-
"LogRhythm was the obvious choice for us. It’s easy to set up, the web dashboard is very intuitive and easy to navigate, and the out-ofthe-box reporting is very important for us. For me in particular, the drill-down capability is a big selling point. I can investigate incidents quickly, whereas before …
-
"LogRhythm is a tool that would act as another person assigned to the department {without} the overhead cost of salary and benefits. In addition, LogRhythm allowed us to be more proactive when it came to our servers and management of IT."
-
"The product is easy to use and configure for most anything you want to monitor."
-
"We are alerted on a regular basis now – we get around 50 a day – which indicates how many potential threats we are facing. The good news is that we can now rest easy that we are doing everything we can to avoid suffering the consequences of a breach …
-
"We have complete visibility of our environment in a single view...remarkable in reducing time, costs and dramatically reducing false positives."
-
“For me, the [LogRhythm] NERC compliance modules are probably the best thing. And the system monitors, they really pick up a lot for me. It helps you get an eagle-eye view and then delve down granularly. The ease of that is pretty amazing.”
-
"We were able to correlate internet activity and logon attempts with a brute-force attempt that our current cobbled-together reporting solution could not show us. It was immediately and visually apparent that someone was knocking at the door."
-
"LogRhythm provides great functionality that is easy to use, and it combines the best security features into its products. With LogRhythm, we can do more with less."
-
“LogRhythm has been extremely efficient in helping us find the bad guys, who are really out there, targeting businesses like us. LogRhythm has given us the kind of insight we need to understand when those threats either are being recon-ed, found out, or when they’re really trying a brute force …
-
"It’s a great “batteries-included” platform that just works."
-
"Technical brilliance in detection and analysis is only one aspect in the task of evaluating a security intelligence solution. Efficient reporting has a similarly high value."
-
"LogRhythm ticked all of the boxes for us – it’s a leader in its space and the commercials were very attractive. As well as providing the tools to ensure PCI compliance, it also offered us the ability to manage non-security related events as well, so it made the most sense."
-
"Solution maintenance is never on my mind when using LogRhythm Cloud. It just runs. Instead of spending my first week setting up new hardware and software, I identified a new production use case. It was so valuable that we’re implementing the same technique across multiple other networks."
-
“[LogRhythm] gives me visibility of all the departments in my company, not just the IT department. I’m able to see the actions and behaviors of the whole company, not just on my campus, but remotely as well.”
-
"With LogRhythm we generate results faster And we quickly find bad login attempts, multiple user IDs from the same IP address, and symptoms that show someone is trying to get into the system. It’s very simple to check the Windows, firewall and custom application logs, which is an important benefit—if …