LogRhythm’s Partners with Zscaler

0

LogRhythm has announced its partnership with Zscaler. The LogRhythm SmartResponse for Zscaler Internet Access (ZIA) enables remediation actions from the LogRhythm console. As logs are ingested from Zscaler’s Nanolog Streaming Service (NSS) into the LogRhythm SIEM platform, the LogRhythm SmartResponse for Zscaler can also automatically denylist the URL in Zscaler when a banned keyword or URL is detected.

“Securing an organisation’s systems and networks begins with high-fidelity and trustworthy log data. LogRhythm’s expertise in turning log data into actionable insights delivered through dashboards and analytics is unrivalled in the industry,” said Andrew Hollister, Chief Information Security Officer at LogRhythm. “The combined benefits of LogRhythm SmartResponse™ and Zscaler Internet Access facilitate modern Zero Trust architecture that is the security backbone of companies across the globe.”

The LogRhythm SmartResponse for Zscaler performs several actions including denylisting a URL, getting policy information, and adding a URL category. It simplifies running actions between the SIEM and Zscaler by centralising day-to-day security tasks to a single console. Other benefits of this integration include:

  1. Simplified ingestion and contextualisation of Zscaler log data
  2. Accelerated detection of unwanted or denylisted URLs
  3. Use of a single console to investigate and block suspicious website access
  4. Faster response with enhanced investigative capabilities

“Zscaler’s Zero Trust Exchange reduces the attack surface and enforces cybersecurity policies, and this new integration with LogRhythm can help security teams with richer insights,” said Amit Raikar, VP of Technology Partnerships at Zscaler. “By leveraging Zscaler APIs for cloud-to-cloud log streaming, LogRhythm customers can gather threat and policy telemetry across a hybrid workforce accessing multicloud and SaaS applications, giving analysts a complete picture from the depth of information in Zscaler logs for optimal threat hunting and investigations.”

Share.