SlideShare a Scribd company logo
1 of 1
Download to read offline
USE CASE




Visualizing Log & Event Data – Completing the Picture

   A typical IT environment generates far more log and event data than IT
   administrators can possibly manage. Valuable operations, security and audit
   information is contained within the logs but the sheer volume can quickly
   hide relevant information in an avalanche of marginal data. That is one of the
   reasons enterprises are turning to log management and SIEM solutions to help
   manage the abundance of data.
   Log management and SIEM solutions automate the process of collecting
   log and event data and making it useful. Even with log aggregation, event
   filtering, real-time alarms and automated reports, though, some patterns of
   nefarious behavior can escape detection. Seeing activity trends unfolding over time combined with a map
   of the relationships between data sources -- inside and outside of the network -- makes threat detection and
   forensic analysis easier than ever.



      LogRhythm’s advanced visualization tools help you complete the picture of what is happening when throughout
                   your global IT environment, including where it originated and the scope of impact.

     The Whole is Worth More                           Focusing the Lens                            Seeing the Forest and the
     than the Sum of Its Parts                                                                      Trees
     Challenge
     Significant activities related to IT              Tracking anomalous behavior for 100s         Zeroing in on specific event details
     operations or security take place over            of users and devices is challenging          is critical, but so is understanding its
     time and consist of a series of actions           – particularly without a visual point of     overall impact. Forensic evidence of
     that might not individually attract notice.       reference to see behavioral trends.          event propagation may exist in 100s of
     Investigating user behavior may show              Even with tools to graph network             locations, escaping notice without an
     activities that don’t indicate malicious          activity, observing network behavior         additional layer of visual context.
     activity when displayed in a typical list view.   without relevant context allows
     S                                                 important events to escape notice.
     Solution
     LogRhythm offers trending views within            LogRhythm enables the correlation            LogRhythm’s Network Visualization tool
     any investigation, providing the means            of flow data with other event data,          maps communication and relationships
     to look at specific user behavior patterns        creating trending views based on             between hosts from anywhere in the
     with time-of-day- and day-of-week                 logical criteria. It allows for easy focus   world – inside or outside the network
     context. Administrators can easily identify       on details such as activity by specific      – with automated geolocation data
     anomalous behavior trends, such as                individuals or user groups, applications     maximizing relevant context.
     unauthorized users logging in after-hours.        and/or devices, from specific network
                                                       segments, or communication with
                                                       suspicious locations.
     Benefit
     Once a significant pattern is found,              LogRhythm allows mouse-control               When a suspicious source or
     simple selection and click-through                selection of specific target ranges          destination is identified, administrators
     features allow rapid-zoom views into              within a given investigation.                can right-click to create an automated
     relevant event data. As search results            Administrators can quickly highlight and     alarm, allowing real-time reaction as
     narrow, users can apply visual analyses           zoom in on suspicious activity trends        a new host is infected or engages
     to isolate event specifics or use detailed        for rapid, click-through forensics.          in suspicious behavior with a rogue
     list views that correlate directly to the                                                      external destination to quickly minimize
     graphical displays.                                                                            additional event propagation.




© 2010 LogRhythm Inc. | www.logrhythm.com                                                                       VisualizationUseCase_1007

More Related Content

What's hot

Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)k33a
 
What is zero trust model of information security?
What is zero trust model of information security?What is zero trust model of information security?
What is zero trust model of information security?Ahmed Banafa
 
Josh Diakun - Cust Pres - Splunk Partner Event
Josh Diakun - Cust Pres - Splunk Partner EventJosh Diakun - Cust Pres - Splunk Partner Event
Josh Diakun - Cust Pres - Splunk Partner EventJosh D
 
Protecting Your Data In Office 365
Protecting Your Data In Office 365Protecting Your Data In Office 365
Protecting Your Data In Office 365Elastica Inc.
 
Continuous Monitoring and Real Time Risk Scoring
Continuous Monitoring and Real Time Risk ScoringContinuous Monitoring and Real Time Risk Scoring
Continuous Monitoring and Real Time Risk ScoringQ1 Labs
 
How to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxHow to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxElastica Inc.
 
GBS - Prevent network security fires
GBS - Prevent network security firesGBS - Prevent network security fires
GBS - Prevent network security firesKristin Helgeson
 
Cloud Access Security Brokers
Cloud Access Security BrokersCloud Access Security Brokers
Cloud Access Security BrokersAbhishek Tripathi
 
13 essential log_col_infog
13 essential log_col_infog13 essential log_col_infog
13 essential log_col_infoghuynhvanphuc
 
Enabling Dropbox for Business
Enabling Dropbox for BusinessEnabling Dropbox for Business
Enabling Dropbox for BusinessElastica Inc.
 
“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information securityAhmed Banafa
 
Haystax Innovative Solutions Consortium Presentation
Haystax Innovative Solutions Consortium PresentationHaystax Innovative Solutions Consortium Presentation
Haystax Innovative Solutions Consortium PresentationJaffrey Ali
 
Intelligence and investigation management
 Intelligence and investigation management Intelligence and investigation management
Intelligence and investigation managementAdeola Taiwo-Ogunbode
 
Modern vs. Traditional SIEM
Modern vs. Traditional SIEM Modern vs. Traditional SIEM
Modern vs. Traditional SIEM Alert Logic
 
Using indicators to deal with security attacks
Using indicators to deal with security attacksUsing indicators to deal with security attacks
Using indicators to deal with security attacksZoho Corporation
 

What's hot (19)

Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
What is zero trust model of information security?
What is zero trust model of information security?What is zero trust model of information security?
What is zero trust model of information security?
 
Josh Diakun - Cust Pres - Splunk Partner Event
Josh Diakun - Cust Pres - Splunk Partner EventJosh Diakun - Cust Pres - Splunk Partner Event
Josh Diakun - Cust Pres - Splunk Partner Event
 
Nac market
Nac marketNac market
Nac market
 
Protecting Your Data In Office 365
Protecting Your Data In Office 365Protecting Your Data In Office 365
Protecting Your Data In Office 365
 
Continuous Monitoring and Real Time Risk Scoring
Continuous Monitoring and Real Time Risk ScoringContinuous Monitoring and Real Time Risk Scoring
Continuous Monitoring and Real Time Risk Scoring
 
How to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxHow to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within Box
 
GBS - Prevent network security fires
GBS - Prevent network security firesGBS - Prevent network security fires
GBS - Prevent network security fires
 
Cloud Access Security Brokers
Cloud Access Security BrokersCloud Access Security Brokers
Cloud Access Security Brokers
 
13 essential log_col_infog
13 essential log_col_infog13 essential log_col_infog
13 essential log_col_infog
 
Enabling Dropbox for Business
Enabling Dropbox for BusinessEnabling Dropbox for Business
Enabling Dropbox for Business
 
Sqrrl
SqrrlSqrrl
Sqrrl
 
“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security
 
Haystax Innovative Solutions Consortium Presentation
Haystax Innovative Solutions Consortium PresentationHaystax Innovative Solutions Consortium Presentation
Haystax Innovative Solutions Consortium Presentation
 
Intelligence and investigation management
 Intelligence and investigation management Intelligence and investigation management
Intelligence and investigation management
 
Modern vs. Traditional SIEM
Modern vs. Traditional SIEM Modern vs. Traditional SIEM
Modern vs. Traditional SIEM
 
Using indicators to deal with security attacks
Using indicators to deal with security attacksUsing indicators to deal with security attacks
Using indicators to deal with security attacks
 
Brochure forcepoint dlp_en
Brochure forcepoint dlp_enBrochure forcepoint dlp_en
Brochure forcepoint dlp_en
 
Security Information Event Management - nullhyd
Security Information Event Management - nullhydSecurity Information Event Management - nullhyd
Security Information Event Management - nullhyd
 

Viewers also liked

What's New Logrhythm 5.1 Data Sheet
What's New Logrhythm 5.1 Data SheetWhat's New Logrhythm 5.1 Data Sheet
What's New Logrhythm 5.1 Data Sheetjordagro
 
LogRhythm Privileged Use Monitoring Use Case
LogRhythm Privileged Use Monitoring Use CaseLogRhythm Privileged Use Monitoring Use Case
LogRhythm Privileged Use Monitoring Use Casejordagro
 
LogRhythm Web Rhythm Data Sheet
LogRhythm Web Rhythm Data SheetLogRhythm Web Rhythm Data Sheet
LogRhythm Web Rhythm Data Sheetjordagro
 
LogRhythm Professional Services Overview Data Sheet
LogRhythm Professional Services Overview Data SheetLogRhythm Professional Services Overview Data Sheet
LogRhythm Professional Services Overview Data Sheetjordagro
 
LogRhythm Operations Use Case
LogRhythm Operations Use CaseLogRhythm Operations Use Case
LogRhythm Operations Use Casejordagro
 
LogRhythm High Availability Solutions Data Sheet
LogRhythm High Availability Solutions Data SheetLogRhythm High Availability Solutions Data Sheet
LogRhythm High Availability Solutions Data Sheetjordagro
 
LogRhythm E Phi Use Case
LogRhythm E Phi Use CaseLogRhythm E Phi Use Case
LogRhythm E Phi Use Casejordagro
 
CyberThreat Defense Report
CyberThreat Defense ReportCyberThreat Defense Report
CyberThreat Defense ReportLogRhythm
 
LogRhythm Visualize This Data Sheet
LogRhythm Visualize This Data SheetLogRhythm Visualize This Data Sheet
LogRhythm Visualize This Data Sheetjordagro
 
LogRhythm Zero Day Exploits Use Case
LogRhythm Zero Day Exploits Use CaseLogRhythm Zero Day Exploits Use Case
LogRhythm Zero Day Exploits Use Casejordagro
 
LogRhythm Training Syllabus Data Sheet
LogRhythm Training Syllabus Data SheetLogRhythm Training Syllabus Data Sheet
LogRhythm Training Syllabus Data Sheetjordagro
 
LogRhythm Rapid Forensics Use Case
LogRhythm Rapid Forensics Use CaseLogRhythm Rapid Forensics Use Case
LogRhythm Rapid Forensics Use Casejordagro
 
LogRhythm FIPS Data Sheet
LogRhythm  FIPS Data SheetLogRhythm  FIPS Data Sheet
LogRhythm FIPS Data Sheetjordagro
 
LogRhythm Advanced Intelligence Engine Data Sheet
LogRhythm Advanced Intelligence Engine Data SheetLogRhythm Advanced Intelligence Engine Data Sheet
LogRhythm Advanced Intelligence Engine Data Sheetjordagro
 
LogRhythm PowerTech Interact Data Sheet
LogRhythm PowerTech Interact Data SheetLogRhythm PowerTech Interact Data Sheet
LogRhythm PowerTech Interact Data Sheetjordagro
 

Viewers also liked (15)

What's New Logrhythm 5.1 Data Sheet
What's New Logrhythm 5.1 Data SheetWhat's New Logrhythm 5.1 Data Sheet
What's New Logrhythm 5.1 Data Sheet
 
LogRhythm Privileged Use Monitoring Use Case
LogRhythm Privileged Use Monitoring Use CaseLogRhythm Privileged Use Monitoring Use Case
LogRhythm Privileged Use Monitoring Use Case
 
LogRhythm Web Rhythm Data Sheet
LogRhythm Web Rhythm Data SheetLogRhythm Web Rhythm Data Sheet
LogRhythm Web Rhythm Data Sheet
 
LogRhythm Professional Services Overview Data Sheet
LogRhythm Professional Services Overview Data SheetLogRhythm Professional Services Overview Data Sheet
LogRhythm Professional Services Overview Data Sheet
 
LogRhythm Operations Use Case
LogRhythm Operations Use CaseLogRhythm Operations Use Case
LogRhythm Operations Use Case
 
LogRhythm High Availability Solutions Data Sheet
LogRhythm High Availability Solutions Data SheetLogRhythm High Availability Solutions Data Sheet
LogRhythm High Availability Solutions Data Sheet
 
LogRhythm E Phi Use Case
LogRhythm E Phi Use CaseLogRhythm E Phi Use Case
LogRhythm E Phi Use Case
 
CyberThreat Defense Report
CyberThreat Defense ReportCyberThreat Defense Report
CyberThreat Defense Report
 
LogRhythm Visualize This Data Sheet
LogRhythm Visualize This Data SheetLogRhythm Visualize This Data Sheet
LogRhythm Visualize This Data Sheet
 
LogRhythm Zero Day Exploits Use Case
LogRhythm Zero Day Exploits Use CaseLogRhythm Zero Day Exploits Use Case
LogRhythm Zero Day Exploits Use Case
 
LogRhythm Training Syllabus Data Sheet
LogRhythm Training Syllabus Data SheetLogRhythm Training Syllabus Data Sheet
LogRhythm Training Syllabus Data Sheet
 
LogRhythm Rapid Forensics Use Case
LogRhythm Rapid Forensics Use CaseLogRhythm Rapid Forensics Use Case
LogRhythm Rapid Forensics Use Case
 
LogRhythm FIPS Data Sheet
LogRhythm  FIPS Data SheetLogRhythm  FIPS Data Sheet
LogRhythm FIPS Data Sheet
 
LogRhythm Advanced Intelligence Engine Data Sheet
LogRhythm Advanced Intelligence Engine Data SheetLogRhythm Advanced Intelligence Engine Data Sheet
LogRhythm Advanced Intelligence Engine Data Sheet
 
LogRhythm PowerTech Interact Data Sheet
LogRhythm PowerTech Interact Data SheetLogRhythm PowerTech Interact Data Sheet
LogRhythm PowerTech Interact Data Sheet
 

Similar to LogRhythm Visualization Use Case

Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxkarlhennesey
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceCamilo Fandiño Gómez
 
Personam Solution - How it Works Brief
Personam Solution - How it Works BriefPersonam Solution - How it Works Brief
Personam Solution - How it Works BriefSunny Geo
 
Personam Solution - How it Works Brief
Personam Solution - How it Works BriefPersonam Solution - How it Works Brief
Personam Solution - How it Works BriefSunny Geo
 
LogRhythm Overview Data Sheet
LogRhythm Overview Data SheetLogRhythm Overview Data Sheet
LogRhythm Overview Data Sheetjordagro
 
Use Exabeam Smart Timelines to improve your SOC efficiency
Use Exabeam Smart Timelines to improve your SOC efficiencyUse Exabeam Smart Timelines to improve your SOC efficiency
Use Exabeam Smart Timelines to improve your SOC efficiencyJonathanPritchard12
 
Achieving high-fidelity security
Achieving high-fidelity securityAchieving high-fidelity security
Achieving high-fidelity securitybalejandre
 
Log Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsLog Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsAnton Chuvakin
 
Log Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsLog Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsAnton Chuvakin
 
ServicePilot NBA for z/OS Datasheet [EN]
ServicePilot NBA for z/OS Datasheet [EN]ServicePilot NBA for z/OS Datasheet [EN]
ServicePilot NBA for z/OS Datasheet [EN]ServicePilot
 
Soc security-analytics
Soc security-analyticsSoc security-analytics
Soc security-analyticsbharti singhal
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wpCMR WORLD TECH
 
Soc security-analyticsof leotechnosoft
Soc security-analyticsof leotechnosoftSoc security-analyticsof leotechnosoft
Soc security-analyticsof leotechnosofthardik soni
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSIJNSA Journal
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSIJNSA Journal
 
Events Classification in Log Audit
Events Classification in Log Audit Events Classification in Log Audit
Events Classification in Log Audit IJNSA Journal
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber securitySandip Juthani
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Karl Kispert
 

Similar to LogRhythm Visualization Use Case (20)

Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security Intelligence
 
Personam Solution - How it Works Brief
Personam Solution - How it Works BriefPersonam Solution - How it Works Brief
Personam Solution - How it Works Brief
 
Personam Solution - How it Works Brief
Personam Solution - How it Works BriefPersonam Solution - How it Works Brief
Personam Solution - How it Works Brief
 
LogRhythm Overview Data Sheet
LogRhythm Overview Data SheetLogRhythm Overview Data Sheet
LogRhythm Overview Data Sheet
 
Use Exabeam Smart Timelines to improve your SOC efficiency
Use Exabeam Smart Timelines to improve your SOC efficiencyUse Exabeam Smart Timelines to improve your SOC efficiency
Use Exabeam Smart Timelines to improve your SOC efficiency
 
Achieving high-fidelity security
Achieving high-fidelity securityAchieving high-fidelity security
Achieving high-fidelity security
 
Log Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsLog Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and Operations
 
Log Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsLog Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and Operations
 
ServicePilot NBA for z/OS Datasheet [EN]
ServicePilot NBA for z/OS Datasheet [EN]ServicePilot NBA for z/OS Datasheet [EN]
ServicePilot NBA for z/OS Datasheet [EN]
 
Soc security-analytics
Soc security-analyticsSoc security-analytics
Soc security-analytics
 
Leveraging Log Management to provide business value
Leveraging Log Management to provide business valueLeveraging Log Management to provide business value
Leveraging Log Management to provide business value
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
 
Soc security-analyticsof leotechnosoft
Soc security-analyticsof leotechnosoftSoc security-analyticsof leotechnosoft
Soc security-analyticsof leotechnosoft
 
Surelog Intelligence
Surelog IntelligenceSurelog Intelligence
Surelog Intelligence
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
 
Events Classification in Log Audit
Events Classification in Log Audit Events Classification in Log Audit
Events Classification in Log Audit
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 

More from jordagro

LogRhythm Alerting on the Absence of an Event Use Case UK
LogRhythm Alerting on the Absence of an Event Use Case UKLogRhythm Alerting on the Absence of an Event Use Case UK
LogRhythm Alerting on the Absence of an Event Use Case UKjordagro
 
LogRhythm Time-to-Value Use Case
LogRhythm Time-to-Value Use CaseLogRhythm Time-to-Value Use Case
LogRhythm Time-to-Value Use Casejordagro
 
LogRhythm Siem 2.0 Flyer
LogRhythm Siem 2.0 FlyerLogRhythm Siem 2.0 Flyer
LogRhythm Siem 2.0 Flyerjordagro
 
File Integrity Monitoring Data Sheet
File Integrity Monitoring Data SheetFile Integrity Monitoring Data Sheet
File Integrity Monitoring Data Sheetjordagro
 
LogRhythm Appliance Data Sheet
LogRhythm Appliance Data SheetLogRhythm Appliance Data Sheet
LogRhythm Appliance Data Sheetjordagro
 
LogRhythm Advanced Agent Data Sheet
LogRhythm Advanced Agent Data SheetLogRhythm Advanced Agent Data Sheet
LogRhythm Advanced Agent Data Sheetjordagro
 

More from jordagro (6)

LogRhythm Alerting on the Absence of an Event Use Case UK
LogRhythm Alerting on the Absence of an Event Use Case UKLogRhythm Alerting on the Absence of an Event Use Case UK
LogRhythm Alerting on the Absence of an Event Use Case UK
 
LogRhythm Time-to-Value Use Case
LogRhythm Time-to-Value Use CaseLogRhythm Time-to-Value Use Case
LogRhythm Time-to-Value Use Case
 
LogRhythm Siem 2.0 Flyer
LogRhythm Siem 2.0 FlyerLogRhythm Siem 2.0 Flyer
LogRhythm Siem 2.0 Flyer
 
File Integrity Monitoring Data Sheet
File Integrity Monitoring Data SheetFile Integrity Monitoring Data Sheet
File Integrity Monitoring Data Sheet
 
LogRhythm Appliance Data Sheet
LogRhythm Appliance Data SheetLogRhythm Appliance Data Sheet
LogRhythm Appliance Data Sheet
 
LogRhythm Advanced Agent Data Sheet
LogRhythm Advanced Agent Data SheetLogRhythm Advanced Agent Data Sheet
LogRhythm Advanced Agent Data Sheet
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

LogRhythm Visualization Use Case

  • 1. USE CASE Visualizing Log & Event Data – Completing the Picture A typical IT environment generates far more log and event data than IT administrators can possibly manage. Valuable operations, security and audit information is contained within the logs but the sheer volume can quickly hide relevant information in an avalanche of marginal data. That is one of the reasons enterprises are turning to log management and SIEM solutions to help manage the abundance of data. Log management and SIEM solutions automate the process of collecting log and event data and making it useful. Even with log aggregation, event filtering, real-time alarms and automated reports, though, some patterns of nefarious behavior can escape detection. Seeing activity trends unfolding over time combined with a map of the relationships between data sources -- inside and outside of the network -- makes threat detection and forensic analysis easier than ever. LogRhythm’s advanced visualization tools help you complete the picture of what is happening when throughout your global IT environment, including where it originated and the scope of impact. The Whole is Worth More Focusing the Lens Seeing the Forest and the than the Sum of Its Parts Trees Challenge Significant activities related to IT Tracking anomalous behavior for 100s Zeroing in on specific event details operations or security take place over of users and devices is challenging is critical, but so is understanding its time and consist of a series of actions – particularly without a visual point of overall impact. Forensic evidence of that might not individually attract notice. reference to see behavioral trends. event propagation may exist in 100s of Investigating user behavior may show Even with tools to graph network locations, escaping notice without an activities that don’t indicate malicious activity, observing network behavior additional layer of visual context. activity when displayed in a typical list view. without relevant context allows S important events to escape notice. Solution LogRhythm offers trending views within LogRhythm enables the correlation LogRhythm’s Network Visualization tool any investigation, providing the means of flow data with other event data, maps communication and relationships to look at specific user behavior patterns creating trending views based on between hosts from anywhere in the with time-of-day- and day-of-week logical criteria. It allows for easy focus world – inside or outside the network context. Administrators can easily identify on details such as activity by specific – with automated geolocation data anomalous behavior trends, such as individuals or user groups, applications maximizing relevant context. unauthorized users logging in after-hours. and/or devices, from specific network segments, or communication with suspicious locations. Benefit Once a significant pattern is found, LogRhythm allows mouse-control When a suspicious source or simple selection and click-through selection of specific target ranges destination is identified, administrators features allow rapid-zoom views into within a given investigation. can right-click to create an automated relevant event data. As search results Administrators can quickly highlight and alarm, allowing real-time reaction as narrow, users can apply visual analyses zoom in on suspicious activity trends a new host is infected or engages to isolate event specifics or use detailed for rapid, click-through forensics. in suspicious behavior with a rogue list views that correlate directly to the external destination to quickly minimize graphical displays. additional event propagation. © 2010 LogRhythm Inc. | www.logrhythm.com VisualizationUseCase_1007