-
“We’re doing almost 10,000 EPS right now and we have anywhere between 5000 and 6000 servers, and a couple thousand network devices more or less. Our goal is pretty much to gather all those logs. Keeping track of when new servers are deployed and new network equipment gets put out …
-
"LogRhythm's ability to handle huge amounts of log data, provide granular analysis of user behavior and comprehensive "out of the box" management reports were all drivers to select LogRhythm."
-
"LogRhythm was the obvious choice for us. It’s easy to set up, the web dashboard is very intuitive and easy to navigate, and the out-ofthe-box reporting is very important for us. For me in particular, the drill-down capability is a big selling point. I can investigate incidents quickly, whereas before …
-
"We were able to correlate internet activity and logon attempts with a brute-force attempt that our current cobbled-together reporting solution could not show us. It was immediately and visually apparent that someone was knocking at the door."
-
"We use LogRhythm for all logging and auditing. We have significantly enhanced our return time on getting executive reports out and the reports return much more information."
-
"The visibility and insight we now have with LogRhythm is unrivalled. Our IT team is now able to see exactly what’s happening across our network in real-time, which is helping us stay one step ahead of potential threats."
-
"To meet PCI requirements and other data security mandates, organizations must have adequate controls for log management, including collection, review, retention and destruction. Automated and centralized solutions like LogRhythm are essential for companies to meet key parts of the PCI regulation. Coalfire has validated LogRhythm’s technology as meeting requirements under …
-
“Before the LogRhythm solution, if someone was trying to log in to a server with a local admin account, I would have no way of knowing that. Nothing would log it, audit it, and it would never show up. Now, I get an AI Engine alarm every time that happens, …
-
"As an early adopter, I’ve found that NetMon Freemium is one the most compelling tools for analyzing traffic and is an excellent resource for analysis."
-
"When our organization identifies suspicious activity in the console, we use Network Monitor’s full packet capture capability to perform further analysis and gather evidence."
-
“We had that experience of ‘I had no idea we could do that.”
-
"My experience with LogRhythm has been extremely positive. As a SMB, we appreciate the knowledge and professionalism that the LogRhythm team was able to bring to the table. We put a lot of effort into selecting a SIEM solution and we are satisfied that the LogRhythm product meets our needs."
-
"We were looking for a comprehensive system that would help us stay both compliant and secure, and it was clear that in order to achieve this efficiently, we needed a centralised, intelligent logging solution, with real-time monitoring, and 360 degree visibility across the network."
-
"There is no question LogRhythm’s Network Monitor helps Sera-Brynn quickly respond to cyber incidents. It enables us to detect lateral movement, command-and-control activity and other tell-tale actions of cyber adversaries with speed and precision so we can eliminate the threat quickly and mitigate risk for our clients."
-
"Over the years, we’ve realised that network monitoring can no longer be done manually – there’s just too much at stake if something was to be missed. LogRhythm’s Security Intelligence Platform does this job for us, and it does it very well. We’ve subsequently been able to stick to a …