70 LogRhythm Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • "To meet PCI requirements and other data security mandates, organizations must have adequate controls for log management, including collection, review, retention and destruction. Automated and centralized solutions like LogRhythm are essential for companies to meet key parts of the PCI regulation. Coalfire has validated LogRhythm’s technology as meeting requirements under …

  • "LogRhythm’s time to value is great. You turn it on and immediately have visibility without excessive use case development lead times."

  • "LogRhythm enabled us to see logs from our switches and firewalls that previously would have been missed, and would have resulted in the University's data processing systems being out of action for an extended period of time."

  • “We got [LogRhythm] for PCI compliance for the most part, and we also do SOC 1 and SOC 2 compliance, so we can show that we’re secure to our clients. We have a lot of financial and other customers that care about security with the kind of business that we …

  • “The most valuable feature of LogRhythm for me is the ability to correlate logs throughout many different log sources. Every different log has a different time stamp, it has a different user, things are in different places. But with LogRhythm you can take all of your logs from all the …

  • "LogRhythm offers a much more comprehensive and flexible search capability which makes it significantly quicker and easier to find information and run reports."

  • "LogRhythm is easy and intuitive to use and has been imperative to Cardiff County Council achieving CoCo and GCSX compliance."

  • "We have complete visibility of our environment in a single view...remarkable in reducing time, costs and dramatically reducing false positives."

  • "We are alerted on a regular basis now – we get around 50 a day – which indicates how many potential threats we are facing. The good news is that we can now rest easy that we are doing everything we can to avoid suffering the consequences of a breach …

  • "I would absolutely say we have gotten a good ROI on this product. We have that comfort level that we're monitoring these systems and meeting that PCI compliance for our franchisees. LogRhythm has enabled us to achieve PCI compliance two years in a row now since we've started on this …

  • "Now we get the insight we need to troubleshoot problems and fix recurring issues. We’re going to automate as much as we can to free up people from manual tasks, and AI Engine will reduce our alerts so we can focus on the most critical situations and keep our business …

  • "Technical brilliance in detection and analysis is only one aspect in the task of evaluating a security intelligence solution. Efficient reporting has a similarly high value."

  • “For me, the [LogRhythm] NERC compliance modules are probably the best thing. And the system monitors, they really pick up a lot for me. It helps you get an eagle-eye view and then delve down granularly. The ease of that is pretty amazing.”

  • "It's very easy to correlate patterns between different data types to find matches that one might not know to look for."

  • "When our organization identifies suspicious activity in the console, we use Network Monitor’s full packet capture capability to perform further analysis and gather evidence."