LogRhythm - excelling in customer support and innovation
August 01, 2018

LogRhythm - excelling in customer support and innovation

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with LogRhythm

LogRhythm is used by both our managed security services partner (level 1) and the internal team members who manage our SOC. We leverage the complete set of SIEM features offered by LogRhythm to meet requirements for PCI in addition to comprehensive support for our evolving process to meet the changing data security needs of a retail organization.
  • LogRhythm's technical customer support is exceptional.
  • The product roadmap is extensive.
  • Automation and AI continue to evolve rapidly.
  • LogRhythm has recently updated their agent to support a push process for upgrade - until this was done, it was a source of frustration.
  • LogRhythm allowed us to meet several compliance needs with very minimal investment of time.
  • Overlal cost of ownership is much less than with other platforms that we had used.
We selected LogRhythm due to low overall time investment to meet our basic needs, very competitive pricing, a strong user community and a reputation for excellent support. We have been pleasantly surprised by the very personal nature of the partnership we enjoy with LogRhythm - even for an organization of our modest size.
LogRhythm is very well suited for retail organizations and others with a geographically dispersed set of endpoints. LogRhythm also works very well in situations where there is a multi-tired SOC - especially if an outsourced provider is involved that can manage the upgrade process to ensure that the system is always up-to-date without requiring the support of internal resources.

LogRhythm NextGen SIEM Platform Feature Ratings

Centralized event and log data collection
10
Correlation
10
Event and log normalization/management
10
Deployment flexibility
9
Integration with Identity and Access Management Tools
10
Custom dashboards and workspaces
10
Host and network-based intrusion detection
9