sb-nz logo
Story image

LogRhythm releases True Unlimited Data Plan for SIEM

07 Oct 2019

Cybersecurity company LogRhythm has announced that it launched its Unlimited Data Plan for its NextGen SIEM.

Historically, organisations have paid more as data ingestion increased.

While others in the industry have previously claimed to support unlimited data plans, they have always come with a catch.

LogRhythm is changing that in an effort to provide predictability for CISOs; therefore, combatting the risk of unprotected data.

Big data volumes are growing exponentially, and the amount and severity of breaches continue to rise.

CISOs are feeling the brunt of it as the cost to protect the vast amount of data in their environment might double — or even triple — year over year.

To stay within budget, they must make difficult and risky decisions about which data they will choose not to monitor and protect.

“We recognise the financial burden and security risk making this tradeoff can create. LogRhythm’s new True Unlimited Data Plan solves the problem for both CISOs and CFOs by allowing them to fully protect their enterprise with 100 percent data ingestion at a fixed and predictable cost — no tiers, no surprises, no fine print,” says LogRhythm CEO Mark Logan.

With 2019 set to be the “worst ever year for data breaches” with over 3.2 billion records breached so far, the risk of unprotected data is real.

To be successful in protecting their organisations against cyber risk, CISOs must ensure that they have complete, holistic visibility of their environments.

LogRhythm’s new model is available to all New Zealand businesses.

Customers new to LogRhythm can start with an unlimited data plan immediately, and existing customers that want to migrate to the model can begin transitioning as well. LogRhythm’s perpetual licensing option will also remain.

Chillisoft CEO Alex Teh says, “At Chillisoft, we are focused on building robust security solutions for our customers.”

“Having worked on SIEM project deployments for 20 years, we have traditionally required information about network devices and log volumes in order to deploy a tailored solution for each customer’s unique requirements.

“In many instances, this process alone can slow down project progression. In addition, during the budgeting process, compromises are often made due to budget changes,” says Teh.

Story image
ThreatQuotient hits $22.5m in new financing, continues growth streak
“Since we first invested in ThreatQuotient in 2017, their team has continued to prove to the market that there is a critical need for cybersecurity solutions aimed at security operations."More
Story image
97% of organisations experienced a mobile threat in 2020 — report
93% of these attacks originated in a device network, which includes attempts to trick users into installing a malicious payload via infected websites or URLs, or to steal users’ credentials.More
Story image
rhipe acquires emt Distribution, with aim to expand into enterprise market
The acquisition will enable rhipe to deliver a comprehensive portfolio of end-to-end security capabilities to its partners, the company says.More
Story image
Pandemic sees organisations of all sizes and industries invest in CTI
There is opportunity for organisations to better manage their cyber-threat intelligence for greater security and threat intelligence effectiveness by adopting the right tools and processes.More
Story image
Five things ANZ businesses should know about storing customers’ data
Businesses need to correlate events intelligently across multiple threat surfaces, application layers, and time spans to connect event A, to event B, to event C — even if they are months apart.More
Story image
Need for greater understanding of data security responsibility as cloud adoption grows - report
Despite the accelerated adoption of cloud services, there was a lack of clarity and confidence regarding the protection and recovery of data stored in public clouds.More