-
“With LogRhythm, people are only seeing what they need to see to complete their job. They’re not inundated with a slew of information irrelevant to them.”
-
"LogRhythm is easy and intuitive to use and has been imperative to Cardiff County Council achieving CoCo and GCSX compliance."
-
"LogRhythm enabled us to see logs from our switches and firewalls that previously would have been missed, and would have resulted in the University's data processing systems being out of action for an extended period of time."
-
"The product is easy to use and configure for most anything you want to monitor."
-
"LogRhythm offers a much more comprehensive and flexible search capability which makes it significantly quicker and easier to find information and run reports."
-
"It’s a great SIEM solution. We achieved PCI DSS and ISO 27001 with it."
-
"I would absolutely say we have gotten a good ROI on this product. We have that comfort level that we're monitoring these systems and meeting that PCI compliance for our franchisees. LogRhythm has enabled us to achieve PCI compliance two years in a row now since we've started on this …
-
“The most valuable feature of LogRhythm for me is the ability to correlate logs throughout many different log sources. Every different log has a different time stamp, it has a different user, things are in different places. But with LogRhythm you can take all of your logs from all the …
-
"With LogRhythm we generate results faster And we quickly find bad login attempts, multiple user IDs from the same IP address, and symptoms that show someone is trying to get into the system. It’s very simple to check the Windows, firewall and custom application logs, which is an important benefit—if …
-
"My experience with LogRhythm has been extremely positive. As a SMB, we appreciate the knowledge and professionalism that the LogRhythm team was able to bring to the table. We put a lot of effort into selecting a SIEM solution and we are satisfied that the LogRhythm product meets our needs."
-
"There is no question LogRhythm’s Network Monitor helps Sera-Brynn quickly respond to cyber incidents. It enables us to detect lateral movement, command-and-control activity and other tell-tale actions of cyber adversaries with speed and precision so we can eliminate the threat quickly and mitigate risk for our clients."
-
"LogRhythm provides exactly the information that we need and the new web interface has improved it further as it shows anything that is important in a very clear and succinct way. With the new web interface it’s become easier for us to give operations or the IT service desk the …
-
"The intelligence provided by [LogRhythm's] advanced correlation not only allows us to identify current threats, but also predict what might happen in the future. In addition to assisting with security monitoring, the LogRhythm solution has also proved useful in both identifying and resolving any networking errors that arise."
-
"LogRhythm provides a single view into all log and event data. Having meaningful data in one place empowers me to act quickly and precisely with appropriate security measures."
-
“[LogRhythm] gives me visibility of all the departments in my company, not just the IT department. I’m able to see the actions and behaviors of the whole company, not just on my campus, but remotely as well.”