LogRhythm
Acquisition in 2024
LogRhythm, Inc. is a leading developer of a security intelligence and analytics platform that addresses the growing risks of cyber threats. Founded in 2003 and based in Boulder, Colorado, the company specializes in unifying various security functions, including next-generation security information and event management (SIEM), log management, network and endpoint forensics, and user and entity behavior analytics. This comprehensive platform empowers organizations to detect, respond to, and neutralize cyber threats effectively, enhancing their security operations across cloud, physical, and virtual environments. In addition to its core offerings, LogRhythm provides professional services, compliance solutions, and training to support clients in various sectors, including finance, healthcare, and government. The platform's capabilities also extend to operational intelligence, threat detection, and compliance automation, making it essential for modern enterprise security operations. With a global presence, LogRhythm serves a diverse clientele, including Fortune 500 companies, ensuring robust protection against increasingly sophisticated cyber risks.
SkyFormation
Acquisition in 2019
SkyFormation Ltd., founded in 2014 and headquartered in Giv'at Shmuel, Israel, specializes in cloud data security solutions that help organizations safeguard their sensitive information. The company, now a subsidiary of Exabeam, Inc., provides a platform that enhances visibility into threats and compliance risks associated with cloud applications. Its offerings include a cloud access security broker that delivers detailed security information and detection rules, allowing businesses to monitor data flow, residency, and exposure while implementing rule-based policies for data protection. SkyFormation’s solutions operate without a network footprint and do not require a proxy, making them efficient and user-friendly. Additionally, the company offers a cloud applications discovery module that helps organizations manage and mitigate shadow IT risks.