{"id":1604,"date":"2010-10-19T00:00:00","date_gmt":"2010-10-19T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/10\/19\/entry-level-siem-and-log-management-solution-introduced-by-loglogic-as-logrhythm-introduces-virtual\/"},"modified":"2021-12-30T11:39:41","modified_gmt":"2021-12-30T11:39:41","slug":"entry-level-siem-and-log-management-solution-introduced-by-loglogic-as-logrhythm-introduces-virtual","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/10\/19\/entry-level-siem-and-log-management-solution-introduced-by-loglogic-as-logrhythm-introduces-virtual\/","title":{"rendered":"Entry level SIEM and log management solution introduced by LogLogic, as LogRhythm introduces virtual"},"content":{"rendered":"<p>LogLogic has announced the release of an entry-level security information event management (SIEM) and log management product.  According to LogLogic, it comes standard with support for over 340 systems and device types, and support for countless others, with the addition of LogLogic 5&#8217;s &#8216;Log Labels&#8217; feature.  With support for VMware ESX, Microsoft Hyper-V and Citrix XenServer, LogRhythm said that the solution allows customers to run its platform on a virtual machine, deploy it in its familiar appliance form factor and implement mixed mode environments to meet data centre and remote site requirements.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Chris Petersen, founder and CTO of LogRhythm, said: &#8220;Virtualisation and cloud computing are transforming the way IT is deployed, managed and consumed, which includes log management and SIEM technology.<\/p>\n<p>http:\/\/www.scmagazineuk.com\/entry-level-siem-and-log-management-solution-introduced-by-loglogic-as-logrhythm-introduces-virtualised-siem\/article\/181160\/<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1604","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1604","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1604"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1604\/revisions"}],"predecessor-version":[{"id":4091,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1604\/revisions\/4091"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1604"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1604"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1604"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}