Try our new research platform with insights from 80,000+ expert users

LogRhythm UEBA vs Palo Alto Networks Advanced Threat Prevention comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

LogRhythm UEBA
Average Rating
7.0
Reviews Sentiment
6.7
Number of Reviews
11
Ranking in other categories
User Entity Behavior Analytics (UEBA) (11th), Extended Detection and Response (XDR) (25th)
Palo Alto Networks Advanced...
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
26
Ranking in other categories
Intrusion Detection and Prevention Software (IDPS) (6th)
 

Mindshare comparison

LogRhythm UEBA and Palo Alto Networks Advanced Threat Prevention aren’t in the same category and serve different purposes. LogRhythm UEBA is designed for User Entity Behavior Analytics (UEBA) and holds a mindshare of 2.1%, down 3.4% compared to last year.
Palo Alto Networks Advanced Threat Prevention, on the other hand, focuses on Intrusion Detection and Prevention Software (IDPS), holds 7.4% mindshare, down 8.0% since last year.
User Entity Behavior Analytics (UEBA)
Intrusion Detection and Prevention Software (IDPS)
 

Featured Reviews

Sheikh Abu Ayub Azad - PeerSpot reviewer
Great at managing cyber incidents; the technical support could be improved
The initial setup is easy, partly because LogRhythm is primarily based on the Windows platform. It's good to have two engineers for deployment but it can be done with one. It's more about the knowledge. Deployment is typically done in two or three different phases. It usually takes up to three full months to get good deployment. There's the initial onboarding of all the log sources, then collecting data in the data lake, followed a couple of weeks later with some minor tuning before the final tuneup.
Carlos Bracamonte - PeerSpot reviewer
Robust, reliable, simple to install and good technical support
We are attempting to improve the use of URL filtering beyond threat protection. I'm not sure what the remaining threat protection features are off the top of my head. But beyond that, we use URL filtering. We have three approved cases for using external dynamic lists that are stored in a bucket repository. Then, for each URL site that needs to be whitelisted, we add it to the external dynamic list in order to gain access to this email. I would like Wildfire to be implemented. We use the equivalent in Cisco is the integration policies. We have the Wildfire but we are not currently implementing it. We don't have the license to use it, but we are not currently implementing it until we present the use cases that the company gives some value to and they approve the use of it.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"LogRhythm UEBA’s best feature is the dashboard. It provides several graphs, charts, and event logs."
"The solution is useful for privilege accounts and super admin accounts. It is beneficial from a security perspective. The tool uses machine learning rather than threshold-based alerts. For instance, it can detect unusual user logins, such as a user logging in from a new browser or location."
"Good capability pinpointing specific cyber incidents."
"It has a lot of features. It has file integration monitoring."
"It is easy to monitor users and that is how the solution is adding value to our firm."
"I can investigate attacks more quickly using machine learning tools."
"I typically use the product for reducing cyber risk, and I can investigate attacks more quickly using machine learning tools."
"The solution's most valuable features are the graphical user interface and the reporting."
"The application control and vulnerability protection are the most valuable features."
"The most valuable feature is its use of machine learning to detect potentially unknown threats."
"I find the malware protection very handy."
"The user interface is a bit more professional than some free products."
"Everything has been okay with the solution. We are using all of the features."
"The most valuable features are that it's user-friendly, has interesting features, URL filtering, and threat prevention."
"The initial setup was straightforward. It's quite easy. Deployment took one to two weeks."
"The most valuable feature of Palo Alto Threat Prevention for our company is the next generation firewall."
 

Cons

"The UI could be improved a little bit."
"It should have better mitigation with other solutions and be tightly integrated with other solutions. It has to be improved."
"What needs improvement in LogRhythm UEBA is the pricing. Here in Asia, for example, in Sri Lanka, pricing is the primary concern, and this is the only area for improvement I see in the product."
"LogRhythm UEBA's data aggregation needs to be improved. Open-source users do not have much documentation available. Documentation is available only for enterprise users."
"The product could be user-friendly for someone who doesn’t have any prior experience working with it."
"In general, if something needs to be improved in the algorithm, it would be the dashboards."
"The on-premises LogRhythm is not very scalable. When considering packets per second or the MPS needed for additional logs such as web application logs, scalability is usually found in cloud products."
"The cloud version is lacking and not up to par."
"The cost involves the price of the hardware, which is expensive. However, most of the Palo Alto solutions are expensive."
"The documentation needs to be improved. I need better information about how to configure it and what the best practices are."
"Palo Alto Networks Threat Prevention could improve the commercial offing. Other solutions, such as Fortinet provide better commercial features."
"It's not so easy to set up a test environment, because it's not so easy to get the test license. The vendor only gives you 90 days for a test license; it's a tough license to get."
"The organization mail security solutions could be improved. There is no mail security solution available."
"Sometimes when you want to group a set of ports, and communicate with Palo Alto, you cannot group TCP and UDP ports together. This needs to be adjusted."
"The installation was complicated."
"Palo Alto's maintenance needs to be improved."
 

Pricing and Cost Advice

"The pricing is nice when compared to other products in the industry."
"I rate the product's pricing a three out of ten. However, the cloud version is expensive. You need to hire professional services for deployment and migrations, which can be expensive."
"As LogRhythm UEBA is pretty expensive, I'd give its pricing a seven out of ten."
"Licensing is on a yearly basis. It's not expensive compared to its competitors."
"LogRhythm UEBA's pricing is affordable for small and medium businesses."
"It is quite a budget-friendly product."
"From one to ten, with one being the most expensive, I would rate the pricing of Palo Alto Networks Threat Prevention a one out of ten. It is my understanding that Palo Alto Networks Threat Prevention is the most expensive one."
"It is an expensive solution and I would like to see a drop in price."
"The cost involves the price of the hardware, which is expensive. However, most of the Palo Alto solutions are expensive."
"There is an initial, expensive investment but the return is good."
"The product’s pricing is expensive for small companies."
"Palo Alto Networks Advanced Threat Prevention is quite competitive, offering extensive threat detection and prevention capabilities, though it is priced higher than some alternatives."
"Palo Alto Networks Threat Prevention could improve by having consistent pricing at system levels."
"The pricing and the licensing are pretty competitive at this stage. As a reseller, I would like to see the price come down a little bit so I can compete better against other firewalls because we do that all the time."
report
Use our free recommendation engine to learn which User Entity Behavior Analytics (UEBA) solutions are best for your needs.
848,989 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
19%
Financial Services Firm
11%
Manufacturing Company
9%
Real Estate/Law Firm
7%
Computer Software Company
17%
Financial Services Firm
10%
Manufacturing Company
10%
Government
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about LogRhythm UserXDR?
The solution is useful for privilege accounts and super admin accounts. It is beneficial from a security perspective. The tool uses machine learning rather than threshold-based alerts. For instance...
What is your experience regarding pricing and costs for LogRhythm UserXDR?
I rate the product's pricing a three out of ten. However, the cloud version is expensive. You need to hire professional services for deployment and migrations, which can be expensive.
What needs improvement with LogRhythm UserXDR?
In general, if something needs to be improved in the algorithm, it would be the dashboards. The dashboards with solutions such as Splunk are very neat and clean. I would also like to improve the us...
Which is the best DDoS protection solution for a big ISP for monitoring and mitigating?
Arbor would be the best bid, apart from Arbor, Palo Alto and Fortinet have good solutions. As this is an ISP, I would prefer Arbor.
What is your experience regarding pricing and costs for Palo Alto Networks Threat Prevention?
The pricing is competitive, and with current campaigns and discounts, it provides an excellent device for a reasonable price.
 

Also Known As

LogRhythm UserXDR, LogRhythm Enterprise UEBA
No data available
 

Overview

 

Sample Customers

Information Not Available
University of Arkansas, JBG SMITH, SkiStar AB, TRI-AD, Temple University, Telkom Indonesia
Find out what your peers are saying about IBM, Rapid7, Exabeam and others in User Entity Behavior Analytics (UEBA). Updated: April 2025.
848,989 professionals have used our research since 2012.