-
"My experience with LogRhythm has been extremely positive. As a SMB, we appreciate the knowledge and professionalism that the LogRhythm team was able to bring to the table. We put a lot of effort into selecting a SIEM solution and we are satisfied that the LogRhythm product meets our needs."
-
“We’re thrilled to formalize our relationship with LogRhythm. LogRhythm’s powerful next-generation TLM technology, combined with our managed security services and cybersecurity team, provide our clients a world-class set of solutions to meet the challenges of today’s continually evolving threat landscape.”
-
“LogRhythm has been very successful for us is in this year’s penetration test. I caught the pen testers five times in the course of their duties. That was just great ammunition to show that this works.”
-
"We were looking for a comprehensive system that would help us stay both compliant and secure, and it was clear that in order to achieve this efficiently, we needed a centralised, intelligent logging solution, with real-time monitoring, and 360 degree visibility across the network."
-
"With LogRhythm, we got the complete package without the need for customization. Other products would let us do what LogRhythm does, but we would have had to spend too much time and too many resources in setting up the data capture, getting the logs into a central system, and developing …
-
"It’s a great SIEM solution. We achieved PCI DSS and ISO 27001 with it."
-
"LogRhythm is a tool that would act as another person assigned to the department {without} the overhead cost of salary and benefits. In addition, LogRhythm allowed us to be more proactive when it came to our servers and management of IT."
-
"There is no question LogRhythm’s Network Monitor helps Sera-Brynn quickly respond to cyber incidents. It enables us to detect lateral movement, command-and-control activity and other tell-tale actions of cyber adversaries with speed and precision so we can eliminate the threat quickly and mitigate risk for our clients."
-
"We are alerted on a regular basis now – we get around 50 a day – which indicates how many potential threats we are facing. The good news is that we can now rest easy that we are doing everything we can to avoid suffering the consequences of a breach …
-
"To meet PCI requirements and other data security mandates, organizations must have adequate controls for log management, including collection, review, retention and destruction. Automated and centralized solutions like LogRhythm are essential for companies to meet key parts of the PCI regulation. Coalfire has validated LogRhythm’s technology as meeting requirements under …
-
"LogRhythm ticked all of the boxes for us – it’s a leader in its space and the commercials were very attractive. As well as providing the tools to ensure PCI compliance, it also offered us the ability to manage non-security related events as well, so it made the most sense."
-
"It's very easy to correlate patterns between different data types to find matches that one might not know to look for."
-
"LogRhythm’s time to value is great. You turn it on and immediately have visibility without excessive use case development lead times."
-
“The visibility LogRhythm has given us has been a game-changer. We operate on a network that has a large number of access points, which can be a challenge to monitor effectively. The insight we now have is unparalleled and gives us confidence that we can detect and mitigate a threat …
-
"We can now see what our systems are doing at any point in time. We pride ourselves on our efficiency, and LogRhythm has definitely improved ours by helping us automate as much as possible."