No. LogRhythm Intelligence is available as an add-on to LogRhythm SIEM.
behavioral models
fact-based rules
context rules
UNDERSTAND NORMAL BEHAVIOR
Detect and prioritize anomalies
Exabeam led the way in 2014 as the first to integrate ML-driven user and entity behavior analytics (UEBA) with security information and event management (SIEM). Today, with LogRhythm Intelligence, Exabeam delivers the power of machine learning and generative AI to the LogRhythm SIEM Platform. Users gain the ability to establishes baseline behavior, auto-score events by risk, and accelerates triage, investigations, and response.

POWERFUL AGENT ASSISTANCE
Boost your team capabilities using intelligent agents
Exabeam Nova agents act as an extension to your SOC team, automating and simplifying both strategic and routine tasks. Whether it’s a review of your security posture, an analysis of detections, threat classifications, or case summaries, Exabeam Nova is powering workflows across security operations.
MACHINE DATA INTELLIGENCE (MDI) FABRIC
Security data you can trust
Ingest, parse, store, and search data at lightning speed. Advanced parsing, context enrichment, and a common schema prepares data in transit for rapid threat detection, visualization, and reporting.

THREAT DETECTION, INVESTIGATION, AND RESPONSE (TDIR)
Boost your security operations efficiency
Risk-based prioritization helps analysts triage, investigate, and respond to threats more effectively. LogRhythm Intelligence insights help you focus on critical threats, reducing the need for endless searches and improving response efficiency.

INTEGRATED USER EXPERIENCE
Never leave the LogRhythm user interface
Quickly and easily expand your self-hosted SIEM without adding new products or altering the user experience. Behavioral detections appear in your existing case management dashboard, and with LogRhythm Log Distribution Service detections are available from day one.
REALIZE THE FULL POTENTIAL OF YOUR SIEM
You can’t fight what you can’t see
Transform your SIEM with powerful new insights. Ingest logs, alerts, and telemetry, enrich them with threat intelligence, location, and user/host context, then run behavioral detections. Uncover insights that point products can’t detect.
How it Works
LogRhythm Intelligence functions as a UEBA log source within LogRhythm SIEM. As with any other log, you can build customizable dashboards, run and save searches, set alarms, and use SmartResponse™ automated actions. LogRhythm Intelligence integrates with the LogRhythm SIEM user experience, enabling analysts to incorporate behavior analytics into their existing TDIR workflow. Exabeam Nova provides threat insights using generative AI to make analysts more productive.


How can we help? Talk to an expert.
Contact UsFrequently Asked Questions
Is LogRhythm Intelligence available as a standalone product?
Is LogRhythm Intelligence self-hosted?
No. LogRhythm Intelligence leverages the cloud-native Exabeam New-Scale Platform to create a hybrid LogRhythm SIEM deployment.
What is the pricing of LogRhythm Intelligence?
Ask your sales representative for information on LogRhythm Intelligence pricing.
How long does it take to deploy LogRhythm Intelligence?
LogRhythm Intelligence is treated as a data source in LogRhythm SIEM. Deployment takes about the same amount of time as adding a new data source.
Does LogRhythm Intelligence give me better detection capabilities?
Yes. The insights provided using UEBA are broad. Not only do you get granular risk attached to your cases, but you can also support new uses cases such as insider threats.

“In the modern security landscape, the regular release of innovative products and AI tools ensures we have the necessary solutions to strengthen our defenses and respond to threats with speed and accuracy… Exabeam is a key part of our security strategy.”
See Exabeam in Action
Request more information or request a demo of the industry’s most powerful platforms for threat detection, investigation, and response (TDIR).
Learn more:
- If self-hosted or cloud-native SIEM is right for you
- How to ingest and monitor data at cloud scale
- Why seeing abnormal user and device behavior is critical
- How to automatically score and profile user activity
- See the complete picture using incident timelines
- Why playbooks help make the next right decision
- Support compliance mandates
Award-Winning Leaders in Security