Exabeam and LogRhythm merge to form new company and share details – Intelligent CISO

Published:

spot_img

Exabeam and LogRhythm Complete Merger and Announce New Company Details

Exabeam and LogRhythm have officially merged, creating a powerhouse in the cybersecurity industry. The combined organization will now operate under the Exabeam name, symbolizing the union of two industry giants while honoring the legacy of LogRhythm.

This merger marks a significant milestone in the cybersecurity space, as Exabeam unveils its roadmap and strategy to provide customers with a best-of-breed, AI-driven security solution. The Exabeam Security Operations Platform will serve as the foundation for the company’s future product offerings, empowering customers to combat sophisticated cyber threats.

The leadership team of the new organization comprises experienced executives from both companies, including Christopher O’Malley as Chief Executive Officer and Steve Wilson as Chief Product Officer. Their vision is to revolutionize cybersecurity by integrating cutting-edge technology with unmatched data integrity.

O’Malley stated, “We are on the brink of a revolutionary shift in cybersecurity. By merging cutting-edge, AI-driven technology from Exabeam with the unmatched data integrity of LogRhythm, we are setting a new, unparalleled standard for security operations.”

The company remains committed to quarterly launches of its cloud-native and on-premises SIEM offerings, focusing on empowering security teams to quickly and effectively mitigate complex threats. With a team of experienced leaders and a solid strategy in place, Exabeam is poised to lead the way in AI-driven cybersecurity solutions.

spot_img

Related articles

Recent articles

Iranian Hackers Breach US Gas Stations, CISA Launches KEV Nomination Form, and Industrial Router Exploitation Surges

Iranian Hackers Breach US Gas Stations, CISA Launches KEV Nomination Form, and Industrial Router Exploitation Surges Recent developments in cybersecurity have underscored the persistent vulnerabilities...

Saudi Telecom Company Dominates Middle East’s C2 Infrastructure with 72% of Active Servers

Saudi Telecom Company Dominates Middle East's C2 Infrastructure with 72% of Active Servers Recent research has unveiled a significant concentration of command-and-control (C2) infrastructure in...

Megalodon Cyberattack Compromises 5,561 GitHub Repositories with Malicious CI/CD Workflows

Megalodon Cyberattack Compromises 5,561 GitHub Repositories with Malicious CI/CD Workflows A recent automated cyber campaign, dubbed Megalodon, has alarmingly pushed 5,718 malicious commits across 5,561...

Vulnerability Exploitation Surges to 31%, Overtaking Stolen Credentials as Leading Cybersecurity Breach Method

Vulnerability Exploitation Surges to 31%, Overtaking Stolen Credentials as Leading Cybersecurity Breach Method Vulnerability exploitation has emerged as the predominant cause of cybersecurity breaches for...