What users are saying about

Anomali Threat Platform

2 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow'>trScore algorithm: Learn more.</a>
Score 8.1 out of 101

LogRhythm

30 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow'>trScore algorithm: Learn more.</a>
Score 8.1 out of 101

Add comparison

Likelihood to Recommend

Anomali Threat Platform

Being the best threat intelligence platform/tool on the market, it is fantastic in terms of performance and it has taken a lot of burden of curating and weeding through false positives off of our team freeing them up to focus on manual threat hunting and content building.
No photo available

LogRhythm

Logging is always necessary if 1. You have audit requirements for system access2. You need to alert and report on user activity3. You need to troubleshoot issues 4. You want to monitor, report and alert on malicious / suspicious activity5. You want to impress your management team with statistics...I cannot think of any computing environment where logging is not appropriate.
James Harrison profile photo

Feature Rating Comparison

Security Information and Event Management (SIEM)

Anomali Threat Platform
LogRhythm
8.6
Centralized event and log data collection
Anomali Threat Platform
LogRhythm
9.3
Correlation
Anomali Threat Platform
LogRhythm
9.3
Event and log normalization
Anomali Threat Platform
LogRhythm
8.8
Deployment flexibility
Anomali Threat Platform
LogRhythm
7.4
Integration with Identity and Access Management Tools
Anomali Threat Platform
LogRhythm
8.9
Custom dashboards and views
Anomali Threat Platform
LogRhythm
9.1
Host and network-based intrusion detection
Anomali Threat Platform
LogRhythm
7.5

Pros

  • Fantastic UI
  • STAXXX for sharing intelligence
  • Threat Intelligence feeds
  • Automation and collaboration cuts work down for the analysts
No photo available
  • Great Web UI for help desk troubleshooting.
  • Identification and drilldown of authentication issues.
  • Performance trending.
  • Correlation of events.
  • Access and group policy change monitoring.
James Harrison profile photo

Cons

No answers on this topic
  • I know in the past LogRhythm was talking about a web application for administration. I think this would be a lot better than having an application to log into.
  • I think offering more video content on their site would also be beneficial. The last time I had issues I was reading through a lot of forum postings, I was able to get the job done but in 2017 video is the king of content.
Jacob Steffen profile photo

Likelihood to Renew

No score
No answers yet
No answers on this topic
LogRhythm9.0
Based on 1 answer
LogRhythm is focused on SIEM. That is their core business. Cost of operations, feature set and ease of use. The Log Rhythm support team is outstanding. Overall reliability is good. Reporting module needs some improvement and LR is promising that there will be significant improvements in future releases.
James Harrison profile photo

Usability

No score
No answers yet
No answers on this topic
LogRhythm9.0
Based on 1 answer
Training is lacking for the reporting and query building. Overall, the investigation tool is my most used feature. It is very easy to drill down when searching for an interesting event. The real time dashboard in the console is feature rich and provides graphical views and the ability to see associated logs.The alarms dashboard displays the most recent significant events, and the ability to track and document how the event is being handled.
James Harrison profile photo

Support

No score
No answers yet
No answers on this topic
LogRhythm10.0
Based on 1 answer
Over the last couple of years, we have had some challenges requiring longer and higher tiered support. Log Rhythm was quick to assign a 3rd tier engineer to assist us in identifying and re-mediating those problems. They have also assisted in getting us to later versions. They are willing to hand hold during platform upgrades
James Harrison profile photo

Implementation

No score
No answers yet
No answers on this topic
LogRhythm8.0
Based on 1 answer
  • Buy professional services.
  • Buy and implement the system if possible.
  • Remember that the end point log configuration may require other teams in your company to assist you in getting the desired logs from all resources.
  • Attend the end user and daily operations training after a period of usage so you are not overwhelmed with information on concepts not yet seen.
  • Don't be afraid to call for help during your first months of use.
  • Don't close any ticket until you are sure the expected results are verified.
  • Use the community forums to discuss issues with your peers.
  • Watch the training videos offered by L R University.
James Harrison profile photo

Alternatives Considered

No answers on this topic
We had business requirements for the following features:
  • Sustained flow acquisition and data collection of dissimilar log types from multiple sources.
  • Customization for Reporting and Alerting in near real time.
  • Offer Dynamic Monitoring.
  • Presented in a Security Event Console.
  • Automated Response Generation for Security Events.
  • Support for Regulatory Compliance.
  • Host, Application and Object Access Logs.
  • Integration with IAM (Identity Access Management).
  • Ability to Express and Track Compliance with User-Defined Policy.
  • Mapping of Events to NIST/CSF and ISO 27001 Control Frameworks and Regulations.
  • Incident Management and Workflow.
  • Data Collection and Archiving.
  • Redundancy, Scalability and Deployment Flexibility.
  • Correlation and Taxonomy.
  • Enterprise Administration, Auto-Discovery, Asset Classification, Embedded Security Knowledge
James Harrison profile photo

Return on Investment

  • After the Initial startup cost, it has overall had a positive impact by increasing efficiency of the team and freeing up analysts to do manual threat hunting
No photo available
  • This product saves our company on average around $10k per year. When we are in the midst of a CIP audit this number is much higher.
Jacob Steffen profile photo

Pricing Details

Anomali Threat Platform

General
Free Trial
Free/Freemium Version
Premium Consulting/Integration Services
Entry-level set up fee?
No
Additional Pricing Details

LogRhythm

General
Free Trial
Free/Freemium Version
Premium Consulting/Integration Services
Entry-level set up fee?
No
Additional Pricing Details