70 LogRhythm Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • “We sent RFPs to three of the top SIEM solutions in the Gartner Magic Quadrant. Two solutions were very close in our final evaluation, but the reference calls for each solution made the difference. Because we have a small support staff, a solution with powerful incident response processes and automation combined with quality support services was very important to us.”

  • “Before the LogRhythm solution, if someone was trying to log in to a server with a local admin account, I would have no way of knowing that. Nothing would log it, audit it, and it would never show up. Now, I get an AI Engine alarm every time that happens, because it is considered a pass the hash attack.”

  • “We can now see what our systems are doing at any point in time. We pride ourselves on our efficiency, and LogRhythm has definitely improved ours by helping us automate as much as possible.”

  • "We were looking for a comprehensive system that would help us stay both compliant and secure, and it was clear that in order to achieve this efficiently, we needed a centralised, intelligent logging solution, with real-time monitoring, and 360 degree visibility across the network."

  • "One of the best products I have seen in my 15-year IT career."

  • "LogRhythm is a good business investment and a tool that gives us peace of mind. If the worst were to happen, the forensic examiners will have relevant data to analyse in order to prevent any further and future damage. If we didn’t have LogRhythm, it would be a near impossible task."

  • "Given the completeness of the LogRhythm solution combined with its ease-of-use and implementation, I anticipate a rapid and substantial return on investment."

  • "LogRhythm provides us with much greater visibility of all data centre activity from a single interface, something we never previously had."

  • "With LogRhythm, we got the complete package without the need for customization. Other products would let us do what LogRhythm does, but we would have had to spend too much time and too many resources in setting up the data capture, getting the logs into a central system, and developing the reports we need. We were also concerned about unsupported devices."

  • “The most valuable feature of LogRhythm for me is the ability to correlate logs throughout many different log sources. Every different log has a different time stamp, it has a different user, things are in different places. But with LogRhythm you can take all of your logs from all the different sources and make them relevant to each other.”

  • "With LogRhythm we generate results faster And we quickly find bad login attempts, multiple user IDs from the same IP address, and symptoms that show someone is trying to get into the system. It’s very simple to check the Windows, firewall and custom application logs, which is an important benefit—if someone is trying to get into the system, we need to know."

  • "To meet PCI requirements and other data security mandates, organizations must have adequate controls for log management, including collection, review, retention and destruction. Automated and centralized solutions like LogRhythm are essential for companies to meet key parts of the PCI regulation. Coalfire has validated LogRhythm’s technology as meeting requirements under PCI and industry standards and best practices for this key control area."

  • "LogRhythm’s NextGen SIEM Platform stood out as being best-in-breed after a year of testing multiple solutions. The visibility we now have is exceptional. Not only do we have access to data that reveals useful behavioural trends, we also have insight into network activity – both internal and external – in real-time, which means we can take action to neutralise a potential threat as soon as it appears."

  • "It's very easy to correlate patterns between different data types to find matches that one might not know to look for."

  • "There is no question LogRhythm’s Network Monitor helps Sera-Brynn quickly respond to cyber incidents. It enables us to detect lateral movement, command-and-control activity and other tell-tale actions of cyber adversaries with speed and precision so we can eliminate the threat quickly and mitigate risk for our clients."