-
"We now have insights into our network coupled with proactive capabilities that we3 never had before."
-
“From the onset, LogRhythm fully understood our vision and what it would take to succeed. Together, our teams formulated a scalable, affordable plan that closely aligned with our business model and our broader mission to improve cyber-education of the people of the Commonwealth and the region.”
-
"LogRhythm enabled us to see logs from our switches and firewalls that previously would have been missed, and would have resulted in the University's data processing systems being out of action for an extended period of time."
-
"We were able to correlate internet activity and logon attempts with a brute-force attempt that our current cobbled-together reporting solution could not show us. It was immediately and visually apparent that someone was knocking at the door."
-
"The product is easy to use and configure for most anything you want to monitor."
-
"We are alerted on a regular basis now – we get around 50 a day – which indicates how many potential threats we are facing. The good news is that we can now rest easy that we are doing everything we can to avoid suffering the consequences of a breach …
-
"As an early adopter, I’ve found that NetMon Freemium is one the most compelling tools for analyzing traffic and is an excellent resource for analysis."
-
"The intelligence provided by [LogRhythm's] advanced correlation not only allows us to identify current threats, but also predict what might happen in the future. In addition to assisting with security monitoring, the LogRhythm solution has also proved useful in both identifying and resolving any networking errors that arise."
-
"We looked at a lot of products, but what sold me on LogRhythm was when Nick demonstrated the simple, straightforward way we can get real insight to our network. Everyone in IT can use it to be more effective. LogRhythm gets the information out of the realm of a subject …
-
“The other vendors don’t have the features that LogRhythm has at the same price point. Other solutions require you to strap on components that come standard with LogRhythm. You might have to pay an extra 60 or 70 thousand dollars to get a correlation engine. The way LogRhythm is put …
-
“LogRhythm has been very successful for us is in this year’s penetration test. I caught the pen testers five times in the course of their duties. That was just great ammunition to show that this works.”
-
“We had that experience of ‘I had no idea we could do that.”
-
"LogRhythm ticked all of the boxes for us – it’s a leader in its space and the commercials were very attractive. As well as providing the tools to ensure PCI compliance, it also offered us the ability to manage non-security related events as well, so it made the most sense."
-
“The most valuable feature of LogRhythm for me is the ability to correlate logs throughout many different log sources. Every different log has a different time stamp, it has a different user, things are in different places. But with LogRhythm you can take all of your logs from all the …
-
"With LogRhythm, we got the complete package without the need for customization. Other products would let us do what LogRhythm does, but we would have had to spend too much time and too many resources in setting up the data capture, getting the logs into a central system, and developing …