Unit Head Titanium (Security Solution) at RapidCompute
Real User
Great features with good cloud functionality and excellent technical support
Pros and Cons
  • "Technical support is very helpful and responsive."
  • "Parsing is totally controlled by LogRhythm and they do not allow any partner or any third-party to handle this part and this is a key challenge on my end."

What is most valuable?

We really appreciate the new cloud functionality. The cloud is really showing its dominance. 

Technical support is very helpful and responsive.

The product has a lot of useful features.

What needs improvement?

There aren't really any missing features. It's quite a complete solution.

Most of the clients using the on-prem are using customized applications. In the customized applications, we are facing parsing issues and a minimum of two days is required by the LogRhythm team for parsing logs. 

Parsing is totally controlled by LogRhythm and they do not allow any partner or any third-party to handle this part and this is a key challenge on my end. This is a huge cost impact -at least on the Pakistani market. It needs to be addressed.

The solution should be less expensive.

It would be very helpful if there was Kashif a package to help users migrate from QRadar to LogRhythm.

In Pakistan, the government is in the process of developing its final recommendation of cybersecurity and data protection process. We hope this solution will prove to be compliant and will meet the requirements in the future.

For how long have I used the solution?

I've been using the solution for approximately one and a half years at this point. It hasn't been too long just yet.

What do I think about the scalability of the solution?

We have four or five people using the solution in our organization. They are managing the LogRhythm infrastructure.

Buyer's Guide
LogRhythm SIEM
March 2024
Learn what your peers think about LogRhythm SIEM. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,924 professionals have used our research since 2012.

How are customer service and support?

We are in touch with their support. It's government support, and they're quite supportive, and they are quite responsive. They have a divisional team is quite responsive. 

How was the initial setup?

The initial setup is complex with LogRhythm. In that Pakistan market, with LogRhythm, the climate is very limited at this point. For the on-prem, there may be only two customers, for example. One is a bank and one is serving as an MSSP.

We've added four customers to a pay-as-you-go model. You apply Windows 2000 MPS or a cloud environment. The initial setup is quite difficult, however, after making certifications we are able to provide the initial setup and got it working with the LogRhythm support team.

For maintenance, I have five engineers that are part of my security team, including me and my sales and operations. Approximately we have 14 to 15 people that can handle maintenance.

What about the implementation team?

We had some assistance from the LogRhythm support team. We did not entirely do it ourselves.

What's my experience with pricing, setup cost, and licensing?

The cost of the solution should be reduced. In the Pakistan market, they have competition from IBM QRadar. They have quite a significant core difference. While the quality of this product is better, IBM has a stronger penetration in the market base don price. 90% of financial institutions are doing the QRadar in Pakistan. The Central Bank is using QRadar and simply due to the cost differences.

Which other solutions did I evaluate?

Initially, we tested out the QRadar, however, due to some delay and due to some market awareness tests, we did not continue.

What other advice do I have?

We are using the solution for our own infrastructure and we are also offering it as a service. We are the largest service provider, cloud service provider, in Pakistan. However, we use a variety of deployment models - including cloud and hybrid.

We have an ISO position for government-certified infrastructure. We have a PCI-certified infrastructure as well as a GDPI compliant infrastructure.

We work closely with this product in particular. We have a lot of hands-on experience.

I'd rate the solution eight out of ten. If it weren't for some parsing limitations in the product, I would rate it even higher.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Information Security Engineer at Seminole Tribe of Florida
Real User
It has allowed us to dive deeper into our network and figure out what is going on
Pros and Cons
  • "It has allowed us to dive deeper into our network and figure out what is going on by parsing logs properly and being able to reduce the time it takes to work cases down from seven days to approximately two days."
  • "LogRhythm has increased productivity because all the tools that we need are in the web UI, allowing us to find threats on our network fast and efficiently."
  • "Technical support could use a little work in the terms of responding back. The feedback that we received is they do need a little more staff."
  • "We would like to see more things out of the console into the web UI. I guess this is what they are doing in 7.4."

What is our primary use case?

Our primary use case would be for compliance. We needed a check in the box for compliance. Right now, it's performing and doing its job, allowing us to say that we are compliant with HIPAA, PCI, etc.

How has it helped my organization?

It has improved the way our organization functions. It has allowed us to dive deeper into our network and figure out what is going on by parsing logs properly and being able to reduce the time it takes to work cases down from seven days to approximately two days.

LogRhythm has increased productivity because all the tools that we need are in the web UI, allowing us to find threats on our network fast and efficiently.

Our security program is still in its infancy. There is a lot of work that needs to be done. We finally were able to get our SIEM. A few things that we need to do are data loss protection, user behavior analytics, and another feature that LogRhythm offers that we're probably going to invest in the future. The program could use some work, but it is pretty solid now.

What is most valuable?

The most valuable feature is the Threat Intelligence Services (TIS).

What needs improvement?

We would like to see more things out of the console into the web UI. I guess this is what they are doing in 7.4.

For how long have I used the solution?

Less than one year.

What do I think about the stability of the solution?

In the three weeks that we have had it, we have had 99 percent uptime. It is a very stable platform.

What do I think about the scalability of the solution?

It is scalable. They don't charge for going over your messages per second. It does scale with the business. 

How are customer service and technical support?

Technical support could use a little work in the terms of responding back. The feedback that we received is they do need a little more staff, but every issue that we've opened a ticket up for has been resolved.

Which solution did I use previously and why did I switch?

We did not have a previous solution that we were using.

How was the initial setup?

The initial setup is straightforward and complex as it requires a lot of work. It's very straightforward and very organized. Our consultant guided us as to what we needed to do, but the entire thing is complex. One misstep or incorrect character can bring the whole thing down.

I do all the deployment and maintenance.

What about the implementation team?

The sales engineers and salespeople who come in and scope out what you need are very knowledgeable. They are not there to upsell you. They get you what you need for what you have, so everything runs perfectly. The consultants are extremely knowledgeable. Getting LogRhythm up took less than a week. It's a very solid solution.

What's my experience with pricing, setup cost, and licensing?

When it comes time to renew, they say, "This is what you are using. This is what we can do for you." So, they work with you on pricing.

Which other solutions did I evaluate?

There were multiple competitors. We almost went with Splunk, but LogRhythm ended up being the best for the price. It ended up being everything we needed in one solution.

What other advice do I have?

Everyone needs a SIEM. Go with LogRhythm.

We are not using the full-spectrum analytic capabilities yet, as we are brand new.

We have not used any of the playbooks. We do have them. We find them to be very detailed and organized. We just need to find a way to implement them.

I run in about 45 log sources with 12 of them being domain controllers, aka DNS.

Messages per second are fluctuating between 3000 and 9000. We are still trying to figure out why. We think it is our very chatty domain controllers, as we do deal with the Hard Rock and Seminole tribe, but I would say that we average about 5000.

Most important criteria when selecting a vendor: customer service. Do they care about our business as much as we care about our business? Also know as, do they care about our data as much as we care about our data?

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
LogRhythm SIEM
March 2024
Learn what your peers think about LogRhythm SIEM. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,924 professionals have used our research since 2012.
PeerSpot user
Manager, Enterprise Risk Consulting at a tech company with 1,001-5,000 employees
Real User
HP ArcSight vs. IBM QRadar vs. ​McAfee Nitro vs. Splunk vs. RSA Security vs. LogRhythm

We at Infosecnirvana.com have done several posts on SIEM. After the Dummies Guide on SIEM, we are following it up with a SIEM Product Comparison – 101 deck. So, here it is for your viewing pleasure. Let me know what you think by posting your comments below. The key products compared here are based on Gartner Magic Q which is what Organizations typically use to select SIEM vendors. The Vendors mentioned here in the deck are :

1. HP ArcSight

2. McAfee Nitro

3. IBM QRadar

4. Splunk SIEM

5. RSA Security Analytic

6. LogRhythm.

SIEM Technology Space

SIEM market analysis of the last 3 years suggest:

  • Market consolidation of SIEM players (25 vendors in 2011 to 16 vendors in 2013)
  • Only products with technology maturity and a strong road map have featured in leaders quadrant.
  • HP ArcSight & IBM Q1 Labs have maintained leadership in SIEM industry with continued technology upgrade
  • McAfee Nitro has strong product features & road map to challenge HP & IBM for leadership
  • HPArcSight

    The ArcSight Enterprise Threat and Risk Management (ETRM) Platform is an integrated set of products for collecting, analysing, and managing enterprise Security Event information.

    • ArcSight Enterprise Security Manager (ESM): Correlation and analysis engine used to identify security threat in real-time& virtual environments
    • ArcSight Logger: Log storage and Search solution
    • ArcSight IdentityView: User Identity tracking/User activity monitoring
    • ArcSight Connectors: For data collection from a variety of data sources
    • ArcSight Auditor Applications: Automated continuous controls monitoring for both mobile
    Strengths Weaknesses
    Extensive Log collection support for commercial IT products & applications Complex deployment & configuration
    Advanced support for Threat Management, Fraud
    Management & Behavior Analysis
    Mostly suited for Medium to Large Scale deployment
    Mature Event Correlation, Categorization & Reporting Requires skilled resources to manage the solution
    Tight integration with Big data Analytics platform like Hadoop Steep learning curve for Analysts & Operators
    Highly customizable based on organization’s requirements
    Highly Available & Scalable
    Architecture supporting Multi-tier & Multi-tenancy     

    IBM QRadar

    The QRadar Integrated Security Solutions (QRadar) Platform is an integrated set of products for collecting, analysing, and managing enterprise Security Event information.

    • QRadar Log Manager – Turn key log management solution for Event log collection & storage
    Strengths Weakness
    Very simple deployment & configuration Limited customizations capabilities
    Integrated view of the threat environment using Netflow data, IDS/IPS data & Event logs from the environment Limited Multi-tenancy support
    Behavior & Anomaly Detection capabilities for both Netflow & Log data Limited capability to perform Advanced Use Case development & analytics
    Suited for small, medium & large enterprises
    Highly Scalable & Available architecture

    McAfee Nitro

    The McAfee Enterprise Security Management (formerly Nitro Security) Platform is an integrated set of products for collecting, analysing, and managing enterprise Security Event information. 

    • McAfee Enterprise Log Manager – turn key log management solution for Event log collection & storage
    • McAfee Event Receiver – collecting log data & native flow data
    • McAfee Database Event Monitor – database transaction & Log monitoring
    • McAfee Application data Monitor  – application layer event monitoring
    • McAfee Advanced Correlation Engine – advanced correlation engine for correlating events both historical & real time
    Strengths Weaknesses
    Integrated Application Data monitoring & Deep Packet Inspection Very basic correlation capabilities when compared with HP & IBM
    Integrated Database monitoring without dependence on native audit functions Limitations in user interface when it concerns navigation
    High event collection rate suited for very large scale deployment Requires a lot of agent installs for Application & database monitoring thereby increasing management complexity
    Efficient query performance in spite of high event collection rate No Big Data Analytics capability
    Limited customization capabilities
    Limited support for multi-tier & multi-tenancy architecture

    Splunk

    Splunk Enterprise is an integrated set of products that provide Log Collection, management & reporting capabilities using

    • Splunk Indexer – used to collect and index logs from IT environment
    • Splunk Search Heads – used to search & report on IT logs
    • Splunk App for Enterprise Security - used to collect external threat intelligence feeds, parse log sources and provide basic analytics for session monitoring (VPN, Netflow etc.)
    Strengths Weakness
    Extensive Log collection capabilities across the IT environment Pre-SIEM solution with very limited correlation capabilities
    Log search is highly intuitive – like Google search Even though easy to deploy, increasingly difficult to configure for SIEM related functions
    Flexible dash boarding & analytics capability improves Log visualization capabilities
    Built-in support for external threat intelligence feeds both open source & commercial
    “App Store” based architecture allowing development of Splunk Plugins to suit monitoring & analytics requirements

    RSA Security

    RSA Security Analytics is an integrated set of products that provide Network Forensics, Log Collection, management & reporting capabilities using

    • Capture Infrastructure
      • RSA Security Analytics Decoder – Real time capture of Network Packet and log data with Analysis and filtering capabilities
      • RSA Security Analytics Concentrator – Aggregates metadata from the Decoder
      • RSA Security Analytics Broker Server – For reporting, management and administration of capture data
    • Analysis & Retention Infrastructure
      • Event Stream Analysis – Correlation Engine
      • Archiver – Long term retention, storage, security & compliance reporting
      • RSA Security Analytics Warehouse – Big Data Infrastructure for Advanced Analytics
    Strengths Weakness
    Great Analytics using Event Log Data & Network Packet Capture New Product release from RSA, hence advanced Security correlation support is poor
    Network forensics, Big Data (Parallel Computing) are cornerstones in SIEM world Security Analytics Warehouse is a new capability with very little real world use cases
    Tightly Integrates with RSA ecosystem for Threat Intelligence, Fraud Detection, Malware Analysis etc. (each requires separate RSA Tools) Suited only for large enterprises with need for complex deployment and management resources. Poor deployment options for small and midsize customers

    LogRhythm

    The LogRhythm SIEM 2.0 Security Intelligence Platform is an integrated set of products for collecting, analysing, and managing enterprise Security Event information.

    • Log Manager – high performance, distributed and redundant log collection and management appliance
    Strengths Weakness
    Well balanced log management, reporting, event management, privileged user monitoring and File integrity monitoring capabilities Suitable for Security event data only, as Operational data sets cause slowing performance for searches and reports
    Fast deployment with minimal configuration because of appliance form factor No Support for Active Directory integration for Role- Based Access Control
    Quarterly Health Check programs post-deployment offers great After sales-Service experience Suited best for small and mid size companies with basic security, regulatory compliance and reporting needs. Not scalable for very large deployments.

    A Summary scoring sheet for SIEM Vendors based on their Core capabilities is given below

    Capability RSA Security Analytics Log Rhythm Splunk McAfee Nitro IBM Qradar HP ArcSight
    Real-time Security Monitoring 3.1 3.2 2.5 3.9 4.2 4.4
    Threat Intelligence 3.7 2.5 3.0 2.8 3.5 4.5
    Behavior Profiling 2.5 2.3 3.0 3.0 5.0 4.0
    Data & End User Monitoring 3.6 3.5 1.7 3.6 3.5 4.0
    Application Monitoring 3.8 3.5 1.8 3.7 3.3 3.8
    Analytics 2.5 2.5 3.8 4.5 3.5 4.0
    Log Management & Reporting 3.5 3.8 3.5 3.8 3.9 4.0
    Deployment & Support Simplicity 3.0 4.0 2.5 3.5 3.5 3.0
    Total (Weighted Score) 25.7 25.3 21.8 28.8 30.4 31.7

    1.0 = Low level of capability

    5.0 = High level of capability

    SIEM Vendors – Use Cases Score Card

    Use Cases RSA Security Analytics Log Rhythm Splunk McAfee Nitro IBM Qradar HP ArcSight
    Overall Use Cases 3.2 3.2 2.7 3.6 3.8 4.0
    Compliance Use Cases 3.3 3.7 3.0 3.7 3.8 3.8
    Threat Monitoring 3.1 3.1 2.9 3.8 3.7 4.0
    SIEM 3.2 3.4 2.8 3.6 3.8 3.9
    Total (Weighted Score) 12.8 13.4 11.4 14.7 15.1 15.7

    1.0 = Low level of capability

    5.0 = High level of capability

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    it_user279666 - PeerSpot reviewer
    it_user279666IT Security Consultant at Rodl Middle East
    Vendor

    Cost/License should also be part of the criteria, because the capabilities of these solutions depends on how much EPS it is allowed to process. A lot of "events" goes down the drain if its beyond the EPS that customer license so therefore giving it a incomplete view of the network. Some remarketer of these solutions have crimped their proposal just to make a sale. Just my 2 cents.

    Rahul Kate - PeerSpot reviewer
    Co-Founder at First Defense WLL
    Real User
    Top 5
    Intuitive GUI, easy to set up, and stable
    Pros and Cons
    • "The GUI is very intuitive and the solution has good integration."
    • "The built-in functionality of the solution for NDR, SOAR, SIEM, and EDS has room for improvement."

    What is our primary use case?

    There are multiple use cases for the solution, such as long log formatting, log consolidation, data isolation, malware detection, identifying suspicious attacks, and locating ISU records across the network.

    What is most valuable?

    The GUI is very intuitive and the solution has good integration.

    What needs improvement?

    The built-in functionality of the solution for NDR, SOAR, SIEM, and EDS has room for improvement.

    The price of the solution has room for improvement.

    For how long have I used the solution?

    I have been using the solution for ten years.

    What do I think about the stability of the solution?

    The solution is stable.

    What do I think about the scalability of the solution?

    I give the scalability an eight out of ten.

    How are customer service and support?

    The technical support is good.

    How was the initial setup?

    The initial setup is straightforward.

    What's my experience with pricing, setup cost, and licensing?

    I give the price a six out of ten.

    What other advice do I have?

    I give the solution an eight out of ten.

    The solution can meet the most mature customer's requirements.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
    PeerSpot user
    MohamedKarram - PeerSpot reviewer
    SOC Manager at Infratech Co
    Real User
    Top 10
    It's easy to use and has improved a lot, but the web and on-prem console should be unified
    Pros and Cons
    • "I like LogRhythm's ease of use. The solution has improved compared to previous versions. It had many issues before, like integration, the console, creating reports, false positives, etc. The AI engine has made it stronger in the latest version."
    • "The web and on-premise console interface should be the same instead of having a separate engine for each."

    What is our primary use case?

    We are consultants providing governance solutions for the banking sector. We have a lot of use cases. We have more than 400 use cases for the client side.

    What is most valuable?

    Its ease of use is valuable. It has improved a lot from the previous versions. It had a lot of issues before, but now, it's way better in terms of integration, the console part, report creation for use cases, false positive numbers, and so on. Its AI engine is a lot more advanced in the latest version.

    What needs improvement?

    The web and on-premise console interface should be the same instead of having a separate engine for each. 

    I hope that they remove the console and have only one GUI. There should be one engine for both the web and the console. They shouldn't have two different engines for each one of them.

    There should be easier deployment status, and like Splunk, there should be a more professional way to write the search. There shouldn't be only a drop-down menu. It'll be a good thing to add.

    For how long have I used the solution?

    I have used LogRhythm for about three years now.

    What do I think about the stability of the solution?

    LogRhythm SIEM is stable.

    What do I think about the scalability of the solution?

    LogRhythm SIEM is highly scalable. We have more than nine users working with this solution.

    How are customer service and support?

    The technical support depends on the technician you get. Some are good, but some aren't.  We had multiple sessions with one person for over a year with no results. Other engineers are excellent. 

    How was the initial setup?

    Setting up LogRhythm is complex. It took our team more than a month to deploy. We have a large team in my company because we are working with dozens of clients. Our BS team is almost 15 people. 

    What about the implementation team?

    Its implementation is handled by a different team. We have a very big team in our company because we are working with a lot of clients. Our implementation team has almost 15 people.

    What's my experience with pricing, setup cost, and licensing?

    There don't seem to be any costs in addition to standard licensing.

    What other advice do I have?

    I'd recommend LogRhythm SIEM to others. I'd rate it an eight out of ten.

    Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
    PeerSpot user
    Senior System Administrator at DP Infotech Pvt Ltd
    Real User
    Top 20
    Reliable with good dashboards but needs better alerts
    Pros and Cons
    • "It's reliable and the performance is good."
    • "We've had issues with scaling and local support."

    What is our primary use case?

    This solution's use case is abnormal administrative lockouts, most of the time.

    What is most valuable?

    I'm happy with their AI in general. 

    We're able to make useful dashboards. 

    The initial setup is now complex if you have a bit of knowledge going in. 

    The solution is stable. 

    What needs improvement?

    We'd like to receive alerts for zero-day attacks in the future. We'd like alerts that offer us better security. For example, if there are abnormal occurrences, we'd like to know right away. 

    We've had issues with scaling and local support.

    For how long have I used the solution?

    We've been using the solution for two years. 

    What do I think about the stability of the solution?

    It is stable. There are no bugs or glitches and it doesn't crash or freeze. It's reliable and the performance is good. 

    What do I think about the scalability of the solution?

    We have seven people, admins, who are working directly with the solution. 

    It's not easy to scale. Sometimes we have difficulties. For example, when doing updates, we cannot depend on our local support. In some cases that we have found, they don't have much knowledge. We have to work on separate tickets for the kinds of issues we have.

    How are customer service and support?

    We have local support. If they cannot assist us, they do offer in-house support we can use. The first step in terms of getting help would be our local partner. 

    The issue is that local support sometimes isn't as knowledgeable as they need to be. The solution should work to do more training in order to improve local support.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    We were working on RSA. We switched due to the cost and the lack of local support. The RSA cost is a little bit too high.

    How was the initial setup?

    The solution offers a pretty straightforward and simple setup. That said, you need some knowledge going into the process. 

    The deployment itself took about 90 days. 

    I'd rate it a three out of five in terms of the general ease of deployment as there is some complexity and a learning curve. 

    There's not much maintenance. We do have to do the updates of the servers and if there is a new release and update, we work on those. For the day-to-day, we try to focus on more log-related tasks.

    What's my experience with pricing, setup cost, and licensing?

    I can't speak to the exact cost of licensing the product. My understanding is that it is less expensive than RSA. 

    What other advice do I have?

    We are an integrator and service provider. 

    We are not currently using the latest update.

    I'm not sure if I would recommend the solution to others as they still need to improve a few things. For example, support, at least on the local level, is lacking. 

    I'd rate the solution five out of ten.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Microsoft Azure
    Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
    PeerSpot user
    Global Security Manager at Chart Industries Inc
    Video Review
    Real User
    Top 10
    We bought it simply because it is awesome, it is fast and less expensive than Splunk

    What is our primary use case?

    Our primary use case for bringing on a SIEM in general was the need to correlate our data across dozens of different solutions that were spitting out logs. We got to a level of complexity where it became mandatory.

    How has it helped my organization?

    This solution has been almost like a transformative change in how we detect and then respond to incidence. Quite honestly before, we didn't know what was going on and we couldn't detect anything other than  a random virus that sent an email from our AV solution. For us, it really took off when I was a little onboard the Office 365 logs and then we were able to start monitoring locations of login and we actually detected multiple accounts that were logging in from countries that had no business being there.

    That led to some investigatory work and actually led to some password resets. It was really positive and we continued to detect that type of activity and enhanced the rules, changing here and there. That was a big one for us because we had never even looked at the Office 365 audits because we didn't have a way to do it. LogRhythm brought that in and within a day or two, we're like, "These three accounts are popped and we need to get these guys off the network now." It was amazing.

    We're currently processing about 3,500 messages per second. We have experienced a massive decrease in our mean-time to detect. It's actually hard to improve on nothing. It's hard to get worse than no detection, so we went from being able to like, "Oh, a virus happened," to, "This user went to a weird website. We got that from your DNS logs and then 10 minutes later, their antivirus fired on something." And now we know that we can go over there and triage that system quickly as opposed to maybe not getting the virus log for a day. The other thing is detecting when we think breaches are happening, which is something we just didn't have the capability to do before we brought in LogRhythm.

    When it comes to our security maturity, I was the first person at my company to do security, and the company had been around for 30 years. I bet that started from scratch, and I started where we were bleeding which was our endpoint detection for malware and ransomware. And then be added on more layers. We added on like IPS and we added on a lot of perimeter type stuff.

    While LogRhythm was probably the last component that I have onboarded in like first two-year time frame, it's now the center of the program. Everything feeds into it and that's where I go for just about everything. There are a few solutions that I still have to go out to those solutions to look at stuff but even like from a purchasing perspective, even my IT operations team, my IT applications team, my company asks vendors two questions right out of the gate. Do you have a cloud offering, and do you natively support LogRhythm? And those two are heavy, heavy hitters when it comes to whether or not we're going to put you in the running to buy your software.

    What is most valuable?

    The most valuable features in LogRhythm, honestly for me, the single most valuable feature is the web console. That is actually the primary reason we chose LogRhythm over some of these other solutions because I was able to leverage web console usage across multiple layers of IT, and I didn't have to sit back and teach everybody complex SQL queries. Just that point-and-click interface, it's nice and bouncy and it's beautiful to look at has really driven the adoption of the use of the software. Secondarily, I think another really great feature is the LogRhythm community. And the content that that provides has enhanced our adoption over the years.

    We don't use the full-spectrum analytics capabilities of the SIEM mainly because I'm a lone wolf in running it. It's just a matter of timing and focus. We do a lot of analytics around user behavior although we're not a cloud AI customer yet. We're doing a lot of what they call the AI engine to do user behavioral modeling and we're starting to onboard some network behavior modeling analytics as well.

    What needs improvement?

    It honestly comes back to me for log sources. The time to get support to onboard a log source runs about 18 months, and that's just too long. Like I said, I'm a lone wolf running the system. I don't have a lot of free time to write ReGex and build out my own policies, and I tend to write bad ones that are very inefficient. It is tough when I get a critical source or when a part of the business went out and just bought something, never consulted IT, and now we have to audit it and it doesn't support LogRhythm or it doesn't even like have a function that gets us the logs. We have a cloud solution where we can't even get the logs out of it. It's crazy bad. But when we do get those logs in, it would be really helpful if we could get a supported log source policy from LogRhythm in a shorter amount of time

    What do I think about the stability of the solution?

    I have had a lot of trouble with stability, perfect timing. We onboarded way too many log sources on the get-go and overran our appliance's capabilities. And I've spent probably the last 12 months working to stabilize the damage that I caused the system when I did that. It's been a rough year for stability. Even just before I came to this conference, I think I got it finally stabilized. I'm cautiously optimistic that I can take a deep breath and start focusing more on the logs instead of the appliance itself.

    What do I think about the scalability of the solution?

    We've scaled the solution twice. I haven't done a whole lot of like large-scale build-outs. We're still a single appliance. What we did scale was we scaled the memory and we scaled our NPS license and then I added in some external storage. And all of those things went great. We're to a point now where they're recommending that we buy what they call a data indexer separately. My leadership is more interested in moving it to the cloud than buying more hardware, so I'm working to get a POC started up to get it up into Azure and see if we can scale horizontally in Azure as opposed to buying more hardware. I might have a lot more to say about scalability next year.

    How are customer service and technical support?

    Tech support LogRhythm is one of my favorites. Of all the solutions I deal with, those guys and girls are insanely good at their jobs. And so when we bought the solution, my leadership did not buy professional services to help me deploy it. I did it blind, basically, with the user guide. And I think in the first year, the number was about 75 tickets that I opened in the first year. And they still answer me when I call them, so that's great. And they're very willing to stick with you as long as you need.

    The only challenge I do have with their tech support is the time shift because their tech support is all based here and I'm on the East Coast. They want to meet it like 5:00 p.m. Denver time, it's like, "Oh, no. I'm at 7 o'clock, dude. I'm done for the day." One little annoyance but it's well worth it in the end to get the support that we get.

    The support for log sources is fantastic. It is challenging because you're always going to come up stuff that you need that is not recognized, and writing my own policies has been very challenging. As far as log sources, the last time I checked on Friday, I think we were at 2,900 log sources. It's a lot for this little appliance.

    Which other solutions did I evaluate?

    When we went shopping for a SIEM, I had come from a Splunk shop. I was very familiar with Splunk the interface. I like the software, so Splunk was number one on my list. And who was number two? SolarWinds had a SIEM solution that we had played with a little bit at my company, so they were also in the running. And then actually one of my partners talked to me about LogRhythm because I'd never even heard with LogRhythm before and so we did a demo.

    And ultimately, it was two big factors. From a Splunk perspective, cost. Cost to build it out and then cost of licensing, it's just unattainable for us. And number two, LogRhythm's WebUI and the speed with which you can run searches in it was hands down my primary reason for going with LogRhythm.

    What other advice do I have?

    I'm going to give them an eight. It's a fantastic solution and I totally support what they're doing and I like where it's going. But there is room for improvement, and there are some pain points and honestly I've had a rough year. That kind of influences it too. It's been a lot of time on the phone with support this year.

    I will tell them what I wished I have known the day I started onboarding logs, and that is when you're looking for a SIEM, put all the features and everything to the side. Go talk to your business people and find out what's important to them because that's how you're going to know what to bring on initially. And once you know those things that are critical and the things you have to do, then you can evaluate the different solutions to see who has the native support because we didn't do that.

    We bought it simply because it was awesome and fast and less expensive than Splunk. And then I onboarded 1,500 log sources in a week and brought the system to its knees. And I'm even now today still cleaning up and removing log sources that just bring no value. It's just noise.

    Take the time and plan that out before you even go talk to vendors. Figure out what logs are out there, which ones are meaningful to you and the business and then find the solution that fits best with that.

    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
    PeerSpot user
    Avraham Sonenthal - PeerSpot reviewer
    Avraham SonenthalSenior Network Engineer at a government with 5,001-10,000 employees
    Real User

    I am not sure how LogRhythm would be less expensive than Splunk. Splunk charges licensing by the GB of incoming logs. LogRhythm sells an appliance and it has a certain capacity. If you want more capacity you need an additional appliance. Splunk you add additional indexers for free as long as you have the licensing. Also here is a big one: LogRhythm does not give you any documentation to speak of. If you want to know how to use it, you better pony up $5000/user for training.

    That said, LogEhythm is good for highly regulated environments such as banking and health care. They have a huge number of canned reports and known log formats. If you want to gather logs from a lab or a jet engine, LogRhythm is not going to do it. Also to onboard even a single log source is an involved process that takes a good number of operations.

    It is like the difference between a Barret .50 cal and a .380 handgun. Different tools for different jobs.

    Systems CSO at a manufacturing company with 1,001-5,000 employees
    Real User
    Case Management allows us to track what we see in the incidents that arise
    Pros and Cons
    • "The alarm functions have helped us cut down on the manual work. They bubble things up to us instead of our having to go look for stuff. Also, from an operational perspective, day to day, the Case Management functions are really useful for us. They allow us to track what we see in the incidents that we have."
    • "We have run into problems with stability going through upgrade processes. Recently, we have been on the front edge of the upgrade path. When that happens we tend to run into issues either with certain functionality not working after the upgrades or stability issues because of the upgrades."

    What is our primary use case?

    It's our central security monitoring platform. It's where we bring all of our events together so we can monitor our network.

    How has it helped my organization?

    It's helped us be more streamlined in our monitoring processes. We used to have multiple places where we'd have to do this work and now we have centralized all of it into one platform.

    Also, the alarm functions have helped us cut down on the manual work. They bubble things up to us instead of our having to go look for stuff.

    In terms of our security program maturity, I think we're fairly mature. We definitely have some ways to go still, but we're continually improving. We've had a security program for some 15 years, so it's been around and had time to mature. LogRhythym has definitely been a part of that. For the operations and monitoring pieces, going from what we had before to it being the central component for us, it has really helped us become more mature in those areas.

    What is most valuable?

    From an operational perspective, day to day, the Case Management functions are really useful for us. They allow us to track what we see in the incidents that we have.

    We use the full-spectrum analytics capabilities. We have a number of rules that we've built, and built-in rules that we leverage as well. We've got a whole bunch of dashboards and the like to do the analytics. We definitely find the full-spectrum analytics to be valuable.

    What needs improvement?

    Hearing the roadmap items, it's pretty good. I especially like the fact that the playbook is coming with the ability to integrate the smart responses into the playbooks. That way, we can not only have the playbooks, take those steps, but start to automate those steps as well. I think that is really powerful.

    We played around with the CloudAI portion during the beta. We're not currently using it. But I think more in that area is going to be really important, where we can look at machine-based patterns, as opposed to just, "I saw two of these and three of these things, so set an alarm." I'm really excited about that.

    For how long have I used the solution?

    More than five years.

    What do I think about the stability of the solution?

    Generally, the stability has been good. We have run into problems with stability going through upgrade processes. Recently, we have been on the front edge of the upgrade path. When that happens we tend to run into issues either with certain functionality not working after the upgrades or stability issues because of the upgrades.

    What do I think about the scalability of the solution?

    It will definitely meet our needs going forward. We're not a huge shop, so we haven't had a whole lot of problems there.

    But going back to the upgrade issue, in a previous upgrade from 6 to 7, we ended up with some hardware problems, because of scalability, with the software change. The hardware that we had didn't meet the needs anymore. But we were able to get that resolved.

    How is customer service and technical support?

    Technical support is not bad. The lower-level, first-line support is not always great, but if we can get to the right people, then it's pretty good.

    Which other solutions did I evaluate?

    At this point, it's a pretty core platform for us, so we haven't been looking around.

    What other advice do I have?

    We do not use any of the playbooks currently. We'd definitely like to. It's a feature that we're planning to implement pretty soon.

    Regarding our log sources, it's in the high hundreds, probably not in the thousands. When it comes to messages per second that we are processing, looking at the average, we're at about 1,000, but we peak somewhere north of 1,500.

    I rate the solution an eight out of ten. It's a great platform, but I don't want to give them too much confidence, there's always room to improve.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    Download our free LogRhythm SIEM Report and get advice and tips from experienced pros sharing their opinions.
    Updated: March 2024
    Buyer's Guide
    Download our free LogRhythm SIEM Report and get advice and tips from experienced pros sharing their opinions.