Newsletters




Logz.io Combines Threat Detection with AI


Bookmark and Share

Logz.io, a provider of AI-powered log analysis software, has introduced a new security application, Logz.io Security Analytics, built on the open source ELK (Elasticsearch, Logstash, and Kibana) stack. The application integrates with core DevOps and security tools such as Kubernetes, AWS, and Wazuh.

Combining enterprise-grade log analytics with AI, Logz.io Security Analytics offers preconfigured correlation rules, advanced threat intelligence and anomaly detection to help engineering teams and managed security service providers (MSSPs) identify and remediate threats faster. Unlike legacy SIEM and security solutions which are complex, expensive, and lack analytical sophistication,  Logz.io says, the security analytics is simple, easy to deploy, and integrates seamlessly into DevOps processes and methodologies.

The recent successful IPO from Elastic is clear evidence of the market adoption and continued growth potential of the ELK stack, according to Logz.io, which says its Continuous Operations platform leverages the openness and universal understanding of Elasticsearch and Kibana but adds cloud-native scalability and the features engineers need to do their jobs more effectively.

“The ELK Stack is the world’s most popular open source logging and monitoring platform and we see increased adoption for security use cases as well,” said Logz.io CEO Tomer Levy. “However, just as the ELK Stack lacks certain core components needed for effective operations, it also lacks robust security-specific features such as threat intelligence, a rule engine, AI, and integrations into security data sources. Logz.io Security Analytics brings these much-needed security features to the ELK Stack, enabling a fully proficient open source-based security solution.”

According to the vendor, Logz.io Security Analytics is compliant with PCI-1, SOC-2 Type 2, HIPAA, GDPR, and ISO-27001.

To learn more about Logz.io, go to https://logz.io.


Sponsors