70 LogRhythm Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • “We had that experience of ‘I had no idea we could do that.”

  • “The other vendors don’t have the features that LogRhythm has at the same price point. Other solutions require you to strap on components that come standard with LogRhythm. You might have to pay an extra 60 or 70 thousand dollars to get a correlation engine. The way LogRhythm is put …

  • "We were able to correlate internet activity and logon attempts with a brute-force attempt that our current cobbled-together reporting solution could not show us. It was immediately and visually apparent that someone was knocking at the door."

  • “The most valuable feature of LogRhythm for me is the ability to correlate logs throughout many different log sources. Every different log has a different time stamp, it has a different user, things are in different places. But with LogRhythm you can take all of your logs from all the …

  • "Technical brilliance in detection and analysis is only one aspect in the task of evaluating a security intelligence solution. Efficient reporting has a similarly high value."

  • "There is no question LogRhythm’s Network Monitor helps Sera-Brynn quickly respond to cyber incidents. It enables us to detect lateral movement, command-and-control activity and other tell-tale actions of cyber adversaries with speed and precision so we can eliminate the threat quickly and mitigate risk for our clients."

  • "LogRhythm enabled us to see logs from our switches and firewalls that previously would have been missed, and would have resulted in the University's data processing systems being out of action for an extended period of time."

  • “Isn’t it time to stop the breaches and get one step ahead of the next threat? LogRhythm has won the Market Leader SIEM Solution and Market Leader User Behavior Analytics Solution Awards because they are an innovator that might actually help you reach this goal and defeat the next generation …

  • "With LogRhythm we generate results faster And we quickly find bad login attempts, multiple user IDs from the same IP address, and symptoms that show someone is trying to get into the system. It’s very simple to check the Windows, firewall and custom application logs, which is an important benefit—if …

  • "Given the completeness of the LogRhythm solution combined with its ease-of-use and implementation, I anticipate a rapid and substantial return on investment."

  • "LogRhythm provides great functionality that is easy to use, and it combines the best security features into its products. With LogRhythm, we can do more with less."

  • "LogRhythm’s time to value is great. You turn it on and immediately have visibility without excessive use case development lead times."

  • “We’re doing almost 10,000 EPS right now and we have anywhere between 5000 and 6000 servers, and a couple thousand network devices more or less. Our goal is pretty much to gather all those logs. Keeping track of when new servers are deployed and new network equipment gets put out …

  • "It's very easy to correlate patterns between different data types to find matches that one might not know to look for."

  • "We can now see what our systems are doing at any point in time. We pride ourselves on our efficiency, and LogRhythm has definitely improved ours by helping us automate as much as possible."