-
"[Our organization] had a need for better network visibility with our internet facing links, LogRhythm’s Network Monitor gives us an efficient and cost effective means of doing that."
-
"With LogRhythm, we got the complete package without the need for customization. Other products would let us do what LogRhythm does, but we would have had to spend too much time and too many resources in setting up the data capture, getting the logs into a central system, and developing …
-
"Technical brilliance in detection and analysis is only one aspect in the task of evaluating a security intelligence solution. Efficient reporting has a similarly high value."
-
"The product is easy to use and configure for most anything you want to monitor."
-
"We can now see what our systems are doing at any point in time. We pride ourselves on our efficiency, and LogRhythm has definitely improved ours by helping us automate as much as possible."
-
“We can now see what our systems are doing at any point in time. We pride ourselves on our efficiency, and LogRhythm has definitely improved ours by helping us automate as much as possible.”
-
“LogRhythm has been very successful for us is in this year’s penetration test. I caught the pen testers five times in the course of their duties. That was just great ammunition to show that this works.”
-
“From the onset, LogRhythm fully understood our vision and what it would take to succeed. Together, our teams formulated a scalable, affordable plan that closely aligned with our business model and our broader mission to improve cyber-education of the people of the Commonwealth and the region.”
-
"Given the completeness of the LogRhythm solution combined with its ease-of-use and implementation, I anticipate a rapid and substantial return on investment."
-
“The most valuable feature of LogRhythm for me is the ability to correlate logs throughout many different log sources. Every different log has a different time stamp, it has a different user, things are in different places. But with LogRhythm you can take all of your logs from all the …
-
"We are alerted on a regular basis now – we get around 50 a day – which indicates how many potential threats we are facing. The good news is that we can now rest easy that we are doing everything we can to avoid suffering the consequences of a breach …
-
“We sent RFPs to three of the top SIEM solutions in the Gartner Magic Quadrant. Two solutions were very close in our final evaluation, but the reference calls for each solution made the difference. Because we have a small support staff, a solution with powerful incident response processes and automation …
-
“We’re doing almost 10,000 EPS right now and we have anywhere between 5000 and 6000 servers, and a couple thousand network devices more or less. Our goal is pretty much to gather all those logs. Keeping track of when new servers are deployed and new network equipment gets put out …
-
"LogRhythm ticked all of the boxes for us – it’s a leader in its space and the commercials were very attractive. As well as providing the tools to ensure PCI compliance, it also offered us the ability to manage non-security related events as well, so it made the most sense."
-
"As an early adopter, I’ve found that NetMon Freemium is one the most compelling tools for analyzing traffic and is an excellent resource for analysis."