

LogRhythm SIEM and Microsoft Sentinel are leading Security Information and Event Management solutions. Microsoft Sentinel often appears to have an edge due to its advanced features and superior integration capabilities.
Features: LogRhythm SIEM is praised for its intuitive setup process, reliable data collection capabilities, and strong threat detection. Microsoft Sentinel excels with superior integration with other Microsoft services, advanced machine learning algorithms for threat analysis, and a more comprehensive feature set.
Room for Improvement: LogRhythm SIEM users request improvements in scalability, interface enhancements, and streamlined workflow. Microsoft Sentinel users seek better alert management, more transparent pricing, and improved setup complexity.
Ease of Deployment and Customer Service: LogRhythm SIEM receives positive feedback for straightforward deployment and responsive customer service. Microsoft Sentinel is commended for smooth integration with existing Microsoft environments but faces occasional setup challenges.
Pricing and ROI: LogRhythm SIEM is recognized for cost-effectiveness and tangible ROI. Microsoft Sentinel justifies its higher cost through advanced features and integration, with users deeming the investment worthwhile.
If a customer is already using Microsoft’s ecosystem, the ROI can be positive due to seamless integration.
Our MTTR, mean time to response, improved by forty to fifty percent. Earlier, medium-severity incidents took two to three hours to resolve. Now, after Microsoft Sentinel, it is forty to fifty-five minutes.
For example, time saving on incidents is 40 to 50%, and previously, incident analysis took two to three hours, whereas now it takes 30 to 60 minutes.
The technical support is good; we have a separate portal for partners, and since we are paying for the service, they provide a response timeframe based on severity—critical issues are addressed within four hours, medium issues within one day, and non-urgent issues may take a couple of days.
LogRhythm SIEM is quite complex, but that complexity allows us to specifically tailor a solution to the customer while some others are not as flexible.
Customer support is very helpful and effectively solves my problems.
Microsoft invests significantly in support, which is crucial for companies.
I believe Microsoft could improve by keeping customer service within the US for Microsoft Sentinel customers who are within state and federal government sectors.
Working with a Sentinel engineer helped us tune settings effectively.
LogRhythm SIEM is highly scalable as it has modular components allowing me to expand storage, indexing, or other resources as needed.
LogRhythm SIEM is scalable; it can handle about 200 or 500 devices without much difference.
The scalability of LogRhythm SIEM is good enough, warranting an eight out of ten rating.
There is no need to add hardware or redesign infrastructure because it is cloud-native.
As our organization uses Microsoft Azure and Defender, everything grows together, and we can integrate various features seamlessly.
Being a SaaS solution, the scalability of Microsoft Sentinel is robust.
The platform needs regular updates to fix problems encountered with each quarterly patch and version release.
LogRhythm SIEM still needs improvement regarding stability, particularly in environments with heavy data consumption.
I have never experienced any downtime, crashes, or performance issues with Microsoft Sentinel because it is SOC as a Service, so it maintains 100% uptime and scaling.
In the past two years, our team hasn't encountered any issues with the stability of Microsoft Sentinel from an operations perspective.
I need to be aware of deprecated connectors as they may disconnect, but the data continues to be sent with a need for quick adaptation.
I have noticed some problems with parsing errors, event mismatches, and data mismatching, so ensuring accurate parsing and continuous improvement according to device updates are my basic expectations as a detection engineer.
There is currently no way to determine how much data is being consumed in terms of gigabytes, terabytes, or petabytes from particular devices or environments.
If LogRhythm SIEM could make a lightweight version of their solution, that would be quite competitive because some of my customers have a very large need but refuse to go with LogRhythm SIEM due to its complexity and high resource intensity.
Log ingestion and retention costs can grow quickly, and understanding which data source is driving cost is not always straightforward.
Cost management could also be improved as log ingestion plus retention costs can grow quickly and need better native controls or visibility for optimization.
We have some tools, such as our off-site Meraki firewalls, that have not fully integrated with Sentinel.
The license cost is around $10 per MPS.
I find LogRhythm SIEM affordable, as it is a bit less costly than QRadar.
It has been beneficial that Microsoft Sentinel is included as part of the Microsoft package, making it more cost-effective.
Microsoft Sentinel is not a low-cost SIEM.
Microsoft Sentinel is provided at no cost, so we didn't have any issues with the cost.
The seamless integration for case management, along with a user-friendly dashboard user interface, makes tasks like threat hunting more efficient.
We have enough budget for cloud deployment, but we choose to keep it on-prem to ensure data privacy; cyberattacks are a concern, but data privacy is the foremost priority due to sensitive government information.
This helps SOC analysts significantly as they can monitor all log sources through a dashboard, quickly identifying which sources haven't reported within their specified timeframes.
Microsoft Sentinel's ability to correlate data from multiple sources and its detection capabilities are essential.
Microsoft Sentinel has improved cost efficiency, which is one of the key areas we're able to win business against the ability to have threat intelligence.
Microsoft Sentinel's ability to correlate data from multiple sources enhances our threat detection capabilities beyond what is a simple data lake solution by filtering out the noise and consolidating the signal down to a meaningful level that is easier to investigate and see.
| Product | Mindshare (%) |
|---|---|
| Microsoft Sentinel | 4.0% |
| LogRhythm SIEM | 2.5% |
| Other | 93.5% |

| Company Size | Count |
|---|---|
| Small Business | 38 |
| Midsize Enterprise | 39 |
| Large Enterprise | 83 |
| Company Size | Count |
|---|---|
| Small Business | 45 |
| Midsize Enterprise | 23 |
| Large Enterprise | 45 |
LogRhythm SIEM offers advanced threat intelligence, scalable deployment, and streamlined log management. It enhances security posture with AI-driven threat detection and comprehensive monitoring.
LogRhythm SIEM stands out for its AI-driven threat correlation, ease of log aggregation, and robust reporting. Offering real-time visibility and analytics through consistent navigation and dashboards, it integrates with security components for enhanced monitoring and response. Advanced threat intelligence and customizable alerts streamline processes and bolster security. While it faces challenges with log parsing, reporting, and dashboard intuitiveness, plans to enhance cloud integration and transition to Linux are noted.
What are the standout features?In industries like banking and finance, organizations utilize LogRhythm SIEM for centralized log management, security monitoring, and compliance. It helps detect insider threats, analyze server logs, correlate events, and monitor user behaviors. Appreciated for log ingestion and anomaly identification, it ensures robust cybersecurity and incident response by integrating data from multiple sources.
Microsoft Sentinel offers cloud-native SIEM and SOAR capabilities with AI-powered threat detection, automated responses, and integration with Microsoft products. It is designed for comprehensive threat management with flexible deployment and scalability.
Microsoft Sentinel provides centralized management of cloud-based security monitoring and incident detection. Leveraging AI capabilities, it enhances threat intelligence and automation, allowing users to streamline security operations across cloud and on-premises systems. Microsoft Sentinel efficiently aggregates logs, correlates security events from multiple sources, and integrates seamlessly with Microsoft security offerings such as Defender. While its flexible deployment options and robust automation through playbooks are advantageous, users may encounter challenges with integration outside of Microsoft products, potential log ingestion delays, and a complex query language. The platform would benefit from enhanced speed, a simplified interface, improved query performance, and stronger documentation support.
What are the most important features of Microsoft Sentinel?In specific industries, Microsoft Sentinel is utilized for its capability to monitor cloud-based workloads and detect incidents effectively. Users in healthcare, finance, and retail adopt it for its strong AI-driven threat detection and its ability to integrate with existing Microsoft solutions, ensuring high-level security operations and compliance with industry standards.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.