Logsign - SIEM/threat hunting solution that makes your life easy
September 06, 2022

Logsign - SIEM/threat hunting solution that makes your life easy

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Logsign

I am using the solution for Log Management, Correlation, Alerting, Incident Handling, and Compliance. It makes it possible to hunt for threats, be more proactive, and assure that I do not miss any critical and security events. Before we were struggling with events/incident searching performance, with Logsign it is very easy to make reports for the management.
  • Google like search capabilities
  • Very easy to create correlation/cross correlation rules
  • In-house Rules and Behavioral lists
  • Easy to update/upgrade the whole solution
  • Within the first days of implementation, you have the big picture of what is happening in the organization's environment
  • The license model is very understandable and affordable for any organization even for the smaller ones who earlier could not afford robust SIEM solutions
  • Support is very responsive and skilled

Do you think Logsign delivers good value for the price?

Yes

Are you happy with Logsign's feature set?

Yes

Did Logsign live up to sales and marketing promises?

Yes

Did implementation of Logsign go as expected?

Yes

Would you buy Logsign again?

Yes

Logsign SIEM is well suited for organizations that need quick deployment, and do not need very skilled specialists, everything is easy and intuitive. And with the new license model, it is a very affordable solution. It has everything that modern SOC needs nowadays, automated/semi-automated responses. There are also many plugins for the log source integration, possibilities to create custom your own plugin/logic

Logsign Feature Ratings

Centralized event and log data collection
10
Correlation
10
Event and log normalization/management
10
Deployment flexibility
10
Integration with Identity and Access Management Tools
10
Custom dashboards and workspaces
10
Host and network-based intrusion detection
10