


Using your Network Monitor Freemium (or enterprise version) and any of the tools at your disposal (DPA, PCAP Replay, Dashboards, Query Rules) can you create a dashboard or use case that leverages network data to solve an IT Operations need? The business user doesn't care whether a service is down because of a DDOS attack or down because of a blown network card. The line between security needs and operational IT needs continues to blur. Using your Network Monitor Freemium (or enterprise version) and any of the tools at your disposal (DPA, PCAP Replay, Dashboards, Query Rules) can you create a dashboard or use case that gives a security analyst the best possible chance to see the critical piece of evidence? One thing we know from many of the largest public breaches is that the evidence of the hack is there if you know where to look. Using your Network Monitor Freemium (or enterprise version) and any of the tools at your disposal (Deep Packet Analytics (DPA), PCAP Replay, Dashboards, Query Rules) can you isolate and validate a unique or interesting network threat?īest Security Hunting Dashboard or Use Case ($5,000)
#Logrhythm network monitor full#
The cyber-world is full of malicious traffic. We're giving away over $18,000 USD in cash and prizes in three categories:

Our goal is to help identify and analyze threats faster so that organizations can respond to incidents with real evidence when time matters the most.Īnd now you can help contribute to how people use Network Monitor!
#Logrhythm network monitor free#
LogRhythm’s Network Monitor Freemium is a free solution designed to help with threat detection and incident response. Firewalls, intrusion detection, anti-malware and endpoint protection all do a great job of looking at a particular system or service or point in time.īut what happens “in between?” Unless you capture and analyze the network traffic, you have no visibility into the “between spaces” where compromise, lateral movement and exfiltration actually occur.
