Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

LogRhythm Launches Honeypot Security Analytics Suite

Just weeks after announcing that it had raised $40 million in a new round of equity financing, SIEM and security intelligence vendor LogRhythm has released a new analytics suite that monitors honeypots in order to detect and track would-be attackers.

Just weeks after announcing that it had raised $40 million in a new round of equity financing, SIEM and security intelligence vendor LogRhythm has released a new analytics suite that monitors honeypots in order to detect and track would-be attackers.

According to the Boulder, Colorado-based Company, the suite enables customers to analyze nefarious tactics and generate targeted threat intelligence.

Designed to look like production servers but left vulnerable on purpose, Honeypots are isolated decoy systems and services used to deceive and detect attackers.

The new Honeypot Security Analytics Suite helps LogRhythm customers deploy honeypots to attract opportunistic hackers and then capture network and log activity stemming from the honeypots. By deploying honeypots, organizations can detect various evolving attacks – including advanced zero-day malware, brute force attacks and emerging nefarious payloads, the company said.

“The LogRhythm Security Intelligence Platform prioritizes intel derived from the honeypots to orchestrate responses from similar attacks on production networks,” the company explained in an announcement. “For example, LogRhythm SmartResponse plugins automatically apply observations from the suite to managed blacklists and identified malware, so the IP address of an attacker targeting the honeypot will be blocked and the programs executed can be identified if discovered on production systems.”

“It’s now extremely straight forward for a LogRhythm customer to set up a honeypot that looks and acts like the customer’s network,” said David Pack, Director of LogRhythm Labs. “The LogRhythm Security Intelligence Platform analyzes what the attackers are doing, and that intel is immediately harvested to best protect the entire company.”

Available immediately as part of LogRhythm’s Security Intelligence Platform, and it is the latest security analytics suite developed by LogRhythm Labs.

The company also launched a Retail Cyber Crime Security Analytics Suite recently to help identify early indicators of cyber attacks on the payment processing chains of retail organizations.

Advertisement. Scroll to continue reading.
Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is founder and director of several leading cybersecurity industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Linx Security has appointed Sarit Reiner Frumkes as Chief Technology Officer.

Tabitha Craig has been named the CISO of the Congressional Budget Office (CBO).

Life360 has appointed Vari Bindra, former Amazon cybersecurity lead, as Chief Information Security Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.