sb-nz logo
Story image

LogRhythm launches Remote Workforce Visibility with promotion

LogRhythm has released its Remote Workforce Visibility designed to help organisations with remote workforce monitoring, providing greater insight into remote working conditions.

Furthermore, it is being offered the solution with a month to month subscription plan. This will help CISOs and security teams to trial LogRhythm Cloud with minimal investment, and allow them to address the challenges created by the increase of cloud data created from the move to a remote workforce following COVID-19, LogRhythm states.

The promotion includes out of the box content and analytics for endpoint, and infrastructure and collaboration technologies for remote workforce monitoring.

LogRhythm states the offer will also support security orchestration, automation and response (SOAR) capabilities for remote teams and incident response.

Specifically, security operations centres (SOCs) can use the solution to restore full visibility and continued monitoring of new and increased cloud data sources stemming from various online applications such as Zoom, Slack, Teams and WebEx.

LogRhythm Labs CSO and VP James Carder comments that today organisations are using a multitude of different applications and tools, and therefore visibility has become a more complicated and necessary focus.

He says, “Even if organisations previously had full visibility into their environments, thats very likely no longer the case. Many companies have brought on new tools and made various security concessions to accommodate their workforce over the past few months, and cyberattackers have a complete understanding of what these tools are and where the vulnerabilities lie.

“Security teams need to be able to restore this visibility as quickly as possible to ensure their employees and systems aren’t exploited especially since citing COVID-19 challenges wont allow them to avoid accountability if they do get breached.

"We want to help teams get ahead of this situation and ensure they have the resources they need to be confident in their security abilities."

LogRhythm VP sales Asia Pacific Simon Howe says, “This monthly subscription offer could not be more timely in Australia and New Zealand.

"It will provide the flexibility and scalability to support organisations as they navigate the months ahead operating with a workforce that is both operating remotely as well as in the traditional office environment.

"Companies can now take advantage of a payment program to secure and monitor their cloud data white at the same time be rest assured that they can control their investments and scale according to their business momentum.

"They can also be laser focused on accountability in a world where the economic impact of the global pandemic is yet to be fully understood.”

Initially, analysts can install LogRhythm Cloud without a purchase order or more involved buying process. It’s available to both new and existing LogRhythm customers.

Link image
Webinar: Best practices for keeping your video chats secure
Video collaboration providers nowadays operate exclusively on a multi-tenant, public cloud - and security and privacy concerns have come into the spotlight. Here's how to secure your communications.More
Story image
Jamf extends Microsoft collaboration with iOS Device Compliance
Organisations will soon be able to use Jamf for Apple ecosystem management while using Azure Active Directory and Microsoft Endpoint manager to maintain conditional access.More
Link image
Software engineer backs metrics mindset in DevOps
Christian Oestreich, a senior software engineering leader with experience at multiple Fortune 500 companies, shares how a metrics-driven mindset can dramatically improve software quality and enable DevOps at enterprise scale.More
Story image
Kaspersky finds red tape biggest barrier against cybersecurity initiatives
The most common obstacles that inhibit or delay the implementation of industrial cybersecurity projects include the inability to stop production (34%), and bureaucratic steps, such as a lengthy approval process (31%) and having too many decision-makers (23%). More
Story image
Revealed: The behaviours exhibited by the most effective CISOs
As cyber-threats pile up, more is being asked of CISOs - and according to Gartner, only a precious few are 'excelling' by the standards of their CISO Effectiveness Index.More
Story image
Check Point acquires Odo Security to bolster remote security offering
The deal will integrate Odo’s remote access software with Check Point’s Inifinity architecture, bolstering the latter company’s remote security capabilities in a time where working and learning from home has become the norm, and looks to largely remain that way in the near future.More