70 LogRhythm Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • “We’re thrilled to formalize our relationship with LogRhythm. LogRhythm’s powerful next-generation TLM technology, combined with our managed security services and cybersecurity team, provide our clients a world-class set of solutions to meet the challenges of today’s continually evolving threat landscape.”

  • "The combination of real-time monitoring and full-response capabilities have been critical for enabling us to detect and respond to threats quickly and efficiently. We’re confident in the ability of LogRhythm NetworkXDR to help other security teams realize the same time to value that LogRhythm has allowed us to realize."

  • "It's very easy to correlate patterns between different data types to find matches that one might not know to look for."

  • “We had that experience of ‘I had no idea we could do that.”

  • "LogRhythm’s NextGen SIEM Platform stood out as being best-in-breed after a year of testing multiple solutions. The visibility we now have is exceptional. Not only do we have access to data that reveals useful behavioural trends, we also have insight into network activity – both internal and external – in real-time, which means we can take action to neutralise a potential threat as soon as it appears."

  • "LogRhythm's ability to handle huge amounts of log data, provide granular analysis of user behavior and comprehensive "out of the box" management reports were all drivers to select LogRhythm."

  • “The most valuable feature of LogRhythm for me is the ability to correlate logs throughout many different log sources. Every different log has a different time stamp, it has a different user, things are in different places. But with LogRhythm you can take all of your logs from all the different sources and make them relevant to each other.”

  • "Solution maintenance is never on my mind when using LogRhythm Cloud. It just runs. Instead of spending my first week setting up new hardware and software, I identified a new production use case. It was so valuable that we’re implementing the same technique across multiple other networks."

  • "With LogRhythm we generate results faster And we quickly find bad login attempts, multiple user IDs from the same IP address, and symptoms that show someone is trying to get into the system. It’s very simple to check the Windows, firewall and custom application logs, which is an important benefit—if someone is trying to get into the system, we need to know."

  • "We looked at a lot of products, but what sold me on LogRhythm was when Nick demonstrated the simple, straightforward way we can get real insight to our network. Everyone in IT can use it to be more effective. LogRhythm gets the information out of the realm of a subject matter expert and into the hands of more of the staff."

  • “The other vendors don’t have the features that LogRhythm has at the same price point. Other solutions require you to strap on components that come standard with LogRhythm. You might have to pay an extra 60 or 70 thousand dollars to get a correlation engine. The way LogRhythm is put together definitely made a difference that led us to choose this product.”

  • “Before the LogRhythm solution, if someone was trying to log in to a server with a local admin account, I would have no way of knowing that. Nothing would log it, audit it, and it would never show up. Now, I get an AI Engine alarm every time that happens, because it is considered a pass the hash attack.”

  • "[Our organization] had a need for better network visibility with our internet facing links, LogRhythm’s Network Monitor gives us an efficient and cost effective means of doing that."

  • "Given the completeness of the LogRhythm solution combined with its ease-of-use and implementation, I anticipate a rapid and substantial return on investment."

  • "One of the best products I have seen in my 15-year IT career."