sb-nz logo
Story image

LogRhythm releases True Unlimited Data Plan for SIEM

07 Oct 2019

Cybersecurity company LogRhythm has announced that it launched its Unlimited Data Plan for its NextGen SIEM.

Historically, organisations have paid more as data ingestion increased.

While others in the industry have previously claimed to support unlimited data plans, they have always come with a catch.

LogRhythm is changing that in an effort to provide predictability for CISOs; therefore, combatting the risk of unprotected data.

Big data volumes are growing exponentially, and the amount and severity of breaches continue to rise.

CISOs are feeling the brunt of it as the cost to protect the vast amount of data in their environment might double — or even triple — year over year.

To stay within budget, they must make difficult and risky decisions about which data they will choose not to monitor and protect.

“We recognise the financial burden and security risk making this tradeoff can create. LogRhythm’s new True Unlimited Data Plan solves the problem for both CISOs and CFOs by allowing them to fully protect their enterprise with 100 percent data ingestion at a fixed and predictable cost — no tiers, no surprises, no fine print,” says LogRhythm CEO Mark Logan.

With 2019 set to be the “worst ever year for data breaches” with over 3.2 billion records breached so far, the risk of unprotected data is real.

To be successful in protecting their organisations against cyber risk, CISOs must ensure that they have complete, holistic visibility of their environments.

LogRhythm’s new model is available to all New Zealand businesses.

Customers new to LogRhythm can start with an unlimited data plan immediately, and existing customers that want to migrate to the model can begin transitioning as well. LogRhythm’s perpetual licensing option will also remain.

Chillisoft CEO Alex Teh says, “At Chillisoft, we are focused on building robust security solutions for our customers.”

“Having worked on SIEM project deployments for 20 years, we have traditionally required information about network devices and log volumes in order to deploy a tailored solution for each customer’s unique requirements.

“In many instances, this process alone can slow down project progression. In addition, during the budgeting process, compromises are often made due to budget changes,” says Teh.

Story image
It’s time for firms' cybersecurity credentials to take centre stage
leading enterprise database was also used to identify whether each company had a chief information security officer (CISO) or a chief security officer (CSO). The results proved extremely interesting…More
Story image
Privacy Bill will mandate more transparency in Kiwi businesses - OPC
“Privacy is about being transparent and clear with customers and protecting their personal information. It’s about telling people what you’re collecting and what you’re going to do with it."More
Story image
Case study: 40% of password managers vulnerable to breach
Two of five password managers tested by researchers from the University of York were fooled by a fake app into giving away a password.More
Story image
Organisations take cloud-first approach to security, though concerns remain
"While the results of this survey show that some security professionals still have concerns, having visibility into cloud services is vital and many organisations are now taking a cloud-first approach to security.”More
Story image
SailPoint rolls out cloud governance solutions for a multi-cloud world
SailPoint has added new cloud governance solutions to the SailPoint Predictive Identity Platform for IaaS cloud platforms, resources and workloads.More
Link image
Take advantage of free multi-factor authentication as you work remotely
Cybersecurity is shaping up to be one of the most important areas to consider while working from home. Leverage biometrics and password authentication for free with RSA.More