Story image

LogRhythm releases True Unlimited Data Plan for SIEM

07 Oct 2019

Cybersecurity company LogRhythm has announced that it launched its Unlimited Data Plan for its NextGen SIEM.

Historically, organisations have paid more as data ingestion increased.

While others in the industry have previously claimed to support unlimited data plans, they have always come with a catch.

LogRhythm is changing that in an effort to provide predictability for CISOs; therefore, combatting the risk of unprotected data.

Big data volumes are growing exponentially, and the amount and severity of breaches continue to rise.

CISOs are feeling the brunt of it as the cost to protect the vast amount of data in their environment might double — or even triple — year over year.

To stay within budget, they must make difficult and risky decisions about which data they will choose not to monitor and protect.

“We recognise the financial burden and security risk making this tradeoff can create. LogRhythm’s new True Unlimited Data Plan solves the problem for both CISOs and CFOs by allowing them to fully protect their enterprise with 100 percent data ingestion at a fixed and predictable cost — no tiers, no surprises, no fine print,” says LogRhythm CEO Mark Logan.

With 2019 set to be the “worst ever year for data breaches” with over 3.2 billion records breached so far, the risk of unprotected data is real.

To be successful in protecting their organisations against cyber risk, CISOs must ensure that they have complete, holistic visibility of their environments.

LogRhythm’s new model is available to all New Zealand businesses.

Customers new to LogRhythm can start with an unlimited data plan immediately, and existing customers that want to migrate to the model can begin transitioning as well. LogRhythm’s perpetual licensing option will also remain.

Chillisoft CEO Alex Teh says, “At Chillisoft, we are focused on building robust security solutions for our customers.”

“Having worked on SIEM project deployments for 20 years, we have traditionally required information about network devices and log volumes in order to deploy a tailored solution for each customer’s unique requirements.

“In many instances, this process alone can slow down project progression. In addition, during the budgeting process, compromises are often made due to budget changes,” says Teh.