It's allowed us to have more visibility into our network as well as be able to respond more quickly to incidents seen on the network.
Senior Manager IT Security at Virginia Premier Health
Allows us to be more defensive, have a better security posture, and be more prepared for anything that occurs
How has it helped my organization?
What is most valuable?
- Being able to gather logs in one place
- Being able to process them and generate alarms
What needs improvement?
I work in a highly regulated industry. I know the product has compliance mechanisms, but being able to get more governance surrounding some of the compliance. Merging things that we have to be on top of would be helpful.
What do I think about the scalability of the solution?
LogRhythm has been able to show that their products are very scalable. Usually, when you buy things that are out of boxes, you get them, they're old. But the new enhancements and things that LogRhythm continues to integrate allow you to scale up with them as they grow. They scale with you also.
Buyer's Guide
LogRhythm SIEM
April 2025

Learn what your peers think about LogRhythm SIEM. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
849,963 professionals have used our research since 2012.
How are customer service and support?
I've used tech support. They're very helpful, very knowledgeable people who genuinely care about you and want to see not just their product but you, as a company, be successful.
Which solution did I use previously and why did I switch?
This is our first iteration of SIEM at my organization. At the time, my superior had used Splunk previously, and that was what he was a fan of. But LogRhythm is one of the emerging leaders, price point was very important, and also to be with a company that's on the cutting edge of technology.
How was the initial setup?
I think that anytime you're integrating SIEM monitoring tools into an environment, it is complex, but the LogRhythm Professional Services help make things easier, and I've worked with them every step of the way.
What other advice do I have?
It's very important to our organization that the solution be a unified end-to-end solution.
I don't think any company is perfect, but I know that they're striving, and that's why I give them such a high score.
I understand that whatever you're buying with LogRhythm, it is not going to be static. It's a very dynamic company and a lot of new technologies emerge, so ensuring that you get the proper level of training upfront, as well as continued training for your staff, is important for being able to wrap your hands around what LogRhythm is actually doing and where they're going.
You start to talk about some things like blockchain and quantum, I'm sure that LogRhythm is already researching some of those new computer technologies. I didn't know what to expect back in 2015 when we bought the product, but it's showing to be agile, scalable, and the people are very knowledgeable.
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Senior Information Systems Specialist at a manufacturing company with 1,001-5,000 employees
Our team has been able to correlate security events and react quicker to incidents, though retrieving logs that have been archived can be difficult and time consuming.
What is most valuable?
The product was easy to deploy and easy to learn how to use. The web console is the best I’ve seen when compared to other SIEMs.
How has it helped my organization?
This product has made it easier for our team to correlate security events and react quicker to incidents.
What needs improvement?
Retrieving logs that have been archived can be a difficult and time consuming process. The module which performs this, called the Second Look Wizard is not very well integrated into the rest of the product. It would be nice if you had the ability to right click on a log and search the archives for more data like it (you can do this with non-archived logs) and then after restoring archived logs, easily pivot to an investigation for that data. Currently, those 3 steps all have to be run separately.
For how long have I used the solution?
I've used it for five months.
What was my experience with deployment of the solution?
The deployment was very smooth.
What do I think about the stability of the solution?
There were occasional stability problems, but they were resolved by support in a timely fashion.
What do I think about the scalability of the solution?
No issues encountered.
How are customer service and technical support?
Customer Service:
Excellent, everyone I have worked with at LogRhythm has been courteous and helpful.
Technical Support:Technical support has been very good, and they will often go out of their way to help correct an issue, even if it is not a technical issue with the product.
Which solution did I use previously and why did I switch?
This is our first SIEM.
How was the initial setup?
The initial setup was done with the help of LogRhythm Professional Services and was fairly straightforward. Our version of the software is integrated into one hardware unit which made it easy to setup and understand.
What about the implementation team?
We implemented with LogRhythm Professional Services and the engineer I worked with was very thorough and knowledgable.
What's my experience with pricing, setup cost, and licensing?
Pricing was on the higher end when compared to other products we looked at. However, we felt the advantages with LogRhythm justified the price premium. Licensing is fair and straightforward. We evaluated SIEMs from AlienVault, Tripwire, and Solarwinds.
Which other solutions did I evaluate?
We evaluated SIEMs from AlienVault, Tripwire, and Solarwinds.
What other advice do I have?
If implementing a SIEM for the first time, it is very important to have members of the network and server teams involved from the beginning. Also, strong change management policies are necessary to keep the SIEM implemented properly.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
LogRhythm SIEM
April 2025

Learn what your peers think about LogRhythm SIEM. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
849,963 professionals have used our research since 2012.
security solutions integrator at a consultancy with 1-10 employees
The GUI is easy to explore, and it integrates well with other security solutions
Pros and Cons
- "LogRhythm's GUI is easy to explore. We also like other features, such as its integration with other security solutions, log correlation, and the deployment of use cases."
- "LogRhythm's SOAR and NDR features don't stack up well against competitors. maybe integrating theme functionality as the other do. But in general, it's okay."
What is most valuable?
LogRhythm's GUI is easy to explore. We also like other features, such as its integration with other security solutions, log correlation, and the deployment of use cases.
What needs improvement?
LogRhythm's SOAR and NDR features don't stack up well against competitors.
maybe integrating theme functionality as the other do. But in general, it's okay.
For how long have I used the solution?
We started with LogRhythm about three years ago.
What do I think about the stability of the solution?
LogRhythm is stable.
What do I think about the scalability of the solution?
Scalability is a matter of cost. LogRhythm has the technical capacity to scale if you pay for the components and licenses.
How are customer service and support?
LogRhythm's support is good.
How was the initial setup?
Setting up LogRhythm is straightforward. It is not complicated.
What's my experience with pricing, setup cost, and licensing?
We work with French-speaking African countries, and it costs more than the average SIEM solution. Also, the pricing isn't too flexible. AlienVault, Splunk, and IBM QRadar are more suitable for customers on a tight budget.
What other advice do I have?
I rate LogRhythm eight out of 10. With any solution, you need to deploy the use cases correctly, so the customer should understand the use cases for a SIEM. An SIEM solution only collects and centralizes logs instead of detecting unknown malware. There are no use cases that are customized to fit the customers' context.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Cyber Security Researcher at a tech services company with 1-10 employees
Stable with an easy initial setup and good security
Pros and Cons
- "The initial setup is pretty easy."
- "For our market, the solution is quite expensive. It would be ideal if they could work on and improve their existing pricing plans to help make it more affordable in our country."
What is our primary use case?
We typically consult with our clients and help them with necessary services.
What is most valuable?
The UEBA flow is the most useful aspect of the solution.
The initial setup is pretty easy.
While the cost is high, the security provided is quite good, and for those who can afford it, they will pay for the peace of mind.
What needs improvement?
I'm not a fan of the system's user interface.
For our market, the solution is quite expensive. It would be ideal if they could work on and improve their existing pricing plans to help make it more affordable in our country.
We'd like it if the solution could be more customizable in future releases.
For how long have I used the solution?
We've been dealing with the solution for about a year.
What do I think about the stability of the solution?
The solution is quite stable. There aren't issues related to bugs or glitches. It doesn't crash. It's reliable.
What do I think about the scalability of the solution?
The solution can scale if a client needs it to.
We have clients that have 10-15 users on the solution. They are mostly security analysts. In terms of those that can actually view and escalate cases, there may only be five with such access.
At this point, there aren't any plans to increase usage.
How are customer service and technical support?
We typically are the ones that handle technical support for our clients if they run into issues.
How was the initial setup?
The initial setup is not complicated. It's quite easy and very straightforward if you follow the guides provided. I followed the guides and found it to be rather simple. It's not difficult to get everything up and running.
The deployment doesn't take too long. You can have it ready to go in one working day. That includes installation and configuration.
We have a minimum of five people who handle maintenance and deployments.
What about the implementation team?
Our company handles the installation for our clients. We can handle the implementation ourselves. We don't need a separate consultant or integrator.
What's my experience with pricing, setup cost, and licensing?
In our market, for the price it costs, our clients aren't using this solution so much. It seems to be quite expensive in Nepal. That said, even with the fees and a rather high cost, it is the best product among other competitors.
What other advice do I have?
We're partners with LogRhythm.
We don't technically use the solution typically. We consult with clients and advise on products. We also provide services on the solutions we offer. In this case, we do use the product as we log issues.
We use the latest version of the solution.
For our customers, the pricing will scare off many. However, if users are concerned more with the security of their account, they'll find this is a good option.
I would recommend the product. On a scale from one to ten, I'd rate it at an eight.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Security Analyst 3 at a comms service provider with 1,001-5,000 employees
It is a single pane of glass for all of the logs
What is most valuable?
- The user interface (UI)
- Ease of use, especially if you are starting off
- The AI
How has it helped my organization?
Key challenges and goals: Anytime you are building a program from the ground up, there is a lot of legwork to be done to get things tuned to the point where they are usable.
Effectiveness of solution in meeting security challenges and goals: It is very effective. It is a single pane of glass for all of the logs, that not just myself, but anybody who is looking for information about how the network is behaving can use. So, not just primarily a security tool, it is a tool for everybody if it is set up that way.
What needs improvement?
We run across the odd vendor which we are using that we think are large players in their environment, but there is not necessarily a native support for their log ingestion per se, where it requires customization in order to be able to parse and accept their logs. I would also like to see them expand on some of the ability to interact with other technologies in real time via the programming platforms.
What was my experience with deployment of the solution?
It pre-existed before I got there. Once it was deployed, I have been responsible for most of the log ingestion and the tuning efforts.
What do I think about the scalability of the solution?
It seems scalable so far. I have not had to add more devices to our deployment yet, but it has yet to be discovered.
How are customer service and technical support?
We have used LogRhythm tech support and they are excellent. They have been very helpful.
Which solution did I use previously and why did I switch?
This is our first adoption of a proper SIEM product, so there is really nothing to compare it to with respect to the job that I am in right now.
How was the initial setup?
It pre-existed before I got there.
What other advice do I have?
I am very happy with the solution right now. I would absolutely recommend it and have.
Most of the basics have been tended to, and as we discover other things that we need to get more data on, and they are brought up, the company addresses them.
The most important criteria when selecting a vendor: It is very important for it to be unified.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Security Administrator at a tech services company
The artificial intelligence engine is its most valuable feature
Pros and Cons
- "The artificial intelligence engine."
- "More help and assistance with some of the open source products, everything seems to be focused on Windows versus giving some guidance and some documentation on how to use it."
How has it helped my organization?
We're in the process of a rollout right now. But from what I've seen, it will definitely be a huge benefit.
Our impression is the solution will be excellent toward meeting our meeting our existing security challenges.
Our biggest challenge right now, there is a big push towards docker containers and trying to wrap my head around how we are going to monitor and provide security for that.
What is most valuable?
The artificial intelligence engine.
What needs improvement?
Focus on open source, long sources like Linux and Docker, and those kind of things. More help and assistance with some of the open source products, everything seems to be focused on Windows versus giving some guidance and some documentation on how to use it. This seems to be lacking.
It would be a huge help if there were some guidelines or some new technologies that were developed specifically for that.
What do I think about the stability of the solution?
It seems pretty stable. I'm not had any issues with it.
What do I think about the scalability of the solution?
It seems like you could grow it horizontally. The solution that we have, it is the one that can split out with a couple of different data indexers and data processors. However, we are still in the roll-out phase.
How are customer service and technical support?
They were excellent and very knowledgeable.
Which solution did I use previously and why did I switch?
No, just some open source type of things.
We searched for a security solution because it is such a huge surface area to cover for a very small security shop. It is just two of us, and we have about 5,000 servers. It is a lot.
How was the initial setup?
I was involved in the initial setup. It was somewhat straightforward, somewhat complex. There are a lot of moving parts.
If they had some type of a script, which you could run depending on the solution and what boxes you have. A script that would just go and automatically configure things and get that part of it done, then you could focus on getting the events in, things like that.
What's my experience with pricing, setup cost, and licensing?
I would recommend that whatever sales quotes to them upfront, they will probably go up. Because they are probably going to outgrow that very quickly or once they start getting everything into it, they are going to have to move up anyway. Better to do it upfront and have that headroom.
Which other solutions did I evaluate?
We were evaluating Splunk, and also QRadar.
We chose LogRhythm because the price point was within what we were looking to pay. It seemed like a more mature solution than some of the others.
What other advice do I have?
A unified end-to-end platform solution is important but I understand that there will be different tools for different jobs. LogRhythm, that is their sweet spot and I hope they stay there because they do it really well.
Most important criteria when selecting a vendor: It is about the integrations with all the different products that we are using. LogRhythm seem to have most of those boxes checked. Therefore, it was a good fit for us.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Security Architect at a leisure / travel company
Facilitates aggregating all the logs into a single platform, and then doing real-time monitoring
How has it helped my organization?
We used to use a third-party vendor. We migrated to an in-house security operation center, so it's been a big difference.
What is most valuable?
We're doing almost 10,000 EPS right now and we have anywhere between 5000 and 6000 servers, and a couple thousand network devices more or less.
Our goal is pretty much to gather all those logs. Keeping track of when new servers are deployed and new network equipment gets put out there and then have them report to LogRythm. That's mainly the biggest challenge so far.
Mostly for us the most valuable feature is its aggregation of all the logs into a single platform, and then doing the real-time monitoring based on that.
Also, the real-time monitoring piece of it, that's extremely valuable. Plus you can tweak a lot of their settings while other systems don't really let you.
What needs improvement?
Dashboards, reports. Right now I know there's a big issue with reporting. It's challenging, at least for us, to do some of the reporting within the system itself. Hopefully that's something that gets improved.
Also, when you're reaching out to any other solution out there, any third party, most of them have integrations with Splunk; that's something that it's lacking on the LogRythm side. They're lagging behind when it comes to integration to main platforms.
So hopefully, with the help of the entire community, we can build something a little bit more flexible when it comes to integrations.
What do I think about the scalability of the solution?
We had some issues. Unfortunately, it was not sized properly from the beginning. But now with the additional boxes on everything, so far it's pretty solid.
How are customer service and technical support?
They're pretty good. Sometimes I wish they would be a little bit quicker getting back to you, at least when you open a ticket, but apart from that they're pretty good. We usually do reach the right person within the SLAs they have.
Which solution did I use previously and why did I switch?
We were using a third party, Dell SecureWorks. We wanted to go away from that and go into more of a centralized system in-house. We went through a bunch of factors and LogRhythm came out on the top.
How was the initial setup?
It was good. We have a lot of collectors, we ended up having almost 50 collectors in total, so it was a little bit challenging, but it's not bad.
Which other solutions did I evaluate?
- Curator Security
- Splunk
- ArcSight
We took it as far as they were able to help us with very specific things we do as a company, and LogRhythm came out on top.
What other advice do I have?
We're migrating to a dumb-terminal type of environment. That's the end goal that we have, because we have noticed that there's no way for us to secure everything. There's really no way. So having the users centralized into one location, it makes a big, big difference.
So far it's working fine. Like I said, we had some little things here and there but we've revised the architecture and now it's good.
For selecting a vendor we had a matrix. There were a bunch of points that we were trying to cover. How easy is it to use? For Roger's group, for example, to see how easy it was to adapt from the GUI base to the console.
In terms of a unified, end-to-end platform, I'd say we're not married to specific vendors or companies, that's the nature of our business, at least how we run. But it's good to have everything in one solution.
If I had a colleague at another company researching this and other SIEM security tools, I would give him my matrix.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
An extremely valuable correlation engine that uses machine learning to identify network issues
Pros and Cons
- "The correlation engine is extremely valuable because it uses machine learning to process information from the central manager and identifies issues in the network."
- "The security playbook could be pre-defined and available to other analysts with similar security issues."
What is our primary use case?
Our company manages the solution as a threat hunting platform for a semi-government client in the Hong Kong insurance industry. We collect logs for video, active directories, antivirus, and firewalls to consolidate them in the solution.
From the central log collector, we build detection policies to identify threats or possible breaches. The solution also serves as a data storage platform to troubleshoot issues and find root causes.
In addition, logs that include performance data are created for devices such as routers and switches to monitor the availability of the office network.
We also perform ongoing maintenance of the solution and all components to ensure everything runs smoothly.
What is most valuable?
The correlation engine is extremely valuable because it uses machine learning to process information from the central manager and identifies issues in the network.
The engine accurately and quickly identifies problem areas as it correlates events from various devices.
Without this engine, logs would have to be built individually for each device.
What needs improvement?
The security playbook could be pre-defined and available to other analysts with similar security issues. Currently, playbooks are individually written for various actions and threats.
It would be faster and easier to react to issues if pre-defined playbooks were accessible to all analysts.
For how long have I used the solution?
I have been using the solution for seventeen years.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
The solution is scalable.
How are customer service and support?
I have escalated issues to technical support and rate the assistance I received an eight out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is complex and I rate it a six out of ten.
What about the implementation team?
We implement the solution for our customers.
Which other solutions did I evaluate?
The solution remains a top choice for our customers because of its performance, indexing rate, and coalition engine speed. Customers trying to use SIEM to collect logs and identify threats require a solution that responds quickly.
The solution's correlation engine is very important because it uses machine learning to automatically collect and analyze quite a bit of data.
What other advice do I have?
When choosing a solution, it is important to determine what you want to achieve instead of how the solution works. Most solutions have a method for collecting logs, relaying information, and identifying issues so selection is more about the speed and accuracy of end results.
I rate the solution an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner

Buyer's Guide
Download our free LogRhythm SIEM Report and get advice and tips from experienced pros
sharing their opinions.
Updated: April 2025
Popular Comparisons
CrowdStrike Falcon
Microsoft Sentinel
Splunk Enterprise Security
IBM Security QRadar
Elastic Security
Rapid7 InsightIDR
Fortinet FortiSIEM
AlienVault OSSIM
Sumo Logic Security
Securonix Next-Gen SIEM
Google Chronicle Suite
Exabeam
ManageEngine Log360
Sentinel
Buyer's Guide
Download our free LogRhythm SIEM Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Between AlienVault and LogRhythm, which solution is suitable for Banks in Gulf Region
- IBM QRadar is rated above competitors (McAfee, Splunk, LogRhythm) in Gartner's 2020 Magic Quandrant. Agree/Disagree?
- Does LogRhythm NextGen SIEM offer good security?
- What Solution for SIEM is Best To Be NIST 800-171 Compliant?
- When evaluating Security Information and Event Management (SIEM), what aspect do you think is the most important feature to look for?
- What are the main differences between Nessus and Arcsight?
- What's The Best Way to Trial SIEM Solutions?
- Which is the best SIEM solution for a government organization?
- What is the difference between IT event correlation and aggregation?
- What Is SIEM Used For?