"We were looking for a comprehensive system that would help us stay both compliant and secure, and it was clear that in order to achieve this efficiently, we needed a centralised, intelligent logging solution, with real-time monitoring, and 360 degree visibility across the network."
“Before the LogRhythm solution, if someone was trying to log in to a server with a local admin account, I would have no way of knowing that. Nothing would log it, audit it, and it would never show up. Now, I get an AI Engine alarm every time that happens, because it is considered a pass the hash attack.”
"My experience with LogRhythm has been extremely positive. As a SMB, we appreciate the knowledge and professionalism that the LogRhythm team was able to bring to the table. We put a lot of effort into selecting a SIEM solution and we are satisfied that the LogRhythm product meets our needs."
“The visibility LogRhythm has given us has been a game-changer. We operate on a network that has a large number of access points, which can be a challenge to monitor effectively. The insight we now have is unparalleled and gives us confidence that we can detect and mitigate a threat as soon as it appears. Furthermore, we are able to view activity on just one dashboard, which is incredibly convenient and time-saving. In fact, it takes us half the time it previously took us to determine the current state of security events, which has not only given our team back a lot of time and saved them unnecessary effort, but has also made our practice a safer place all round.”
"LogRhythm provides exactly the information that we need and the new web interface has improved it further as it shows anything that is important in a very clear and succinct way. With the new web interface it’s become easier for us to give operations or the IT service desk the ability to see what’s going on and receive proactive alerts. Rather than reacting to a help desk call, they can see something’s happening and escalate it internally so we don’t get a call from the end-user."
“For me, the [LogRhythm] NERC compliance modules are probably the best thing. And the system monitors, they really pick up a lot for me. It helps you get an eagle-eye view and then delve down granularly. The ease of that is pretty amazing.”
"With LogRhythm we generate results faster And we quickly find bad login attempts, multiple user IDs from the same IP address, and symptoms that show someone is trying to get into the system. It’s very simple to check the Windows, firewall and custom application logs, which is an important benefit—if someone is trying to get into the system, we need to know."
"I would absolutely say we have gotten a good ROI on this product. We have that comfort level that we're monitoring these systems and meeting that PCI compliance for our franchisees. LogRhythm has enabled us to achieve PCI compliance two years in a row now since we've started on this path."
"Solution maintenance is never on my mind when using LogRhythm Cloud. It just runs. Instead of spending my first week setting up new hardware and software, I identified a new production use case. It was so valuable that we’re implementing the same technique across multiple other networks."
“The most valuable feature of LogRhythm for me is the ability to correlate logs throughout many different log sources. Every different log has a different time stamp, it has a different user, things are in different places. But with LogRhythm you can take all of your logs from all the different sources and make them relevant to each other.”
"It's very easy to correlate patterns between different data types to find matches that one might not know to look for."
“We got [LogRhythm] for PCI compliance for the most part, and we also do SOC 1 and SOC 2 compliance, so we can show that we’re secure to our clients. We have a lot of financial and other customers that care about security with the kind of business that we do. We want to have visibility into everything that is going on in our network, be able to respond, and do incident response using LogRhythm as our main console.”
"There is no question LogRhythm’s Network Monitor helps Sera-Brynn quickly respond to cyber incidents. It enables us to detect lateral movement, command-and-control activity and other tell-tale actions of cyber adversaries with speed and precision so we can eliminate the threat quickly and mitigate risk for our clients."
"We now have insights into our network coupled with proactive capabilities that we3 never had before."
"LogRhythm provides a single view into all log and event data. Having meaningful data in one place empowers me to act quickly and precisely with appropriate security measures."