform directly replaces BeyondCorp Remote Access, which was brought to the market in April 2020 as Google’s first foray into the zero trust space.More
Story image
Country-wide phishing reports up 75% in 2020
In total, Australians lost $176 million to scams in 2020, 23% higher than the previous year, with phishing the most reported type.More