What's the Cost?
How does it work?
Need more Info?

AI Engine Delivers Real-Time Visibility to Risks, Threats and Critical Operations Issues

 LogRhythm’s AI Engine is a fully integrated component of the LogRhythm platform, delivering automated, continuous analysis and correlation of all activity observed within the environment. With a uniquely flexible and comprehensive approach, it delivers realtime visibility to risks, threats and critical operations issues that are otherwise undetectable in a practical way. AI Engine is correlation that works.

With over 900 preconfigured, out-of-the-box correlation rule sets and a wizard-based drag-and-drop GUI for creating and customizing even complex rules, AI Engine enables organizations to predict, detect and swiftly respond to:

  • Sophisticated intrusions
  • Insider threats
  • Fraud
  • Behavioral anomalies with users, networks and endpoints
  • Compliance violations
  • Disruptions to IT services
  • And many other critical actionable events

Comprehensive Advanced Correlation

 Unlike legacy SIEM solutions, AI Engine leverages its integration with the log and platform management functions within the LogRhythm platform to correlate against all data—not just a pre-filtered subset of security events. Seamless integration also enables immediate access to all forensic data directly related to an event.

AI Engine rules draw from over 70 different metadata fields that provide highly relevant data for analysis and correlation. This metadata includes the dynamic Risk Based Prioritization (RBP) value assigned to all machine data, enabling the AI Engine to build trends and expose statistical anomalies based on the risk level associated with specific activity on the network. Whether detected by out-of-the-box rules or user-created/modified rules, AI Engine identifies and alerts on actionable events with tremendous precision, supporting security, compliance and operations use cases. AI Engine can also be used to cast a wide net through generalized correlation rules for broader visibility that accommodates changes in event behavior.

Multi-Dimensional Analytics

 LogRhythm has combined enterprise-wide advanced correlation and pattern recognition with automated behavioral and statistical analysis to deliver the industry’s first Multi-dimensional Analytics capabilities. By combining advanced statistical and heuristic analysis with behavioral whitelisting, LogRhythm enables organizations to automate the process of learning what constitutes “normal” behavior on any combination of attributes tied to users, hosts, applications, or devices. Integrating these capabilities with advanced correlation and pattern recognition eliminates three significant problems for users of 1st generation SIEMs: the inability to accurately define what constitutes “normal” activity, a deluge of false positives that reduce understanding of meaningful events, and uncertainty due to false negatives.
A single event is not always enough to indicate a breach or show the true reach of a security incident. AI Engine automatically generates behavioral whitelists of “normal” activity to help identify suspicious behavior patterns and automatically identify and alert on potential threats and breaches. For example, malware can invade and spread through an organization quickly, exposing data and weakening security faster than administrators can react. In many cases, the extent of the damage is unknown. Examples:
  • Malware is detected on a host, followed by multiple outbound attacks from that infected host
  • Suspicious communication from an external IP Address is followed by data being transferred to the same IP Address
  • A user logs in from one location, and then logs in from another city or country soon afterward
  • RBP score assigned to firewall logs steadily increases from 50 to 90 over the course of an hour
AI Engine enforces continuous compliance by generating events when specific policy violations occur. These include protecting cardholder data or Protected Health Information (PHI) from unauthorized access and actively monitoring privileged user behavior.
  • Five failed authentication attempts followed by a successful login to a database containing ePHI, followed by a large data transfer to the user’s machine, all within 30 minutes
  • A file containing credit card data is accessed, followed by an attempt to transfer information from the same host to a USB thumb drive within 10 minutes.
  • Multiple new accounts are created, granted escalated privileges, and then access critical data in a short period of time

Advanced correlation offers substantial value for operational insight and IT services assurance. Slight variations in specific activities or a particular sequence of typically common operations events may indicate critical operations issues. Examples:
  • A backup process is started, but no log is generated, indicating that the backup completed
  • Suspicious communication from an external IP Address is followed by data being transferred to the same IP Address
  • A critical process stops and doesn’t start back up within a specific timeframe
  • A large group of servers shuts down, followed by a smaller group of servers starting back up
  • High I/O rates on a critical server, usually only observed after-hours during backup procedures, are observed during normal business hours

If you would like more information on LogRhythm, contact us today!