70 LogRhythm Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • "I would recommend LogRhythm Network Monitor because it provides valuable insight into suspicious network activity with the ability to retain packet captures for more detailed analysis."

  • "With LogRhythm, we got the complete package without the need for customization. Other products would let us do what LogRhythm does, but we would have had to spend too much time and too many resources in setting up the data capture, getting the logs into a central system, and developing the reports we need. We were also concerned about unsupported devices."

  • "We evaluated a number of offerings but LogRhythm stood out as being more flexible and configurable than the others."

  • "Solution maintenance is never on my mind when using LogRhythm Cloud. It just runs. Instead of spending my first week setting up new hardware and software, I identified a new production use case. It was so valuable that we’re implementing the same technique across multiple other networks."

  • "When our organization identifies suspicious activity in the console, we use Network Monitor’s full packet capture capability to perform further analysis and gather evidence."

  • “LogRhythm has been very successful for us is in this year’s penetration test. I caught the pen testers five times in the course of their duties. That was just great ammunition to show that this works.”

  • "We were able to correlate internet activity and logon attempts with a brute-force attempt that our current cobbled-together reporting solution could not show us. It was immediately and visually apparent that someone was knocking at the door."

  • "We looked at a lot of products, but what sold me on LogRhythm was when Nick demonstrated the simple, straightforward way we can get real insight to our network. Everyone in IT can use it to be more effective. LogRhythm gets the information out of the realm of a subject matter expert and into the hands of more of the staff."

  • “The other vendors don’t have the features that LogRhythm has at the same price point. Other solutions require you to strap on components that come standard with LogRhythm. You might have to pay an extra 60 or 70 thousand dollars to get a correlation engine. The way LogRhythm is put together definitely made a difference that led us to choose this product.”

  • "I would absolutely say we have gotten a good ROI on this product. We have that comfort level that we're monitoring these systems and meeting that PCI compliance for our franchisees. LogRhythm has enabled us to achieve PCI compliance two years in a row now since we've started on this path."

  • “LogRhythm has been extremely efficient in helping us find the bad guys, who are really out there, targeting businesses like us. LogRhythm has given us the kind of insight we need to understand when those threats either are being recon-ed, found out, or when they’re really trying a brute force attack. It’s excellent for that.”

  • "The intelligence provided by [LogRhythm's] advanced correlation not only allows us to identify current threats, but also predict what might happen in the future. In addition to assisting with security monitoring, the LogRhythm solution has also proved useful in both identifying and resolving any networking errors that arise."

  • "LogRhythm provides great functionality that is easy to use, and it combines the best security features into its products. With LogRhythm, we can do more with less."

  • "We used to collect and manage log data manually, but with LogRhythm we can now automate this process and have a single view of the entire infrastructure. This means we can now spot even the tiniest of events, including those which would have been missed in the past."

  • “We got [LogRhythm] for PCI compliance for the most part, and we also do SOC 1 and SOC 2 compliance, so we can show that we’re secure to our clients. We have a lot of financial and other customers that care about security with the kind of business that we do. We want to have visibility into everything that is going on in our network, be able to respond, and do incident response using LogRhythm as our main console.”