-
"We now have insights into our network coupled with proactive capabilities that we3 never had before."
-
“LogRhythm has been very successful for us is in this year’s penetration test. I caught the pen testers five times in the course of their duties. That was just great ammunition to show that this works.”
-
“The most valuable feature of LogRhythm for me is the ability to correlate logs throughout many different log sources. Every different log has a different time stamp, it has a different user, things are in different places. But with LogRhythm you can take all of your logs from all the …
-
"LogRhythm provides exactly the information that we need and the new web interface has improved it further as it shows anything that is important in a very clear and succinct way. With the new web interface it’s become easier for us to give operations or the IT service desk the …
-
"LogRhythm is a tool that would act as another person assigned to the department {without} the overhead cost of salary and benefits. In addition, LogRhythm allowed us to be more proactive when it came to our servers and management of IT."
-
"LogRhythm’s time to value is great. You turn it on and immediately have visibility without excessive use case development lead times."
-
"When our organization identifies suspicious activity in the console, we use Network Monitor’s full packet capture capability to perform further analysis and gather evidence."
-
"Solution maintenance is never on my mind when using LogRhythm Cloud. It just runs. Instead of spending my first week setting up new hardware and software, I identified a new production use case. It was so valuable that we’re implementing the same technique across multiple other networks."
-
"To meet PCI requirements and other data security mandates, organizations must have adequate controls for log management, including collection, review, retention and destruction. Automated and centralized solutions like LogRhythm are essential for companies to meet key parts of the PCI regulation. Coalfire has validated LogRhythm’s technology as meeting requirements under …
-
"The intelligence provided by [LogRhythm's] advanced correlation not only allows us to identify current threats, but also predict what might happen in the future. In addition to assisting with security monitoring, the LogRhythm solution has also proved useful in both identifying and resolving any networking errors that arise."
-
"Over the years, we’ve realised that network monitoring can no longer be done manually – there’s just too much at stake if something was to be missed. LogRhythm’s Security Intelligence Platform does this job for us, and it does it very well. We’ve subsequently been able to stick to a …
-
"We are alerted on a regular basis now – we get around 50 a day – which indicates how many potential threats we are facing. The good news is that we can now rest easy that we are doing everything we can to avoid suffering the consequences of a breach …
-
“We got [LogRhythm] for PCI compliance for the most part, and we also do SOC 1 and SOC 2 compliance, so we can show that we’re secure to our clients. We have a lot of financial and other customers that care about security with the kind of business that we …
-
"One of the best products I have seen in my 15-year IT career."
-
"LogRhythm has given us network visibility, transforming how we monitor and manage our IT infrastructure and applications."