sb-nz logo
Story image

LogRhythm releases True Unlimited Data Plan for SIEM

07 Oct 2019

Cybersecurity company LogRhythm has announced that it launched its Unlimited Data Plan for its NextGen SIEM.

Historically, organisations have paid more as data ingestion increased.

While others in the industry have previously claimed to support unlimited data plans, they have always come with a catch.

LogRhythm is changing that in an effort to provide predictability for CISOs; therefore, combatting the risk of unprotected data.

Big data volumes are growing exponentially, and the amount and severity of breaches continue to rise.

CISOs are feeling the brunt of it as the cost to protect the vast amount of data in their environment might double — or even triple — year over year.

To stay within budget, they must make difficult and risky decisions about which data they will choose not to monitor and protect.

“We recognise the financial burden and security risk making this tradeoff can create. LogRhythm’s new True Unlimited Data Plan solves the problem for both CISOs and CFOs by allowing them to fully protect their enterprise with 100 percent data ingestion at a fixed and predictable cost — no tiers, no surprises, no fine print,” says LogRhythm CEO Mark Logan.

With 2019 set to be the “worst ever year for data breaches” with over 3.2 billion records breached so far, the risk of unprotected data is real.

To be successful in protecting their organisations against cyber risk, CISOs must ensure that they have complete, holistic visibility of their environments.

LogRhythm’s new model is available to all New Zealand businesses.

Customers new to LogRhythm can start with an unlimited data plan immediately, and existing customers that want to migrate to the model can begin transitioning as well. LogRhythm’s perpetual licensing option will also remain.

Chillisoft CEO Alex Teh says, “At Chillisoft, we are focused on building robust security solutions for our customers.”

“Having worked on SIEM project deployments for 20 years, we have traditionally required information about network devices and log volumes in order to deploy a tailored solution for each customer’s unique requirements.

“In many instances, this process alone can slow down project progression. In addition, during the budgeting process, compromises are often made due to budget changes,” says Teh.

Download image
Equinix study: Firms turn to NFV to support distributed networks
Decision-makers looking for a solution that virtualises a wide range of network functions should evaluate NFV, study finds.More
Link image
Webinar: Best practices for keeping your video chats secure
Video collaboration providers nowadays operate exclusively on a multi-tenant, public cloud - and security and privacy concerns have come into the spotlight. Here's how to secure your communications.More
Story image
InternetNZ tackles increased cyberattacks with new partnership
"We want to arm our customers with the best possible defence against known threats on the Internet."More
Story image
ESET launches the latest version of its Mobile Security solution
“With this latest version of ESET Mobile Security, we want to ensure our users feel completely secure when performing financial transactions on their devices, in addition to being protected from malware and phishing attempts."More
Story image
Video: 10 Minute IT Jams - The benefits of converged cloud security
Today, Techday speaks to Forcepoint senior sales engineer and solutions architect Matthew Bant, who discusses the benefits of a converged cloud security model, and the pandemic's role in complicating the security stack in organisations around the world.More
Story image
SMBs seeking service providers in face of rising cyber threats
SMBs are struggling with their cybersecurity solutions, with three quarters worried about being the target of a cyberattack in the next six months, and 91% considering using or switching to a new IT service provider if offered a better option.More