Our primary use case is for looking at daily logs, drawing conclusions, and making relationships and correlations to investigate particular event IDs, investigate particular alarms that we have, and just viewing normal data use. I'm new to the system so I'm still getting used to it.
Has the ability to investigate a particular period of time in order to analyze logs but we've had problems with stability
Pros and Cons
- "The ability to investigate a particular period of time where you can analyze logs is its most valuable feature."
- "I would like to see more integration with more products that are out there within the same security field."
What is our primary use case?
How has it helped my organization?
From a security standpoint, it's the solution to have, in regards to LogRhythm. Just having a SIEM solution in your environment is definitely key. It's a very highly rated solution, but we may be moving away from it in the future. We're looking to see what else is out there.
What is most valuable?
The ability to investigate a particular period of time where you can analyze logs is its most valuable feature.
What needs improvement?
I would like to see more integration with more products that are out there within the same security field.
There has to be some improvement with SecondLook Wizard. It's one of the functionalities on LogRhythm where you can restore inactive logs. For instance, it's a forensic analysis point of view if something happened around a year ago that you have to look into. I wish there was a smoother, more seamless feature.
Buyer's Guide
LogRhythm SIEM
January 2025
Learn what your peers think about LogRhythm SIEM. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,158 professionals have used our research since 2012.
What do I think about the stability of the solution?
We have a lot of issues with stability. Sometimes it crashes and we have to rerun a scan. It also freezes. It hasn't been the best.
What do I think about the scalability of the solution?
Scalability is fine.
How are customer service and support?
We've submitted some tickets with their technical support. My manager has had some poor experiences with them in the past.
Which other solutions did I evaluate?
Quality, support, preciseness, and accuracy are the criteria we consider when we evaluate solutions to proceed with.
What other advice do I have?
I would rate it a six and a half out of ten. Sometimes I have to rerun scans and look into why the scan didn't complete and why it crashed. All of that stuff has to do with the initial set up. For the most part, it does what we want, but there can definitely be improvement.
I would advise someone considering this solution to look beyond LogRhythm. LogRhythm is one of the top solutions. I would say Splunk is overrated. Look into IBM QRadar and then McAfee as well.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Security Engineer at a financial services firm with 1,001-5,000 employees
Web Console allows me to see the health of our environments, but support needs work
Pros and Cons
- "The Web Console is my favorite. It enables me, at a glance, to see the health of the environments."
What is our primary use case?
I'm an admin and analyst, so use cases cover a lot of log sources for applications, mostly.
How has it helped my organization?
Being able to see when one of our assets is down and being able to restart it really quickly has been a definite benefit. It has been really helpful in the general maintenance of our whole environment.
We're able to look at our environment and see how it's being affected, according to the log sources. We can immediately see how the system responds to things that our development team does.
What is most valuable?
The Web Console is my favorite. It enables me, at a glance, to see the health of the environments. That is really important to me and to us.
What needs improvement?
I would like to see more widgets. I just love the widgets on the Web Console, I love to play with them, so more would be better.
What do I think about the stability of the solution?
The stability has been great since the upgrade.
What do I think about the scalability of the solution?
We just upgraded to 7.35 and, although I wasn't involved in that, it seems like since then everything has been working really well. It scaled really well and we are taking in new network monitors. That has been really easy.
How is customer service and technical support?
We usually do end up having to remind technical support about our issues, get back in touch with them to see what the status is on our tickets. That has been frustrating in the past, but they do find solutions. Sometimes it takes a while. And sometimes that communication gets lost. Some of our tickets had to be escalated to engineers. They get a little bit lost, at times, when that happens to a ticket.
Overall, I would rate tech support at three out of five.
What other advice do I have?
I would definitely recommend LogRhythm. Work with the LogRhythm team to help learn how your environment works. Use as much help as LogRhythm can provide in your initial setup, so you can understand your environment best.
We have more than 20 log sources. We average around 3,000 messages per second. We have hit 8,000 in the past, but not since the new upgrade in which we got more room. In terms of staff for deployment and maintenance, there are just two of us who share it. But when we're on-call, all of us use it. There are nine of us who use it every day when on-call.
I rate the solution at seven out of ten. I'm very happy with it. I love how powerful it is. However, the customer service is where the points come off. I know they're working on it.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
LogRhythm SIEM
January 2025
Learn what your peers think about LogRhythm SIEM. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,158 professionals have used our research since 2012.
Senior Architect at a energy/utilities company with 201-500 employees
We use it to examine traffic patterns and anomalies, but have a hard time visually sifting through the noise
Pros and Cons
- "We have NetFlow information going into it, so we can examine a lot of traffic patterns and anomalies, especially if something stands out and is not the baseline. This helps a lot."
- "We're still struggling to get a real return on it and finding something that isn't false noise."
What is our primary use case?
We have a small population of users, but we are large physically and geographically spread out with a lot of devices on our network. We need all that login capability going into one spot where we can see it and correlate events across all our infrastructure with a small staff.
How has it helped my organization?
We're still struggling to get a real return on it and finding something that isn't false noise.
There have been a few things, such as weird service accounts that have an encrypted password which are locking things out. However, we haven't had a big security event success with it as of yet. We could be missing things here, not seeing what is going on.
What is most valuable?
We do a lot of the alerting, as far as user accounts. We have NetFlow information going into it, so we can examine a lot of traffic patterns and anomalies, especially if something stands out and is not the baseline. This helps a lot.
What needs improvement?
We still have a lot of noise, so this is a problem. We are having a hard time visually sifting through it. We need help dialing it in. We don't have the in-house expertise. Do we hire someone just for this purpose and have them sit there all day, every day doing that? It is almost at that point. We are looking at Optiv as solution right now.
It is so robust. There are so many moving pieces that you can't dabble in them. This is the problem that we are struggling with. You have to have somebody who works with it, and that is their job. Maybe a bigger company could have a whole team which could do this, but we don't have the capability right now.
I would like to see the client and the web client merged, so all the administrative functions are in the same web interface. It is just clunky right now. If you leave it running, it slows down your machine. However, we are still on version 7.3.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
It seems to be stable.
What do I think about the scalability of the solution?
It should meet our needs going forward. It seems like it is a mature enough product.
As far as what it takes, I don't know if it's worth the effort to get it on all the desktops, like every single user desktop and laptop reporting to it or if it is better just to target the main controllers, etc.
How is customer service and technical support?
I haven't had to use them too much. We will find out after we go online with Optiv.
I have my sales engineer with LogRhythm, who has been helpful. She reaches out to me every couple months just to see if we need anything and offers assistance, because we'd already used up our block of hours when we first provisioned this solution.
We probably will contact them, if we go with Optiv, then they can help us upgrade.
How was the initial setup?
We did an on-premise solution. If I had to do it again, I would probably do a cloud-based solution. They basically shipped two boxes which were essentially ready to go. Then, I worked with an engineer who had a block of hours and he got the HA capability going. We got it dialed in and tied it up with the mainframe.
Our team is in the process this week of doing a health check and trying to get everything up to speed. We are doing an upgrade, because we are still on 7.3. We need to be upgraded to 7.4.
We have been using it for about a year. We are probably only about 75 percent there. We need help getting it dialed in, having some of the noise tuned out, and getting the alerts set up properly, so we can work off hours on different triggers. This is where we are struggling because we need to sleep, and we are blind during that time. So, we something to help us with that.
What about the implementation team?
The installation wasn't too bad. LogRhythm did most of it. I just had to do the stuff that was specific for our environment.
Which other solutions did I evaluate?
We went back and forth between LogRhythm, Splunk, and AlienVault.
I liked LogRhythm mostly for how it integrated with the network infrastructure. It was my decision, and I'm not 100% sure that I picked the right one.
LogRhythm works well with our network-centric environment. However, it may not be the best for other things.
What other advice do I have?
I am rating the solution a six out of ten, because we have not gotten it to work yet. With all its components, there is such a learning curve.
I haven't gotten far enough along in the process to know if the solution has a shortcoming or if it is our shortcoming with somehow getting it dialed in.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Sr. Systems Support Analyst at a manufacturing company with 10,001+ employees
Ease of use has helped us uncover a lot of information and protect our data
What is most valuable?
Ease of use.
How has it helped my organization?
We're pretty new to it, but so far it's uncovered quite a bit of information. Just having everything in a single space has been very helpful.
As a security organization, our challenges are discovering where our data is at, most times, and protecting it. As I said, we're fairly young in LogRhythm, but so far it's done a very good job.
What needs improvement?
CloudAI is amazing from what I've heard about it so far, and I'm looking forward to it.
There is always room for improvement. Everybody continues to integrate. They've been a great company to work with so far. I'm one of those who is optimistic, there's always room for improvements.
What do I think about the stability of the solution?
Rock solid so far.
What do I think about the scalability of the solution?
Scalability is incredible. There are no two ways about that, we're not even scratching the surface, and we're a pretty large company.
How are customer service and technical support?
We've used tech support a couple of times, and they've been very responsive and very knowledgeable.
Which solution did I use previously and why did I switch?
This is our first SIEM. My biggest driving factor was something that we could run with a small team. Like most, we have a very limited set of people to do this.
How was the initial setup?
It was fairly complex, but that's just because we did the little things that aren't normal in our environment, but other than that fairly straightforward.
We did it in a little bit of a different fashion than most would. We deployed it in Azure, in a cloud environment. That was a little different, but still pretty straightforward.
What other advice do I have?
The unified, end-to-end solution is very key here. We have a lot of various tools, and trying to get them all into one is very key.
Be sure to size it properly. Don't try to boil the ocean. Get your key log sources and let it start paying for itself immediately; it will.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Manager Security Operations Center at a leisure / travel company
Investigation tab allows us to dig deeper into the alerts that we receive; the UI is easier than other solutions
How has it helped my organization?
Our key challenges in security include
- standardizing our policies
- having the end user population be aware on the security side of things.
And the solution, LogRhythm, is helping us today to enforce it. We see now what it is that we're trying to propagate into the environment, based on the policies that we're monitoring today. The goal is to 100% enforce our policies.
It has improved things tremendously. Going from a third-party vendor to an in-house solution, such as the LogRhythm solution, has given us visibility into the entire organization, compared to the limitations, based on budget and whatnot, from a third-party vendor. Absolutely, we have a lot more visibility now.
I can tell you that having the ability to monitor the semi-subsidiaries that are a part of our organization, is huge in that sense.
We have 10,000 EPS, as it is. And we have between about 500 and 1500 incidents daily.
What is most valuable?
One of the most valuable features is the investigation tab. It allows us to dig in deeper into the alerts that we receive today, based on the policies, that get triggered by our end-user population.
What needs improvement?
I think a must-have feature would be better reporting. Today, as you can imagine, the organization would like to see what is happening in our environment, and the reporting feature within LogRhythm, I would say, is very limited.
The reports do not provide information such as, who are your top ten end users generating the most activity within the environment, or appliances, per se, so that's very limited.
What do I think about the scalability of the solution?
So far, from my end, I haven't experienced any challenges. We are able to integrate all of the solutions that we have out there: our antiviruses, our data-loss prevention tools, and even our web browsing filtering.
At this point, I really don't have any challenges. Maybe the architectural team has different ones for integrations, but no issues on my end.
How are customer service and technical support?
I have not used technical support, as I do not troubleshoot the application itself. We are technically just administrators of it, monitoring.
Which solution did I use previously and why did I switch?
Because the organization wanted to have an in-house solution, when we looked at what was out there, we thought that LogRhythm, based on the user interface that was somewhat easier to follow compared to the competition, was a must for our security analysts.
And the additional features within the investigation side of it, to dig deeper into what's going on out there. Those were two big selling factors for us.
Which other solutions did I evaluate?
- Curator
- Splunk
- Dell SecureWorks
We chose LogRhythm because, as I said before, the user interface was really a plus for us. It was easier to understand, compared to the competition. And the ability to dig in deeper in the investigation tab, those were the two major selling points.
What other advice do I have?
The most important criterion, when selecting a vendor, is how easy it is to adapt to the solutions we have in house. Every organization, I understand, is different, but based on what we required, for the most part I'd say about 85% of our needs were met with LogRhythm, compared to all other competitors.
It's very important for our solution to be a unified, end-to-end platform because the organization might adapt new technologies. Our security architect needs to have the ability to integrate them. If it's a challenge then, definitely, that's going to be a downside for us.
If a colleague at another company was doing a SIEM solution comparison with this and similar solutions, I would say to give LogRhythm a shot and, if the possibilities are there, to implement a PoC to understand how the solution can help them.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
VP, Information Security Officer with 501-1,000 employees
Custom rules/alerts in LRM and AIE provide insight into network for internal users and InfoSec, although adding an entity could be much faster.
What is most valuable?
- Advanced Intelligence Engine (AIE) for threat intelligence, 9/10
- LRM for logging and compliance, 8/10
How has it helped my organization?
Custom rules/alerts in LRM and AIE provide insight into network for internal users as well as InfoSec. Proactive account lockout alerts for SecAdmin, alerts to DBAs on domain admin access to SQL servers, PCI and GLBA compliance alerts/reports for InfoSec and Audit.
What needs improvement?
Adding an entity (should be able to create a template and/or eliminate locations) could be much faster/streamlined. The wizard could be improved to specify OU/Groups to search for new entities.
For how long have I used the solution?
- LRM – four years
- AIE – three years
What was my experience with deployment of the solution?
No issues encountered.
What do I think about the stability of the solution?
There have been issues with the hardware which has resulted in the LRM going down a few times.
What do I think about the scalability of the solution?
No issues encountered.
How are customer service and technical support?
Customer Service:
It's the best there is.
Technical Support:It's the best there is.
Which solution did I use previously and why did I switch?
We had Tripwire, but we needed logging and SIEM, not just logging.
How was the initial setup?
It was straightforward as the training provided all the tools. Also, the UI has gotten better with time.
What about the implementation team?
We had a mix of an in-house team with one from LogRhythm.
What was our ROI?
Literally impossible to quantify. We haven’t had any events or deficiencies in audits, which is invaluable.
What's my experience with pricing, setup cost, and licensing?
Pricing (especially considering feature sets) is best in the market, though HA/DR is tough to justify for a SMB. Even with two outages due to hardware we haven’t invested in a backup.
Which other solutions did I evaluate?
- QRadar
- RSA
- Tripwire
What other advice do I have?
Implementation time, hygene/maintenance time, functionality, and cost make it the clear choice in a competitive market.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Manager, Enterprise Risk Consulting at a tech company with 1,001-5,000 employees
HP ArcSight vs. IBM QRadar vs. McAfee Nitro vs. Splunk vs. RSA Security vs. LogRhythm
We at Infosecnirvana.com have done several posts on SIEM. After the Dummies Guide on SIEM, we are following it up with a SIEM Product Comparison – 101 deck. So, here it is for your viewing pleasure. Let me know what you think by posting your comments below. The key products compared here are based on Gartner Magic Q which is what Organizations typically use to select SIEM vendors. The Vendors mentioned here in the deck are :
1. HP ArcSight
2. McAfee Nitro
3. IBM QRadar
4. Splunk SIEM
5. RSA Security Analytic
6. LogRhythm.
SIEM Technology Space
SIEM market analysis of the last 3 years suggest:
HPArcSight
The ArcSight Enterprise Threat and Risk Management (ETRM) Platform is an integrated set of products for collecting, analysing, and managing enterprise Security Event information.
- ArcSight Enterprise Security Manager (ESM): Correlation and analysis engine used to identify security threat in real-time& virtual environments
- ArcSight Logger: Log storage and Search solution
- ArcSight IdentityView: User Identity tracking/User activity monitoring
- ArcSight Connectors: For data collection from a variety of data sources
- ArcSight Auditor Applications: Automated continuous controls monitoring for both mobile
Strengths | Weaknesses |
Extensive Log collection support for commercial IT products & applications | Complex deployment & configuration |
Advanced support for Threat Management, Fraud Management & Behavior Analysis | Mostly suited for Medium to Large Scale deployment |
Mature Event Correlation, Categorization & Reporting | Requires skilled resources to manage the solution |
Tight integration with Big data Analytics platform like Hadoop | Steep learning curve for Analysts & Operators |
Highly customizable based on organization’s requirements | |
Highly Available & Scalable Architecture supporting Multi-tier & Multi-tenancy |
IBM QRadar
The QRadar Integrated Security Solutions (QRadar) Platform is an integrated set of products for collecting, analysing, and managing enterprise Security Event information.
- QRadar Log Manager – Turn key log management solution for Event log collection & storage
Strengths | Weakness |
Very simple deployment & configuration | Limited customizations capabilities |
Integrated view of the threat environment using Netflow data, IDS/IPS data & Event logs from the environment | Limited Multi-tenancy support |
Behavior & Anomaly Detection capabilities for both Netflow & Log data | Limited capability to perform Advanced Use Case development & analytics |
Suited for small, medium & large enterprises | |
Highly Scalable & Available architecture |
McAfee Nitro
The McAfee Enterprise Security Management (formerly Nitro Security) Platform is an integrated set of products for collecting, analysing, and managing enterprise Security Event information.
- McAfee Enterprise Log Manager – turn key log management solution for Event log collection & storage
- McAfee Event Receiver – collecting log data & native flow data
- McAfee Database Event Monitor – database transaction & Log monitoring
- McAfee Application data Monitor – application layer event monitoring
- McAfee Advanced Correlation Engine – advanced correlation engine for correlating events both historical & real time
Strengths | Weaknesses |
Integrated Application Data monitoring & Deep Packet Inspection | Very basic correlation capabilities when compared with HP & IBM |
Integrated Database monitoring without dependence on native audit functions | Limitations in user interface when it concerns navigation |
High event collection rate suited for very large scale deployment | Requires a lot of agent installs for Application & database monitoring thereby increasing management complexity |
Efficient query performance in spite of high event collection rate | No Big Data Analytics capability |
Limited customization capabilities | |
Limited support for multi-tier & multi-tenancy architecture |
Splunk
Splunk Enterprise is an integrated set of products that provide Log Collection, management & reporting capabilities using
- Splunk Indexer – used to collect and index logs from IT environment
- Splunk Search Heads – used to search & report on IT logs
- Splunk App for Enterprise Security - used to collect external threat intelligence feeds, parse log sources and provide basic analytics for session monitoring (VPN, Netflow etc.)
Strengths | Weakness |
Extensive Log collection capabilities across the IT environment | Pre-SIEM solution with very limited correlation capabilities |
Log search is highly intuitive – like Google search | Even though easy to deploy, increasingly difficult to configure for SIEM related functions |
Flexible dash boarding & analytics capability improves Log visualization capabilities | |
Built-in support for external threat intelligence feeds both open source & commercial | |
“App Store” based architecture allowing development of Splunk Plugins to suit monitoring & analytics requirements |
RSA Security
RSA Security Analytics is an integrated set of products that provide Network Forensics, Log Collection, management & reporting capabilities using
-
Capture Infrastructure
- RSA Security Analytics Decoder – Real time capture of Network Packet and log data with Analysis and filtering capabilities
- RSA Security Analytics Concentrator – Aggregates metadata from the Decoder
- RSA Security Analytics Broker Server – For reporting, management and administration of capture data
-
Analysis & Retention Infrastructure
- Event Stream Analysis – Correlation Engine
- Archiver – Long term retention, storage, security & compliance reporting
- RSA Security Analytics Warehouse – Big Data Infrastructure for Advanced Analytics
Strengths | Weakness |
Great Analytics using Event Log Data & Network Packet Capture | New Product release from RSA, hence advanced Security correlation support is poor |
Network forensics, Big Data (Parallel Computing) are cornerstones in SIEM world | Security Analytics Warehouse is a new capability with very little real world use cases |
Tightly Integrates with RSA ecosystem for Threat Intelligence, Fraud Detection, Malware Analysis etc. (each requires separate RSA Tools) | Suited only for large enterprises with need for complex deployment and management resources. Poor deployment options for small and midsize customers |
LogRhythm
The LogRhythm SIEM 2.0 Security Intelligence Platform is an integrated set of products for collecting, analysing, and managing enterprise Security Event information.
- Log Manager – high performance, distributed and redundant log collection and management appliance
Strengths | Weakness |
Well balanced log management, reporting, event management, privileged user monitoring and File integrity monitoring capabilities | Suitable for Security event data only, as Operational data sets cause slowing performance for searches and reports |
Fast deployment with minimal configuration because of appliance form factor | No Support for Active Directory integration for Role- Based Access Control |
Quarterly Health Check programs post-deployment offers great After sales-Service experience | Suited best for small and mid size companies with basic security, regulatory compliance and reporting needs. Not scalable for very large deployments. |
A Summary scoring sheet for SIEM Vendors based on their Core capabilities is given below
Capability | RSA Security Analytics | Log Rhythm | Splunk | McAfee Nitro | IBM Qradar | HP ArcSight |
Real-time Security Monitoring | 3.1 | 3.2 | 2.5 | 3.9 | 4.2 | 4.4 |
Threat Intelligence | 3.7 | 2.5 | 3.0 | 2.8 | 3.5 | 4.5 |
Behavior Profiling | 2.5 | 2.3 | 3.0 | 3.0 | 5.0 | 4.0 |
Data & End User Monitoring | 3.6 | 3.5 | 1.7 | 3.6 | 3.5 | 4.0 |
Application Monitoring | 3.8 | 3.5 | 1.8 | 3.7 | 3.3 | 3.8 |
Analytics | 2.5 | 2.5 | 3.8 | 4.5 | 3.5 | 4.0 |
Log Management & Reporting | 3.5 | 3.8 | 3.5 | 3.8 | 3.9 | 4.0 |
Deployment & Support Simplicity | 3.0 | 4.0 | 2.5 | 3.5 | 3.5 | 3.0 |
Total (Weighted Score) | 25.7 | 25.3 | 21.8 | 28.8 | 30.4 | 31.7 |
1.0 = Low level of capability
5.0 = High level of capability
SIEM Vendors – Use Cases Score Card
Use Cases | RSA Security Analytics | Log Rhythm | Splunk | McAfee Nitro | IBM Qradar | HP ArcSight |
Overall Use Cases | 3.2 | 3.2 | 2.7 | 3.6 | 3.8 | 4.0 |
Compliance Use Cases | 3.3 | 3.7 | 3.0 | 3.7 | 3.8 | 3.8 |
Threat Monitoring | 3.1 | 3.1 | 2.9 | 3.8 | 3.7 | 4.0 |
SIEM | 3.2 | 3.4 | 2.8 | 3.6 | 3.8 | 3.9 |
Total (Weighted Score) | 12.8 | 13.4 | 11.4 | 14.7 | 15.1 | 15.7 |
1.0 = Low level of capability
5.0 = High level of capability
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Network Engineer with 201-500 employees
Allows us to automate a lot of things with a smaller team
Pros and Cons
- "It allows us to automate a lot of things with a smaller team."
- "Move it to Linux. I would like to see it get off the SQL Server."
What is our primary use case?
We use it to alarm our help desk.
We staring to use it for SMART Response. We have been using SMART Response for about a year. Now, we are starting to push that towards the help desk, so the junior analysts can do more.
How has it helped my organization?
It allows us to automate a lot of things with a smaller team.
What is most valuable?
- AI
- SMART Response
- Looking forward to using the playbooks
What needs improvement?
- Move it to Linux. I would like to see it get off the SQL Server.
- I would like it to be containerized.
What do I think about the stability of the solution?
Our appliance is a little older, so we need to upgrade it. We are going to probably move to the software-only version. However, the issues that we have are our own fault because we didn't buy the right-size appliance.
What do I think about the scalability of the solution?
We are not that big of a company. We are only at about 800 events per second.
How is customer service and technical support?
We have had a couple of custom logs built, but we don't call in that much.
How was the initial setup?
The initial setup is easy with the physical appliance.
What about the implementation team?
We have two people who are setting it up and doing the admin side.
What other advice do I have?
Make sure you size the appliance correctly.
We use Ansible and Terraform for infrastructure, so the same concept as the playbooks. We are looking to use the playbooks going forward.
We have about 1500 log sources. We do about a 25 million logs a day. Obviously, they're not all events.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free LogRhythm SIEM Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2025
Popular Comparisons
CrowdStrike Falcon
Microsoft Sentinel
Splunk Enterprise Security
IBM Security QRadar
Elastic Security
Sumo Logic Security
Rapid7 InsightIDR
Fortinet FortiSIEM
AlienVault OSSIM
Securonix Next-Gen SIEM
Exabeam
USM Anywhere
ManageEngine Log360
Google Chronicle Suite
Buyer's Guide
Download our free LogRhythm SIEM Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Between AlienVault and LogRhythm, which solution is suitable for Banks in Gulf Region
- IBM QRadar is rated above competitors (McAfee, Splunk, LogRhythm) in Gartner's 2020 Magic Quandrant. Agree/Disagree?
- Does LogRhythm NextGen SIEM offer good security?
- What Solution for SIEM is Best To Be NIST 800-171 Compliant?
- When evaluating Security Information and Event Management (SIEM), what aspect do you think is the most important feature to look for?
- What are the main differences between Nessus and Arcsight?
- What's The Best Way to Trial SIEM Solutions?
- Which is the best SIEM solution for a government organization?
- What is the difference between IT event correlation and aggregation?
- What Is SIEM Used For?
Cost/License should also be part of the criteria, because the capabilities of these solutions depends on how much EPS it is allowed to process. A lot of "events" goes down the drain if its beyond the EPS that customer license so therefore giving it a incomplete view of the network. Some remarketer of these solutions have crimped their proposal just to make a sale. Just my 2 cents.