Top Rated SIEM Platform
May 05, 2022

Top Rated SIEM Platform

Mohammed Younus Siddiqui | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User

Overall Satisfaction with LogRhythm NextGen SIEM Platform

We use LogRhythm NextGen SIEM Platform in our university to ingest all types of logs. Be it firewall logs, window events logs etc. If it has a log then we send it to LogRhythm NextGen SIEM Platform. This ensures that we have all our logs in one central place which can then be used to analysis and cross section and use case creation.
  • Log Ingestion
  • Dashboards
  • Alerts
  • Hard to Use
  • Multiple modules with different points of entry
  • Needs AI
  • Dashboards
  • Log Ingestion
  • Alerts
  • Intrusion Detection
  • Executive Level Reports
  • Centralized log search and lookup
LogRhythm has consistently been in the top quadrants and reviews. The support provided by the vendor is top class. Once it is up and running, there is no much to be done in terms of setup. However, free trainings on the internet like youtube are not available as they should be.

Do you think LogRhythm NextGen SIEM Platform delivers good value for the price?

No

Are you happy with LogRhythm NextGen SIEM Platform's feature set?

Yes

Did LogRhythm NextGen SIEM Platform live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of LogRhythm NextGen SIEM Platform go as expected?

I wasn't involved with the implementation phase

Would you buy LogRhythm NextGen SIEM Platform again?

No

If you want one of the best SIEM platforms out there with in built ready to use dashboards and use cases then LogRhythm NextGen SIEM Platform is the SIEM for you. However, you will need technical training and expertise to make sure that it runs smoothly and to built your own custom use cases. And also it's expensive.

LogRhythm NextGen SIEM Platform Feature Ratings

Centralized event and log data collection
10
Correlation
9
Event and log normalization/management
9
Deployment flexibility
5
Integration with Identity and Access Management Tools
Not Rated
Custom dashboards and workspaces
8
Host and network-based intrusion detection
Not Rated
Log retention
6
Data integration/API management
Not Rated
Behavioral analytics and baselining
Not Rated
Rules-based and algorithmic detection thresholds
Not Rated
Response orchestration and automation
Not Rated
Reporting and compliance management
6
Incident indexing/searching
Not Rated