LogRhythm NextGen SIEM Platform Reviews

44 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener noreferrer'>trScore algorithm: Learn more.</a>
Score 7.8 out of 100

Do you work for this company? Manage this listing

Overall Rating

Reviewer's Company Size

Last Updated

By Topic

Industry

Department

Experience

Job Type

Role

Reviews (1-17 of 17)

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Review Source
Our Security Team is using LogRhyhthm NextGen SIEM Platform at the University of Colorado.
This our alarming default system that parses logs from our firewall, outlook, system logs, IDS logs, and some confidential cloud data logs and displays tickets.
LogRhythm NextGen SIEM Platform is right for our organization as it requires no knowledge in coding or programming. Therefore non-technical users can also use this product to build rules and manage the servers.
The second benefit is the "drill down" feature that goes to the depth of the event, extracts information, and display in a very well structured manner with easy to understand visualization. It is very easy to go through and detect the problem. It also has a robust search tool for parsing through a high volume of logs.

In a nutshell, our overall incident response went a lot better than what it used to be five years ago.
  • LogRhythm NextGen SIEM Platform has an alarm system that generates tickets based on the event and the way it has been configured in the LogRhythm console. Let's say we have a ticket for a malicious email attachment. The ticket will some information like the source of the log, the source IP, destination IP etc. It can be drilled down to obtain specific information like the recipient, source location, file attachment name, SHA hash of the file, source and destination port, time, mac address of the machine that downloaded it etc. This helps the analysts to go to the root of the cause and take actions easily without manually parsing them.
  • The second good thing about the LogRhythm NextGen SIEM Platform is that it is very easy to use with its well-structured interface. To use LogRhythm, an user barely require any technical skills. A little overview of IP, CIDR, hash, etc. is enough to get your hands on it. It requires no programming or coding skills, as everything is GUI based. It also provides a beautiful visualization dashboard. There is another beautiful feature that it provides for the classification of events, known as cases. Multiple users working on the same platform can create cases and add events to it. They also help to maintain future reference.
  • The third good feature is the search tool which is very powerful. For example, sometimes it is hard to find the users who downloaded a malware from the guest wireless of the institution and not the private network. The search tool helps us in searching the user by automatically correlating the MAC address from the current network logs and the previous logs as the MAC address is the same. It is highly scalable for parsing a large number of logs from various sources.
  • I particularly think this is one of the best software available for log parsing in an organization where non-technical users are working on incident response. This tool has a good amount of flexibility. However, it can only be configured with the LogRhythm NextGen SIEM Platform Console.
  • In terms of usability, as already mentioned, it is a very easy tool to use, with a GUI based interface.
  • The LogRhyhtm NextGen SIEM Platform is good in terms of looks, but sometimes it is too sophisticated to do the simplest of tasks like, for example: counting the number of occurrences of a particular IP address in total logs for that specific day or month.
  • They can provide a simple syntax bar like Splunk, for technical users who feel a syntax-based query is more powerful than just GUI.
  • There can be a feature that can help you customize the amount of data to be displayed without "drill down." A lot of the time, it isn't worth waiting 10-15 seconds to find 5% extra required information that could be displayed easily before drilling down.
  • It doesn't have any online community or proper documentation that has a user rating on it. A lot of the times, their documentation doesn't help us.
I will say that the LogRhythm NextGen SIEM Platform is well suited for an organization that is not very big but has multiple log sources. Or a lot of non-technical employees who do not know how to code or do write custom queries. Typically it is a good fit for universities and mid-range startups. This has an excellent interface, dashboard, useful for managing roles, but it doesn't provide the level of customization that a technical person with knowledge of coding probably would prefer. Software like Splunk and Elastic Search are much more flexible in terms of the granularity of the search.
Read this authenticated review
Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Review Source
We utilize LogRhythm across our entire organization for log collection and security investigations. We utilize both log collectors and Syslog pulls across all Windows platforms as well as Linux systems.
  • Centralized log collection database.
  • Searching logs for security incidents.
  • Running smart responses for more routine checks via API's with other platforms.
  • Configuring log collectors could be more intuitive via the thick clients.
  • Merging the Thick and Thin client consoles would be a nice architecture change.
It is well suited If you just have Windows servers and platforms that utilize sys logging the process is relatively easy to collect logs.
Read this authenticated review
Anonymous | TrustRadius Reviewer
Score 5 out of 10
Vetted Review
Verified User
Review Source
Our organization is subject to both SOX and PCI compliance regulations. We use the LogRhythm NextGen SIEM platform as a central point of all log collection for our Windows and NIX servers as well as our network appliances. It also allows us to alert on certain events such as the use of elevated privileges.
  • Once LogRhythm is running, it's a fairly simple and quick process to get logs ingested. You can have your first log sources being parsed with 30 minutes.
  • LogRhythm is very good at parsing out Windows event logs and presenting them in an easily readable way.
  • Searching/Investing thru logs is extremely quick with LogRhythm.
  • While searching for log events is quick, the interface isn't as user-friendly as other SIEM products.
  • Many of the administrative/management functions are only available through the full LogRhythm desktop console, not through the web console.
  • The LogRhythm agent, when used for FIM and RIM, is very memory intensive.
The LogRhythm NextGen SIEM Platform is well suited for collecting logs from Windows/NIX servers and generating alerts from certain events such as a user account being added to a privileged or administrator group. It might have issues with larger-scale deployments with regards to certain network appliances and the rate of event/log collection.
Read this authenticated review
Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Review Source
We use LogRhythm NextGen SIEM as a centralized system log repository. We purchased the product 5 or so years back to satisfy PCI compliance as our company has to maintain level 1 PCI compliance which states that all your system logs have to be maintained in a central location. We review the logs daily via automated reports sent to our ticketing system. It helps us keep on top of issues and to maintain compliance.
  • Updated GUI interface is rather easy to use and looks nice
  • Once up and running, seems to remain that way, we don't really have any issues with it
  • Was cost effective compared to other solutions
  • Implementation is tricky, definitely requires having them do the implementation for/with you
  • The software can be overly complex at times
  • Adding a Windows server to the solution isn't hard but seems like it could be made quicker/easier
I'd say LogRhythm is best suited for larger environments with hundreds of servers and network devices. For smaller businesses you could probably get by with one of the many free open source logging solutions out there, though it may be harder to get up and running without some assistance. For example many years ago when we were much smaller we used a really cheap solution called Kiwi but back then we had maybe 20 servers instead of 250+ we have today and that worked fine for those, but no way could we do that now.
Read this authenticated review
Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source
We currently are utilizing the LogRhythm SIEM primarily for Information Technology needs. This product is leveraged in a number of ways, one of which is to help auditing security events such as someone being added to the "Domain Administrators" security group in Active Directory. Additionally, we utilize the dashboards (both built-in and custom) to monitor events such as successful authentications from outside of the United States (since all our offices are within the USA).
  • LogRhythm SIEM provides an amazing granularity when it comes to building reports and alerts/alarms. There are a variety of syntaxes that are supported (regex, boolean, Lucene, etc) so getting exactly what you want is easy.
  • There is a vast amount of pre-defined log source types already available so adding new log sources is a breeze. Additionally, you have the ability to custom-parse a log type for those instances in which there isn't already a pre-defined log type.
  • LogRhythm is constantly improving its software and the capabilities/integrations that it provides. SmartResponses are also frequently being developed, which really help us to quickly (or automatically) take action when certain events are triggered.
  • They have been expanding the functionality of the "cases" features in the SIEM, which works fine, however, we don't utilize that feature in our deployment so (for us) it is a wasted feature.
  • Since the application provides such granularity/control, it can seem a little overwhelming to someone unfamiliar with the software. Luckily the software is pretty intuitive and laid out in a manner that is easy to understand. I would highly recommend sending your administrator to the (1 week long) on-site training that LogRhythm offers.
  • In order to really get the most out of the software, it takes a decent amount of work to get it configured. The software will function without specifying your subnets/VLANs, but for more accurate reporting it is recommended to define that information. I don't really consider that to be an oversight or issue with the software, but it is something to think about with any SIEM solution. It takes a little bit to really get it defined before you get the most out of it.
I currently am leveraging LogRhythm to help me keep an eye on auditing. I have configured many different AI rules that look for specific event IDs such as users being added to administrator groups, accounts being locked out, or successful international logins. Additionally, since Windows Event logs frequently fill up and are overwritten, we use the LogRhythm SIEM as a log repository that can be searched to help identify the root cause of outages. The "second look" feature is nice as well because I can do a historical search in logs from well over a year in the past.
Read this authenticated review
Anonymous | TrustRadius Reviewer
September 05, 2019

LogRhythm is on beat!

Score 8 out of 10
Vetted Review
Verified User
Review Source
This product is mostly used by our security team, but it is also used by our firewall administrator. We use it for log aggregation as well as event correlation and automation of firewall security policies. Its primary use case is to keep updated security policies regarding changing threat vectors on our internet edge.
  • Event Correlation
  • Log Aggregation
  • Security Policy Updating
  • User Interfacing
  • Troubleshooting the product itself isn't easy
  • Very Expensive
LogRhythm is best suited to an environment where there is a large number of devices with logging capabilities. Any infrastructure that is large and unwieldy would do well to implement LogRhythm. I would typically suggest it in high-security networks and networks looking to do security automation or networks with high audit requirements.
Read this authenticated review
Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Review Source
My current company provided the solution to one of our clients and I was involved in the implementation process. It's being used by the IT security department to primarily monitor financial & security problems. LogRhythm is used in detecting unusual financial transactions, new/existing security threats within the network, and in detecting when people are not following corporate policy around avoiding particular applications/websites.
  • User-Friendly UI
  • GUI based control panel
  • Integrated platform
  • Reporting
  • More Correlation Rules Needed based on Behavior Analytics
It is suited for all kinds of organizations especially for those where IT security professionals are involved in multiple activities. LogRhythm is really easy to get used to, so even if the users don't get to spend enough time with this solution, they will still be able to understand the basic offerings.
Read this authenticated review
Ivan Montilla Miralles | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Reseller
Review Source
We currently use LogRhythm as a SIEM for our cloud environment, mainly managed by the Technical Services department. It helps with the log management of all our cloud devices and helps us find live attacks done in our both test and production environment. It also helps as a showcase for when a customer requires a demo presentation or needs a certain configuration done on their environment.
  • The Analyze module is very useful for drilling down and winding down with filters what you need to see, regarding incidents and logs. It allows you to be agile and create a case with the current logs, appending them as evidence.
  • The reports module is really easy to use, both for running and configuring them, as long as you have the queries ready for what you need. If you beforehand prepare what you're going to look for in a report, configuring a report from scratch is not hard.
  • The dashboards are also very useful out of the box and easy to configure. You can make sense of the data with the proper queries and a very helpful feature is the ability to see the data with Live Data turned on, you're always on relevance while looking at dashboards.
  • I wished it didn't need a thick client for configuring the tool. They could perhaps make a different login screen using the web for configuring the tool so you don't need to mix up the configuration of the solution with the security management.
  • The training at the LogRhythm Thrive Partner Portal is somewhat hard. The content is very helpful, but the exams are perhaps too hard even for the 101. I understand there's a challengening part, but the learning curve could be smoothened out instead of making it too steep.
  • I think the licensing of the agents should be more open. Instead of making it extra at a premium rate, you should allow your users to install it freely on their assets and receive logs from those assets.
A good scenario to have LogRhythm SIEM is when you have an enterprise environment with specific compliance requirements and/or if you have a critical environment you need to make sure is really protected, along with proper SmartResponse rules to take action when an alarm triggers. If your environment is mission critical, but your company is an SMB, LogRhythm might be overkill for you, as it's a solution that has a great upfront cost. The cost of investment [is] worth it given a minimum company size, but it makes sense only if you can really afford it.
Read Ivan Montilla Miralles's full review
Stephen Groat | TrustRadius Reviewer
Score 1 out of 10
Vetted Review
Verified User
Review Source
LogRhythm was being used in our production environment primarily for compliance reasons (HIPAA). This tool primarily provided a HIPAA compliant SIEM and HIPAA compliant reporting for audits and other compliance related activities. The tool aggregated logs from the machines in some of our private environments to give us a holistic view for the specific compliance environments.
  • HIPAA and Compliance
  • Brand Recognition
  • Documentation and Training
  • Complicated and manual setup
  • Not cloud native, difficult to automate
  • Pricing
  • Reliance on Windows
LogRythm is good for Windows based compliance environments where operators may need training or hiring with tool experience is important. For environments that use a lot of more ephemeral machines (such as AWS Spot instances), the management overhead of having to manually add boxes to the LogRythm central server is not worthwhile
Read Stephen Groat's full review
Anonymous | TrustRadius Reviewer
Score 4 out of 10
Vetted Review
Verified User
Review Source
We are using LogRhythm as our enterprise-wide SIEM tool for all log ingestion. We recently (3+mo) decided to uplift the implementation to include our AWS cloud environments. We need a SIEM tool to analyze and ingest event logs.
  • Event & Log ingestion - Enterprise grade SIEM tool.
  • Ease of implementation, support, documentation, and community.
  • Support for Cloud environments is fairly limited.
  • Improved log filtering.
  • The UI is extremely outdated.
It is great for on-prem, but not ideal for the cloud. It "works" for the cloud, but it is not optimized.
Read this authenticated review
Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source
LogRhythm is used by both our managed security services partner (level 1) and the internal team members who manage our SOC. We leverage the complete set of SIEM features offered by LogRhythm to meet requirements for PCI in addition to comprehensive support for our evolving process to meet the changing data security needs of a retail organization.
  • LogRhythm's technical customer support is exceptional.
  • The product roadmap is extensive.
  • Automation and AI continue to evolve rapidly.
  • LogRhythm has recently updated their agent to support a push process for upgrade - until this was done, it was a source of frustration.
LogRhythm is very well suited for retail organizations and others with a geographically dispersed set of endpoints. LogRhythm also works very well in situations where there is a multi-tired SOC - especially if an outsourced provider is involved that can manage the upgrade process to ensure that the system is always up-to-date without requiring the support of internal resources.
Read this authenticated review
Seth Shestack | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source
LogRhythm is used throughout our organization and managed by the Information Security department
We collect logs from many systems that are important to managing our security infrastructure.
These include all of our security systems (FW, IPS, Endpoint protection), all of our AAA systems (LDAP, Radius Active Directory), as well as sytems contain data of concern.
  • Central Management and storage of logs
  • Parses all logs into a readable format
  • Correlates events from various systems to provide a consolidated view of activity
  • Alerts and alarms on various events of possible concern
  • Reports should be available in the Web Console
  • Detail contained in Alarms should be configurable to provide more or less information as applicable
  • Case in the case management module should allow investigation playbook templates
LogRhythm is well suited for managing logs from disparate systems, correlating events, and providing a comprehensive view of the environment. One of its main strengths is the continuity of dashboards, drill downs in data, searches, and alarms.
All of the screens use the same format moving from module to module, making this product very intuitive to use.
Read Seth Shestack's full review
James Harrison, CISSP | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Review Source
It is deployed as an enterprise logging solution. It collected logs from Windows (all flavors), *nix, Cisco, Syslog, NetFlow and other sources. It provides logs that are analyzed, reported on and used in daily operational troubleshooting. It provides scheduled reports to meet the auditing and compliance needs of an HIPAA organization.
  • Great Web UI for help desk troubleshooting.
  • Identification and drilldown of authentication issues.
  • Performance trending.
  • Correlation of events.
  • Access and group policy change monitoring.
  • Reporting is based on Crystal Reports, requiring a template prior to building a report. The template once saved, cannot be edited. Repeat until you get it right.
  • Query building in the WebUI has little or no documentation.
  • Depth of training on reporting is lacking.
Logging is always necessary if
1. You have audit requirements for system access
2. You need to alert and report on user activity
3. You need to troubleshoot issues
4. You want to monitor, report and alert on malicious / suspicious activity
5. You want to impress your management team with statistics...

I cannot think of any computing environment where logging is not appropriate.
Read James Harrison, CISSP's full review
Jacob Steffen | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Review Source
We use LogRhythm to collect logs from a variety of devices. We then use this data to alert us when certain events occur. For example if a machine is restarted or a new user account is created. Only my department is using LogRhythm for these types of situations. The big driver for us getting LogRhythm was compliance NERC/CIP regulations pushed us to purchase LogRhythm. Overall I am really satisfied with the decision we are going to continue doing business with them for the foreseeable future.
  • One is alerting when certain events take place such as when a machine reboots. This is helps to gain more transparency as to what is going on within your network.
  • The features LogRhythm offers in terms of reporting are very helpful as well. For example we can do monthly reports on a given Windows server to show all activity on that server.
  • I know in the past LogRhythm was talking about a web application for administration. I think this would be a lot better than having an application to log into.
  • I think offering more video content on their site would also be beneficial. The last time I had issues I was reading through a lot of forum postings, I was able to get the job done but in 2017 video is the king of content.
Where it is more appropriate would be for alerting for near real time events such as a new user being created or machine restarting. If you don't need to have real time alerting or log aggregation I would say LogRhythm would be a bad decision. However, in an Enterprise environment you are more than likely going to want to use LogRhythm to track logs over time.
Read Jacob Steffen's full review
Joel Eng | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Review Source
I manage multiple instances of LogRhythm for customers that my company provides managed security services for. My team provides the rules, reports, and dashboards. Analysts use it to detect and respond to threats in our customers' environments. Our customers use LogRhythm to monitor their entire organizations ranging in size from 100-10,000+ end points plus network and security devices. The primary business problems that the SIEM solves is providing a single pane of glass for security while also providing a platform for conducting correlation across the network and time.

  • LogRhythm is a great SIEM to learn content on because the building blocks are very intuitive and easy to implement. All of the concepts relevant to content development are literally represented as drag and drop building blocks that can be easily manipulated.
  • The statistical building blocks contain powerful anomaly detection capabilities that are extremely difficult to implement in other SIEMs or not possible at all.
  • LogRhythm does better event classification than any other SIEM by far. My team typically drops all classification schemes from default installations of SIEMs and rebuilds them from scratch. I can actually use LogRhythms event classifications in rules without worrying about excessive partial matches or correlating unwanted events.
  • LogRhythm absolutely needs to provide back end support for threat intelligence lists. Performing a linear search on massive lists of IPs on incoming web traffic can bring the SIEM to its knees.
  • LogRhythm should drop its entire code base for implementing lists and simply turn them into hash tables to avoid the excessive cost associated with referencing lists in rules. I haven't seen the code, but the performance suggests O(n).
  • The reporting feature is the worst of all SIEMs, luckily reports are not my primary service offering. LogRhythm should definitely revamp its reporting to be more intuitive.
I have seen LogRhythm reliably deployed in both medium and large sized corporations with centralized and distributed architectures. The software performs well across all scenarios.
Read Joel Eng's full review
Stephen Ilbery | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Review Source
We use LogRhythm to give the Information Systems Engineering department insight into our network environment.
  • LogRhythm imports log files from hundreds of devices into one, easy to search database.
  • LogRhythm sends me email alerts when various things take place on the network.
  • The upgrade process could be easier.
LogRhythm provides a good view of the network equipment, traffic, and the servers.
Read Stephen Ilbery's full review
Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source
It is being used to not only to help us achieve PCI compliance but collect logs from various systems to monitor the landscape and critical infrastructure systems. It alerts us to various anomalies that we set up to monitor such as the use of privileged accounts within the environment.
  • Easy to set up/configure out of the box.
  • Easy to manage/administer.
  • Quickly processes logs/events within the central console for review.
  • Allows us to correlate activities across multiple systems we capture logs/events for.
  • The upgrade process from version 6.x to 7.x was a bit messy.
  • Should be able to update software within the application for minor updates without the need to download separate software from the support portal.
It helps achieve various aspects of compliance needs and requirements. It also provides a nice overview of what is going on within the environment in respect to security threats. It is less appropriate if there is no internal team that can properly manage it and respond to alerts/events that are triggered.
Read this authenticated review

Feature Scorecard Summary

Centralized event and log data collection (17)
9.4
Correlation (17)
9.0
Event and log normalization (17)
8.6
Deployment flexibility (16)
7.9
Integration with Identity and Access Management Tools (14)
8.0
Custom dashboards and views (17)
9.0
Host and network-based intrusion detection (13)
7.5

About LogRhythm NextGen SIEM Platform

The LogRhythm NextGen SIEM Platform, from LogRhythm in Boulder, Colorado, is security information and event management (SIEM) software which includes IR via the SmarResponse Automation Framework, UEBA via the CloudAI security analytics tool, NetMon network forensics, and other features providing a total SOC or enterprise security platform.

LogRhythm NextGen SIEM Platform Technical Details

Operating Systems: Unspecified
Mobile Application:No