Mimecast, a leading provider of email and collaboration security, and LogRhythm, a firm that assists security teams in stopping attacks by transforming disconnected data and signals into reliable insights, have established a technical alliance. The combination of LogRhythm and Mimecast will aid businesses everywhere in defending against current assaults.
To differentiate between genuine threats and false alarms, organisations require the ability to correlate data from their various security products and services. Mimecast's email security features are integrated with LogRhythm SIEM's enterprise threat management.
In order to provide real-time threat protection based on current situational awareness and thorough security analytics, LogRhythm's scenario and behavioral-based analytics automatically consumes email security data from the Mimecast cloud service as well as other security data from across an organisation.
“Our integration with Mimecast is the latest example of LogRhythm maintaining its position and commitment as an authentic customer-centric partner. This integration is a gamechanger as it empowers security teams to identify behavioral anomalies, internal and external threats, and to prioritize their responses based on accurate enterprise security intelligence,” said Andrew Hollister, Chief Information Security Officer at LogRhythm. “Protecting the organization against email-borne attacks should be a top priority and with this integration, organizations can gain deeper visibility into their email environment and detect email-based threats more quickly and effectively.”
Organisations can utilise LogRhythm SmartResponse, a security orchestration, automation, and response (SOAR) solution that is an integrated part of LogRhythm SIEM, to automate security response workflows. Response times to questionable emails and URLs are shortened with LogRhythm SmartResponseTM.
Despite the fact that LogRhythm has a dedicated engineering team that creates SmartResponse plugins, this open framework allows LogRhythm and Mimecast customers to alter responses or create their own custom integrations to safeguard their particular information technology (IT) or operational technology (OT) environments.