| Aspect | Description |
|---|---|
|
Vendor
|
LogRhythm |
|
Details
|
Website |
|
Term
|
SIEM |
|
Purpose/
Statement
|
Sale/ Provide Information |
|
Genre/
Research Methods
|
Descriptive website |
|
Concept
|
Technical Monitoring |
|
IT involved
|
Dashboard & Analytics |
|
Data Sources
|
Log Data |
|
(Research)
Methods
|
Machine Learning, Visualisation & Reporting |
|
Stakeholders
|
Security professionals & System Admins |
|
Goals
|
Cyber Threats, Security, Compliance, Productivity |
|
Theoretical
Warrant(s)
|
Not clear |
|
Level of Analysis
|
Technical components |
|
Side effects
|
None |
|
Theoretical instantiation/ link function
|
None |
|
Comparison with our model
|
This vendor is focused on security and how UEBA can help to secure the information of the organizations, by detecting threats and behavioral changes in user data. |
|
Comment
|