Try our new research platform with insights from 80,000+ expert users
PeerSpot user
Manager, Enterprise Risk Consulting at a tech company with 1,001-5,000 employees
Real User
HP ArcSight vs. IBM QRadar vs. ​McAfee Nitro vs. Splunk vs. RSA Security vs. LogRhythm

We at Infosecnirvana.com have done several posts on SIEM. After the Dummies Guide on SIEM, we are following it up with a SIEM Product Comparison – 101 deck. So, here it is for your viewing pleasure. Let me know what you think by posting your comments below. The key products compared here are based on Gartner Magic Q which is what Organizations typically use to select SIEM vendors. The Vendors mentioned here in the deck are :

1. HP ArcSight

2. McAfee Nitro

3. IBM QRadar

4. Splunk SIEM

5. RSA Security Analytic

6. LogRhythm.

SIEM Technology Space

SIEM market analysis of the last 3 years suggest:

  • Market consolidation of SIEM players (25 vendors in 2011 to 16 vendors in 2013)
  • Only products with technology maturity and a strong road map have featured in leaders quadrant.
  • HP ArcSight & IBM Q1 Labs have maintained leadership in SIEM industry with continued technology upgrade
  • McAfee Nitro has strong product features & road map to challenge HP & IBM for leadership
  • HPArcSight

    The ArcSight Enterprise Threat and Risk Management (ETRM) Platform is an integrated set of products for collecting, analysing, and managing enterprise Security Event information.

    • ArcSight Enterprise Security Manager (ESM): Correlation and analysis engine used to identify security threat in real-time& virtual environments
    • ArcSight Logger: Log storage and Search solution
    • ArcSight IdentityView: User Identity tracking/User activity monitoring
    • ArcSight Connectors: For data collection from a variety of data sources
    • ArcSight Auditor Applications: Automated continuous controls monitoring for both mobile
    Strengths Weaknesses
    Extensive Log collection support for commercial IT products & applications Complex deployment & configuration
    Advanced support for Threat Management, Fraud
    Management & Behavior Analysis
    Mostly suited for Medium to Large Scale deployment
    Mature Event Correlation, Categorization & Reporting Requires skilled resources to manage the solution
    Tight integration with Big data Analytics platform like Hadoop Steep learning curve for Analysts & Operators
    Highly customizable based on organization’s requirements
    Highly Available & Scalable
    Architecture supporting Multi-tier & Multi-tenancy     

    IBM QRadar

    The QRadar Integrated Security Solutions (QRadar) Platform is an integrated set of products for collecting, analysing, and managing enterprise Security Event information.

    • QRadar Log Manager – Turn key log management solution for Event log collection & storage
    Strengths Weakness
    Very simple deployment & configuration Limited customizations capabilities
    Integrated view of the threat environment using Netflow data, IDS/IPS data & Event logs from the environment Limited Multi-tenancy support
    Behavior & Anomaly Detection capabilities for both Netflow & Log data Limited capability to perform Advanced Use Case development & analytics
    Suited for small, medium & large enterprises
    Highly Scalable & Available architecture

    McAfee Nitro

    The McAfee Enterprise Security Management (formerly Nitro Security) Platform is an integrated set of products for collecting, analysing, and managing enterprise Security Event information. 

    • McAfee Enterprise Log Manager – turn key log management solution for Event log collection & storage
    • McAfee Event Receiver – collecting log data & native flow data
    • McAfee Database Event Monitor – database transaction & Log monitoring
    • McAfee Application data Monitor  – application layer event monitoring
    • McAfee Advanced Correlation Engine – advanced correlation engine for correlating events both historical & real time
    Strengths Weaknesses
    Integrated Application Data monitoring & Deep Packet Inspection Very basic correlation capabilities when compared with HP & IBM
    Integrated Database monitoring without dependence on native audit functions Limitations in user interface when it concerns navigation
    High event collection rate suited for very large scale deployment Requires a lot of agent installs for Application & database monitoring thereby increasing management complexity
    Efficient query performance in spite of high event collection rate No Big Data Analytics capability
    Limited customization capabilities
    Limited support for multi-tier & multi-tenancy architecture

    Splunk

    Splunk Enterprise is an integrated set of products that provide Log Collection, management & reporting capabilities using

    • Splunk Indexer – used to collect and index logs from IT environment
    • Splunk Search Heads – used to search & report on IT logs
    • Splunk App for Enterprise Security - used to collect external threat intelligence feeds, parse log sources and provide basic analytics for session monitoring (VPN, Netflow etc.)
    Strengths Weakness
    Extensive Log collection capabilities across the IT environment Pre-SIEM solution with very limited correlation capabilities
    Log search is highly intuitive – like Google search Even though easy to deploy, increasingly difficult to configure for SIEM related functions
    Flexible dash boarding & analytics capability improves Log visualization capabilities
    Built-in support for external threat intelligence feeds both open source & commercial
    “App Store” based architecture allowing development of Splunk Plugins to suit monitoring & analytics requirements

    RSA Security

    RSA Security Analytics is an integrated set of products that provide Network Forensics, Log Collection, management & reporting capabilities using

    • Capture Infrastructure
      • RSA Security Analytics Decoder – Real time capture of Network Packet and log data with Analysis and filtering capabilities
      • RSA Security Analytics Concentrator – Aggregates metadata from the Decoder
      • RSA Security Analytics Broker Server – For reporting, management and administration of capture data
    • Analysis & Retention Infrastructure
      • Event Stream Analysis – Correlation Engine
      • Archiver – Long term retention, storage, security & compliance reporting
      • RSA Security Analytics Warehouse – Big Data Infrastructure for Advanced Analytics
    Strengths Weakness
    Great Analytics using Event Log Data & Network Packet Capture New Product release from RSA, hence advanced Security correlation support is poor
    Network forensics, Big Data (Parallel Computing) are cornerstones in SIEM world Security Analytics Warehouse is a new capability with very little real world use cases
    Tightly Integrates with RSA ecosystem for Threat Intelligence, Fraud Detection, Malware Analysis etc. (each requires separate RSA Tools) Suited only for large enterprises with need for complex deployment and management resources. Poor deployment options for small and midsize customers

    LogRhythm

    The LogRhythm SIEM 2.0 Security Intelligence Platform is an integrated set of products for collecting, analysing, and managing enterprise Security Event information.

    • Log Manager – high performance, distributed and redundant log collection and management appliance
    Strengths Weakness
    Well balanced log management, reporting, event management, privileged user monitoring and File integrity monitoring capabilities Suitable for Security event data only, as Operational data sets cause slowing performance for searches and reports
    Fast deployment with minimal configuration because of appliance form factor No Support for Active Directory integration for Role- Based Access Control
    Quarterly Health Check programs post-deployment offers great After sales-Service experience Suited best for small and mid size companies with basic security, regulatory compliance and reporting needs. Not scalable for very large deployments.

    A Summary scoring sheet for SIEM Vendors based on their Core capabilities is given below

    Capability RSA Security Analytics Log Rhythm Splunk McAfee Nitro IBM Qradar HP ArcSight
    Real-time Security Monitoring 3.1 3.2 2.5 3.9 4.2 4.4
    Threat Intelligence 3.7 2.5 3.0 2.8 3.5 4.5
    Behavior Profiling 2.5 2.3 3.0 3.0 5.0 4.0
    Data & End User Monitoring 3.6 3.5 1.7 3.6 3.5 4.0
    Application Monitoring 3.8 3.5 1.8 3.7 3.3 3.8
    Analytics 2.5 2.5 3.8 4.5 3.5 4.0
    Log Management & Reporting 3.5 3.8 3.5 3.8 3.9 4.0
    Deployment & Support Simplicity 3.0 4.0 2.5 3.5 3.5 3.0
    Total (Weighted Score) 25.7 25.3 21.8 28.8 30.4 31.7

    1.0 = Low level of capability

    5.0 = High level of capability

    SIEM Vendors – Use Cases Score Card

    Use Cases RSA Security Analytics Log Rhythm Splunk McAfee Nitro IBM Qradar HP ArcSight
    Overall Use Cases 3.2 3.2 2.7 3.6 3.8 4.0
    Compliance Use Cases 3.3 3.7 3.0 3.7 3.8 3.8
    Threat Monitoring 3.1 3.1 2.9 3.8 3.7 4.0
    SIEM 3.2 3.4 2.8 3.6 3.8 3.9
    Total (Weighted Score) 12.8 13.4 11.4 14.7 15.1 15.7

    1.0 = Low level of capability

    5.0 = High level of capability

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    it_user279666 - PeerSpot reviewer
    it_user279666IT Security Consultant at Rodl Middle East
    Vendor

    Cost/License should also be part of the criteria, because the capabilities of these solutions depends on how much EPS it is allowed to process. A lot of "events" goes down the drain if its beyond the EPS that customer license so therefore giving it a incomplete view of the network. Some remarketer of these solutions have crimped their proposal just to make a sale. Just my 2 cents.

    it_user756306 - PeerSpot reviewer
    Manager Security Operations Center at a leisure / travel company
    Real User
    Investigation tab allows us to dig deeper into the alerts that we receive; the UI is easier than other solutions

    How has it helped my organization?

    Our key challenges in security include

    • standardizing our policies
    • having the end user population be aware on the security side of things.

    And the solution, LogRhythm, is helping us today to enforce it. We see now what it is that we're trying to propagate into the environment, based on the policies that we're monitoring today. The goal is to 100% enforce our policies.

    It has improved things tremendously. Going from a third-party vendor to an in-house solution, such as the LogRhythm solution, has given us visibility into the entire organization, compared to the limitations, based on budget and whatnot, from a third-party vendor. Absolutely, we have a lot more visibility now.

    I can tell you that having the ability to monitor the semi-subsidiaries that are a part of our organization, is huge in that sense.

    We have 10,000 EPS, as it is. And we have between about 500 and 1500 incidents daily.

    What is most valuable?

    One of the most valuable features is the investigation tab. It allows us to dig in deeper into the alerts that we receive today, based on the policies, that get triggered by our end-user population.

    What needs improvement?

    I think a must-have feature would be better reporting. Today, as you can imagine, the organization would like to see what is happening in our environment, and the reporting feature within LogRhythm, I would say, is very limited.

    The reports do not provide information such as, who are your top ten end users generating the most activity within the environment, or appliances, per se, so that's very limited.

    What do I think about the scalability of the solution?

    So far, from my end, I haven't experienced any challenges. We are able to integrate all of the solutions that we have out there: our antiviruses, our data-loss prevention tools, and even our web browsing filtering.

    At this point, I really don't have any challenges. Maybe the architectural team has different ones for integrations, but no issues on my end.

    How are customer service and technical support?

    I have not used technical support, as I do not troubleshoot the application itself. We are technically just administrators of it, monitoring.

    Which solution did I use previously and why did I switch?

    Because the organization wanted to have an in-house solution, when we looked at what was out there, we thought that LogRhythm, based on the user interface that was somewhat easier to follow compared to the competition, was a must for our security analysts.

    And the additional features within the investigation side of it, to dig deeper into what's going on out there. Those were two big selling factors for us.

    Which other solutions did I evaluate?

    • Curator
    • Splunk
    • Dell SecureWorks

    We chose LogRhythm because, as I said before, the user interface was really a plus for us. It was easier to understand, compared to the competition. And the ability to dig in deeper in the investigation tab, those were the two major selling points.

    What other advice do I have?

    The most important criterion, when selecting a vendor, is how easy it is to adapt to the solutions we have in house. Every organization, I understand, is different, but based on what we required, for the most part I'd say about 85% of our needs were met with LogRhythm, compared to all other competitors.

    It's very important for our solution to be a unified, end-to-end platform because the organization might adapt new technologies. Our security architect needs to have the ability to integrate them. If it's a challenge then, definitely, that's going to be a downside for us.

    If a colleague at another company was doing a SIEM solution comparison with this and similar solutions, I would say to give LogRhythm a shot and, if the possibilities are there, to implement a PoC to understand how the solution can help them.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    LogRhythm SIEM
    December 2024
    Learn what your peers think about LogRhythm SIEM. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
    824,053 professionals have used our research since 2012.
    PeerSpot user
    Information Security Engineer at a tech vendor with 501-1,000 employees
    Vendor
    Searches can be performed using any known value, IP address, hostname, username, or event, though report-building is limited by its use of Crystal Reports.

    What is most valuable?

    The Web UI is perhaps the most valuable feature in the solution.

    How has it helped my organization?

    LogRhythm allows our IT/IS teams to quickly identify issues across the enterprise. Searches can be performed using any known value, IP address, hostname, username, event. The results are then used to "open a case". The case is assigned to an analyst, who can add additional info during the research and remediation efforts.

    What needs improvement?

    Report-building is in Crystal Reports and has a limitation. A non-editable template must be created, then the report is created against the template. OFI is this. The template needs a preview option, as well as an edit option.

    For how long have I used the solution?

    8 months

    What was my experience with deployment of the solution?

    None that were not easily overcome.

    What do I think about the stability of the solution?

    None

    What do I think about the scalability of the solution?

    No, we right sized the deployment and also deployed as a high-availability environment.

    How are customer service and technical support?

    Customer Service:

    I have been very pleased with customer service. I have only had to contact my CS a couple of times, and he has done a great job of followup to insure my company's needs were met in a timely fashion.

    Technical Support:

    Great support team. Average call pickup time has been less than 1/2 hour. I have had a couple of "scheduled" appointments get delayed when the agent's previous call ran over.

    Which solution did I use previously and why did I switch?

    We previously used Juniper STRM, rebranded QRadar. We faced 1. Log processing could not keep up with collection, so events were being dropped. 2. Support was poor. 3. When a ($45 at Bestbuy) disk drive went out, we were sent an entirely new system. 4. When faced with upgrading to support our log collection demands, the estimated cost was several times greater than the LR deployment.

    How was the initial setup?

    Depending on the size and complexity of the deployment, i recommend paying for the Professional Services team to assist. All work was done in a remote session.

    I also recommend not attending the training sessions until a few weeks of bake-in have occurred. Too many topics were covered to fully absorb all the information that was disseminated.

    What about the implementation team?

    Our internal security team performed the majority of the installation, again working with the PS group at LogRhythm.

    What was our ROI?

    We immediately saw benefit on our first investigation.

    What's my experience with pricing, setup cost, and licensing?

    Depending on the size, number of logs, I recommend deploying VM (or physical) collectors, and have the logs forwarded to the appliance. We are collecting logs from 2500+ systems, and did not want to impact the appliance with collection, but rather, analyzing logs. This solution has worked very well so far.

    Which other solutions did I evaluate?

    We reviewed several solutions including Alien Vault (not large enough for our needs), Splunk (would need a full time programmer to write queries), QRADAR (since we already had a previous version. We did a month long POC on Correlog, attempted to POC EIQ Networks.

    What other advice do I have?

    We are very pleased with the LR solution and are looking forward to the upcoming update.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    reviewer1007241 - PeerSpot reviewer
    security solutions integrator at a consultancy with 1-10 employees
    Real User
    The GUI is easy to explore, and it integrates well with other security solutions
    Pros and Cons
    • "LogRhythm's GUI is easy to explore. We also like other features, such as its integration with other security solutions, log correlation, and the deployment of use cases."
    • "LogRhythm's SOAR and NDR features don't stack up well against competitors. maybe integrating theme functionality as the other do. But in general, it's okay."

    What is most valuable?

    LogRhythm's GUI is easy to explore. We also like other features, such as its integration with other security solutions, log correlation, and the deployment of use cases.

    What needs improvement?

    LogRhythm's SOAR and NDR features don't stack up well against competitors. 
    maybe integrating theme functionality as the other do. But in general, it's okay.

    For how long have I used the solution?

    We started with LogRhythm about three years ago.

    What do I think about the stability of the solution?

    LogRhythm is stable. 

    What do I think about the scalability of the solution?

    Scalability is a matter of cost. LogRhythm has the technical capacity to scale if you pay for the components and licenses. 

    How are customer service and support?

    LogRhythm's support is good.

    How was the initial setup?

    Setting up LogRhythm is straightforward. It is not complicated.

    What's my experience with pricing, setup cost, and licensing?

    We work with French-speaking African countries, and it costs more than the average SIEM solution. Also, the pricing isn't too flexible. AlienVault, Splunk, and IBM QRadar are more suitable for customers on a tight budget.

    What other advice do I have?

    I rate LogRhythm eight out of 10. With any solution, you need to deploy the use cases correctly, so the customer should understand the use cases for a SIEM. An SIEM solution only collects and centralizes logs instead of detecting unknown malware. There are no use cases that are customized to fit the customers' context. 

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Senior Network Engineer with 201-500 employees
    Real User
    Allows us to automate a lot of things with a smaller team
    Pros and Cons
    • "It allows us to automate a lot of things with a smaller team."
    • "Move it to Linux. I would like to see it get off the SQL Server."

    What is our primary use case?

    We use it to alarm our help desk. 

    We staring to use it for SMART Response. We have been using SMART Response for about a year. Now, we are starting to push that towards the help desk, so the junior analysts can do more.

    How has it helped my organization?

    It allows us to automate a lot of things with a smaller team.

    What is most valuable?

    • AI
    • SMART Response
    • Looking forward to using the playbooks

    What needs improvement?

    • Move it to Linux. I would like to see it get off the SQL Server.
    • I would like it to be containerized. 

    What do I think about the stability of the solution?

    Our appliance is a little older, so we need to upgrade it. We are going to probably move to the software-only version. However, the issues that we have are our own fault because we didn't buy the right-size appliance.

    What do I think about the scalability of the solution?

    We are not that big of a company. We are only at about 800 events per second.

    How is customer service and technical support?

    We have had a couple of custom logs built, but we don't call in that much.

    How was the initial setup?

    The initial setup is easy with the physical appliance.

    What about the implementation team?

    We have two people who are setting it up and doing the admin side.

    What other advice do I have?

    Make sure you size the appliance correctly.

    We use Ansible and Terraform for infrastructure, so the same concept as the playbooks. We are looking to use the playbooks going forward.

    We have about 1500 log sources. We do about a 25 million logs a day. Obviously, they're not all events.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    it_user756354 - PeerSpot reviewer
    Security Analyst 3 at a comms service provider with 1,001-5,000 employees
    MSP
    It is a single pane of glass for all of the logs

    What is most valuable?

    • The user interface (UI)
    • Ease of use, especially if you are starting off
    • The AI

    How has it helped my organization?

    Key challenges and goals: Anytime you are building a program from the ground up, there is a lot of legwork to be done to get things tuned to the point where they are usable.

    Effectiveness of solution in meeting security challenges and goals: It is very effective. It is a single pane of glass for all of the logs, that not just myself, but anybody who is looking for information about how the network is behaving can use. So, not just primarily a security tool, it is a tool for everybody if it is set up that way.

    What needs improvement?

    We run across the odd vendor which we are using that we think are large players in their environment, but there is not necessarily a native support for their log ingestion per se, where it requires customization in order to be able to parse and accept their logs. I would also like to see them expand on some of the ability to interact with other technologies in real time via the programming platforms.

    What was my experience with deployment of the solution?

    It pre-existed before I got there. Once it was deployed, I have been responsible for most of the log ingestion and the tuning efforts.

    What do I think about the scalability of the solution?

    It seems scalable so far. I have not had to add more devices to our deployment yet, but it has yet to be discovered.

    How are customer service and technical support?

    We have used LogRhythm tech support and they are excellent. They have been very helpful.

    Which solution did I use previously and why did I switch?

    This is our first adoption of a proper SIEM product, so there is really nothing to compare it to with respect to the job that I am in right now.

    How was the initial setup?

    It pre-existed before I got there.

    What other advice do I have?

    I am very happy with the solution right now. I would absolutely recommend it and have.

    Most of the basics have been tended to, and as we discover other things that we need to get more data on, and they are brought up, the company addresses them.

    The most important criteria when selecting a vendor: It is very important for it to be unified.

    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
    PeerSpot user
    it_user756324 - PeerSpot reviewer
    Senior Manager IT Security at Virginia Premier Health
    Vendor
    Allows us to be more defensive, have a better security posture, and be more prepared for anything that occurs

    How has it helped my organization?

    It's allowed us to have more visibility into our network as well as be able to respond more quickly to incidents seen on the network.

    What is most valuable?

    • Being able to gather logs in one place
    • Being able to process them and generate alarms

    What needs improvement?

    I work in a highly regulated industry. I know the product has compliance mechanisms, but being able to get more governance surrounding some of the compliance. Merging things that we have to be on top of would be helpful.

    What do I think about the scalability of the solution?

    LogRhythm has been able to show that their products are very scalable. Usually, when you buy things that are out of boxes, you get them, they're old. But the new enhancements and things that LogRhythm continues to integrate allow you to scale up with them as they grow. They scale with you also.

    How are customer service and technical support?

    I've used tech support. They're very helpful, very knowledgeable people who genuinely care about you and want to see not just their product but you, as a company, be successful.

    Which solution did I use previously and why did I switch?

    This is our first iteration of SIEM at my organization. At the time, my superior had used Splunk previously, and that was what he was a fan of. But LogRhythm is one of the emerging leaders, price point was very important, and also to be with a company that's on the cutting edge of technology.

    How was the initial setup?

    I think that anytime you're integrating SIEM monitoring tools into an environment, it is complex, but the LogRhythm Professional Services help make things easier, and I've worked with them every step of the way.

    What other advice do I have?

    It's very important to our organization that the solution be a unified end-to-end solution.

    I don't think any company is perfect, but I know that they're striving, and that's why I give them such a high score.

    I understand that whatever you're buying with LogRhythm, it is not going to be static. It's a very dynamic company and a lot of new technologies emerge, so ensuring that you get the proper level of training upfront, as well as continued training for your staff, is important for being able to wrap your hands around what LogRhythm is actually doing and where they're going.

    You start to talk about some things like blockchain and quantum, I'm sure that LogRhythm is already researching some of those new computer technologies. I didn't know what to expect back in 2015 when we bought the product, but it's showing to be agile, scalable, and the people are very knowledgeable.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    it_user756366 - PeerSpot reviewer
    Senior Network Systems Engineer at a non-profit
    Vendor
    Enables us to threat-hunt, be in compliance, and obtain effective analytics without a lot of administration

    What is most valuable?

    The ability to threat-hunt and, being a small staff of five people, we can actually not put a lot of time in administration, the care and feeding of it, and get useful analytics out of it.

    How has it helped my organization?

    We have two facilities, roughly 500 logs per second. Microsoft shop, Cisco stack on the networking side. We run two FortiGate firewalls, and a slew of different security products that we have not integrated into LogRhythm.

    We haven't seen the improvements yet. We bought it as a compliance tool, and it's still sitting there. It's part of the reason why came to the LogRhythm User Conference, to figure out what our next steps are. When we had to tackle PCI compliance, one of them was log aggregation, and so that was why we brought it in.

    It's met all of our compliance issues, really easy to do. As I said, there's not a lot of admin overhead, so it doesn't cost an FTE for us, which is nice. I think the added benefit is when we start using it for actually doing some analytics and in increasing our security posture, we're just not there yet.

    What needs improvement?

    I can't think of any features they should add because we haven't used everything they've already released. They have Office 365 logs integration. They've got this new phishing engine that we haven't used. They've got dashboards we haven't used, so we're basically right at the very bottom, we need to start building with what they're already doing.

    In terms of improvement, their community boards, where to go find things, as a customer. As they're growing and they're moving stuff around, and it would be nice if we knew exactly where to find what. They're constantly reinventing how they do things and where they put stuff, that's the one challenge I've run into. I've always found the answer when I got to the right person: "Yeah. That's over here now," but I know other customers have shared that same issue.

    What do I think about the scalability of the solution?

    Being a small shop, we're in an XM, everything in one appliance, which is really easy for administration, but I think it can get more complex as you get bigger. They've scaled to really large Fortune 500 companies, so that's nothing that we're worried about.

    How is customer service and technical support?

    Great, you have almost the service-desk model, where you're going to get a live person. They're going to answer the call. They're going to make sure you get routed to the proper team. They're really good at followup, when "Everybody's busy now," they're really good at scheduling times, when both the technical agent is available and our staff is available, which I really appreciate. You don't have those, "I tried to get a hold of you," going back and forth. Not a lot of vendors understand that. LogRhythm does a good job with that.

    How was the initial setup?

    It's straightforward, to the point that we brought it. We did a week of engagement with our security value-added reseller, and we were basically shoulder surfing. Everything looked like it made sense and why they were doing it, and it's not that complicated.

    Where it can get more complicated, like I said, is if you're a big organization, you didn't have it all on one platform. Those components would have to be put together, and there can be a little bit more to the infrastructure.

    The SIEM's a very technical tool, but LogRhythm - that's one of the beauties of it - once you figure out how it's installed, the care and fitting of it, the updating of the SIEM to new versions, and even the monitor agents, it's really pretty straightforward. Good documentation.

    Which other solutions did I evaluate?

    ArcSight and Splunk, and that was it.

    We went with LogRhythm because of cost, administration, and ease of use when you're in the tool. Those are the top three. The fact that it was the lowest cost one, easiest to use, and easiest to administer. It was a no-brainer for us. It wasn't even really a conversation, other than the fact that we have to shop at the three different vendors.

    What other advice do I have?

    Right now our focus is on user behavior, and that's part of why we joined the cloud Beta, they are our biggest risk. We don't know what they're going to do when and why, and so we've rolled out some security awareness training, we've rolled out some phishing exercises, and really trying to figure out how we can stop them being their biggest risks. Learning about what we learned today at the conference, with LogRhythm doing their phishing intelligence engine, it's going to be nice to see how we can implement that into the SIEM as well.

    Security solution, number one is FTE; being a small shop and how much FTE does it take to run that? If that's a challenge for somebody, so they have co-piloting that you can do. We were able to absorb that in with two different FTEs splitting the duties, and they probably spend 45% of the time doing that. Might be different for a bigger shop, but that's our focus.

    The most important criteria when selecting a vendor:

    • reputation
    • have they delivered on what they say they can do
    • are there customers out there that we can talk to, that can validate what they're saying is actually true?

    Regarding a solution being a unified end-to-end platform, it's not necessarily so important. Going forward, as we mature, more maybe, but we're really just tacking on the stuff that we go after. It's addressing certain needs, it's a little bit siloed right now, so it's not a huge need for us.

    I gave it a nine out of 10 because I hesitate to rate anything a 10, that's perfect. But I think they do a great job, and I think it's more on us to really engage them more. They're always happy to talk to us about where we want to go with it, and it's just us dedicating the time to them.

    Talk to people in the industry, make sure it can fit those needs you're buying it for. Proof of concept is huge. Do a proof of concept, especially in a SIEM. You don't want to just buy one and then implement it, and then try to figure out is it going to actually work for me?

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    Download our free LogRhythm SIEM Report and get advice and tips from experienced pros sharing their opinions.
    Updated: December 2024
    Buyer's Guide
    Download our free LogRhythm SIEM Report and get advice and tips from experienced pros sharing their opinions.