I am a new user who just made the decision to purchase Intuit.
Cyber Security Architect at a energy/utilities company with 1,001-5,000 employees
The initial configuration was easy
For how long have I used the solution?
What was my experience with deployment of the solution?
We are in the process of deployment. At this point, we're in the middle of rolling it out to servers and just collecting logs, so as far as the actual deployment of rule sets, and anything like that, we haven't gotten that far yet.
What do I think about the scalability of the solution?
Our environment is Windows and Linux. We have about 1200 users. We have about 500 servers and about 1200 machines that we can be collecting from, as far as endpoints.
How was the initial setup?
The initial configuration was easy.
Buyer's Guide
LogRhythm SIEM
November 2024
Learn what your peers think about LogRhythm SIEM. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.
What about the implementation team?
We worked with professional services, and they remoted in and got us the setup and explained the setup.
Which other solutions did I evaluate?
We looked at eight or nine other vendors.
We quickly eliminated four or five of them. We ended up with a final four, which was LogRhythm, Splunk, McAfee's solution, and AlienVault. From there, for various reasons, we narrowed it down to LogRhythm and Splunk. AlienVault, we felt was a nice solution as far as being able to plug it in, get it up and running quickly, but we felt we'd outgrow it. Splunk was on the other end of the spectrum. We felt that it was very powerful, probably more powerful than any of the other solutions, but we didn't have the manpower to configure it out-of-the-box.
From our own analysis and a lot of other customers we talked with, they confirmed the configurations on Splunk is just too top-heavy, so we felt that LogRhythm was the happy medium. A lot of customers recommended it, because of the built-in rules, and the out-of-the-box configuration is much better than Splunk, and given our team size and our internal resources, we made the decision to go with LogRhythm.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Manager, Enterprise Risk Consulting at a tech company with 1,001-5,000 employees
HP ArcSight vs. IBM QRadar vs. McAfee Nitro vs. Splunk vs. RSA Security vs. LogRhythm
We at Infosecnirvana.com have done several posts on SIEM. After the Dummies Guide on SIEM, we are following it up with a SIEM Product Comparison – 101 deck. So, here it is for your viewing pleasure. Let me know what you think by posting your comments below. The key products compared here are based on Gartner Magic Q which is what Organizations typically use to select SIEM vendors. The Vendors mentioned here in the deck are :
1. HP ArcSight
2. McAfee Nitro
3. IBM QRadar
4. Splunk SIEM
5. RSA Security Analytic
6. LogRhythm.
SIEM Technology Space
SIEM market analysis of the last 3 years suggest:
HPArcSight
The ArcSight Enterprise Threat and Risk Management (ETRM) Platform is an integrated set of products for collecting, analysing, and managing enterprise Security Event information.
- ArcSight Enterprise Security Manager (ESM): Correlation and analysis engine used to identify security threat in real-time& virtual environments
- ArcSight Logger: Log storage and Search solution
- ArcSight IdentityView: User Identity tracking/User activity monitoring
- ArcSight Connectors: For data collection from a variety of data sources
- ArcSight Auditor Applications: Automated continuous controls monitoring for both mobile
Strengths | Weaknesses |
Extensive Log collection support for commercial IT products & applications | Complex deployment & configuration |
Advanced support for Threat Management, Fraud Management & Behavior Analysis | Mostly suited for Medium to Large Scale deployment |
Mature Event Correlation, Categorization & Reporting | Requires skilled resources to manage the solution |
Tight integration with Big data Analytics platform like Hadoop | Steep learning curve for Analysts & Operators |
Highly customizable based on organization’s requirements | |
Highly Available & Scalable Architecture supporting Multi-tier & Multi-tenancy |
IBM QRadar
The QRadar Integrated Security Solutions (QRadar) Platform is an integrated set of products for collecting, analysing, and managing enterprise Security Event information.
- QRadar Log Manager – Turn key log management solution for Event log collection & storage
Strengths | Weakness |
Very simple deployment & configuration | Limited customizations capabilities |
Integrated view of the threat environment using Netflow data, IDS/IPS data & Event logs from the environment | Limited Multi-tenancy support |
Behavior & Anomaly Detection capabilities for both Netflow & Log data | Limited capability to perform Advanced Use Case development & analytics |
Suited for small, medium & large enterprises | |
Highly Scalable & Available architecture |
McAfee Nitro
The McAfee Enterprise Security Management (formerly Nitro Security) Platform is an integrated set of products for collecting, analysing, and managing enterprise Security Event information.
- McAfee Enterprise Log Manager – turn key log management solution for Event log collection & storage
- McAfee Event Receiver – collecting log data & native flow data
- McAfee Database Event Monitor – database transaction & Log monitoring
- McAfee Application data Monitor – application layer event monitoring
- McAfee Advanced Correlation Engine – advanced correlation engine for correlating events both historical & real time
Strengths | Weaknesses |
Integrated Application Data monitoring & Deep Packet Inspection | Very basic correlation capabilities when compared with HP & IBM |
Integrated Database monitoring without dependence on native audit functions | Limitations in user interface when it concerns navigation |
High event collection rate suited for very large scale deployment | Requires a lot of agent installs for Application & database monitoring thereby increasing management complexity |
Efficient query performance in spite of high event collection rate | No Big Data Analytics capability |
Limited customization capabilities | |
Limited support for multi-tier & multi-tenancy architecture |
Splunk
Splunk Enterprise is an integrated set of products that provide Log Collection, management & reporting capabilities using
- Splunk Indexer – used to collect and index logs from IT environment
- Splunk Search Heads – used to search & report on IT logs
- Splunk App for Enterprise Security - used to collect external threat intelligence feeds, parse log sources and provide basic analytics for session monitoring (VPN, Netflow etc.)
Strengths | Weakness |
Extensive Log collection capabilities across the IT environment | Pre-SIEM solution with very limited correlation capabilities |
Log search is highly intuitive – like Google search | Even though easy to deploy, increasingly difficult to configure for SIEM related functions |
Flexible dash boarding & analytics capability improves Log visualization capabilities | |
Built-in support for external threat intelligence feeds both open source & commercial | |
“App Store” based architecture allowing development of Splunk Plugins to suit monitoring & analytics requirements |
RSA Security
RSA Security Analytics is an integrated set of products that provide Network Forensics, Log Collection, management & reporting capabilities using
-
Capture Infrastructure
- RSA Security Analytics Decoder – Real time capture of Network Packet and log data with Analysis and filtering capabilities
- RSA Security Analytics Concentrator – Aggregates metadata from the Decoder
- RSA Security Analytics Broker Server – For reporting, management and administration of capture data
-
Analysis & Retention Infrastructure
- Event Stream Analysis – Correlation Engine
- Archiver – Long term retention, storage, security & compliance reporting
- RSA Security Analytics Warehouse – Big Data Infrastructure for Advanced Analytics
Strengths | Weakness |
Great Analytics using Event Log Data & Network Packet Capture | New Product release from RSA, hence advanced Security correlation support is poor |
Network forensics, Big Data (Parallel Computing) are cornerstones in SIEM world | Security Analytics Warehouse is a new capability with very little real world use cases |
Tightly Integrates with RSA ecosystem for Threat Intelligence, Fraud Detection, Malware Analysis etc. (each requires separate RSA Tools) | Suited only for large enterprises with need for complex deployment and management resources. Poor deployment options for small and midsize customers |
LogRhythm
The LogRhythm SIEM 2.0 Security Intelligence Platform is an integrated set of products for collecting, analysing, and managing enterprise Security Event information.
- Log Manager – high performance, distributed and redundant log collection and management appliance
Strengths | Weakness |
Well balanced log management, reporting, event management, privileged user monitoring and File integrity monitoring capabilities | Suitable for Security event data only, as Operational data sets cause slowing performance for searches and reports |
Fast deployment with minimal configuration because of appliance form factor | No Support for Active Directory integration for Role- Based Access Control |
Quarterly Health Check programs post-deployment offers great After sales-Service experience | Suited best for small and mid size companies with basic security, regulatory compliance and reporting needs. Not scalable for very large deployments. |
A Summary scoring sheet for SIEM Vendors based on their Core capabilities is given below
Capability | RSA Security Analytics | Log Rhythm | Splunk | McAfee Nitro | IBM Qradar | HP ArcSight |
Real-time Security Monitoring | 3.1 | 3.2 | 2.5 | 3.9 | 4.2 | 4.4 |
Threat Intelligence | 3.7 | 2.5 | 3.0 | 2.8 | 3.5 | 4.5 |
Behavior Profiling | 2.5 | 2.3 | 3.0 | 3.0 | 5.0 | 4.0 |
Data & End User Monitoring | 3.6 | 3.5 | 1.7 | 3.6 | 3.5 | 4.0 |
Application Monitoring | 3.8 | 3.5 | 1.8 | 3.7 | 3.3 | 3.8 |
Analytics | 2.5 | 2.5 | 3.8 | 4.5 | 3.5 | 4.0 |
Log Management & Reporting | 3.5 | 3.8 | 3.5 | 3.8 | 3.9 | 4.0 |
Deployment & Support Simplicity | 3.0 | 4.0 | 2.5 | 3.5 | 3.5 | 3.0 |
Total (Weighted Score) | 25.7 | 25.3 | 21.8 | 28.8 | 30.4 | 31.7 |
1.0 = Low level of capability
5.0 = High level of capability
SIEM Vendors – Use Cases Score Card
Use Cases | RSA Security Analytics | Log Rhythm | Splunk | McAfee Nitro | IBM Qradar | HP ArcSight |
Overall Use Cases | 3.2 | 3.2 | 2.7 | 3.6 | 3.8 | 4.0 |
Compliance Use Cases | 3.3 | 3.7 | 3.0 | 3.7 | 3.8 | 3.8 |
Threat Monitoring | 3.1 | 3.1 | 2.9 | 3.8 | 3.7 | 4.0 |
SIEM | 3.2 | 3.4 | 2.8 | 3.6 | 3.8 | 3.9 |
Total (Weighted Score) | 12.8 | 13.4 | 11.4 | 14.7 | 15.1 | 15.7 |
1.0 = Low level of capability
5.0 = High level of capability
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
LogRhythm SIEM
November 2024
Learn what your peers think about LogRhythm SIEM. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.
Manager Security Operations Center at a leisure / travel company
Investigation tab allows us to dig deeper into the alerts that we receive; the UI is easier than other solutions
How has it helped my organization?
Our key challenges in security include
- standardizing our policies
- having the end user population be aware on the security side of things.
And the solution, LogRhythm, is helping us today to enforce it. We see now what it is that we're trying to propagate into the environment, based on the policies that we're monitoring today. The goal is to 100% enforce our policies.
It has improved things tremendously. Going from a third-party vendor to an in-house solution, such as the LogRhythm solution, has given us visibility into the entire organization, compared to the limitations, based on budget and whatnot, from a third-party vendor. Absolutely, we have a lot more visibility now.
I can tell you that having the ability to monitor the semi-subsidiaries that are a part of our organization, is huge in that sense.
We have 10,000 EPS, as it is. And we have between about 500 and 1500 incidents daily.
What is most valuable?
One of the most valuable features is the investigation tab. It allows us to dig in deeper into the alerts that we receive today, based on the policies, that get triggered by our end-user population.
What needs improvement?
I think a must-have feature would be better reporting. Today, as you can imagine, the organization would like to see what is happening in our environment, and the reporting feature within LogRhythm, I would say, is very limited.
The reports do not provide information such as, who are your top ten end users generating the most activity within the environment, or appliances, per se, so that's very limited.
What do I think about the scalability of the solution?
So far, from my end, I haven't experienced any challenges. We are able to integrate all of the solutions that we have out there: our antiviruses, our data-loss prevention tools, and even our web browsing filtering.
At this point, I really don't have any challenges. Maybe the architectural team has different ones for integrations, but no issues on my end.
How are customer service and technical support?
I have not used technical support, as I do not troubleshoot the application itself. We are technically just administrators of it, monitoring.
Which solution did I use previously and why did I switch?
Because the organization wanted to have an in-house solution, when we looked at what was out there, we thought that LogRhythm, based on the user interface that was somewhat easier to follow compared to the competition, was a must for our security analysts.
And the additional features within the investigation side of it, to dig deeper into what's going on out there. Those were two big selling factors for us.
Which other solutions did I evaluate?
- Curator
- Splunk
- Dell SecureWorks
We chose LogRhythm because, as I said before, the user interface was really a plus for us. It was easier to understand, compared to the competition. And the ability to dig in deeper in the investigation tab, those were the two major selling points.
What other advice do I have?
The most important criterion, when selecting a vendor, is how easy it is to adapt to the solutions we have in house. Every organization, I understand, is different, but based on what we required, for the most part I'd say about 85% of our needs were met with LogRhythm, compared to all other competitors.
It's very important for our solution to be a unified, end-to-end platform because the organization might adapt new technologies. Our security architect needs to have the ability to integrate them. If it's a challenge then, definitely, that's going to be a downside for us.
If a colleague at another company was doing a SIEM solution comparison with this and similar solutions, I would say to give LogRhythm a shot and, if the possibilities are there, to implement a PoC to understand how the solution can help them.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Information Security Engineer at a tech vendor with 501-1,000 employees
Searches can be performed using any known value, IP address, hostname, username, or event, though report-building is limited by its use of Crystal Reports.
What is most valuable?
The Web UI is perhaps the most valuable feature in the solution.
How has it helped my organization?
LogRhythm allows our IT/IS teams to quickly identify issues across the enterprise. Searches can be performed using any known value, IP address, hostname, username, event. The results are then used to "open a case". The case is assigned to an analyst, who can add additional info during the research and remediation efforts.
What needs improvement?
Report-building is in Crystal Reports and has a limitation. A non-editable template must be created, then the report is created against the template. OFI is this. The template needs a preview option, as well as an edit option.
For how long have I used the solution?
8 months
What was my experience with deployment of the solution?
None that were not easily overcome.
What do I think about the stability of the solution?
None
What do I think about the scalability of the solution?
No, we right sized the deployment and also deployed as a high-availability environment.
How are customer service and technical support?
Customer Service:
I have been very pleased with customer service. I have only had to contact my CS a couple of times, and he has done a great job of followup to insure my company's needs were met in a timely fashion.
Technical Support:Great support team. Average call pickup time has been less than 1/2 hour. I have had a couple of "scheduled" appointments get delayed when the agent's previous call ran over.
Which solution did I use previously and why did I switch?
We previously used Juniper STRM, rebranded QRadar. We faced 1. Log processing could not keep up with collection, so events were being dropped. 2. Support was poor. 3. When a ($45 at Bestbuy) disk drive went out, we were sent an entirely new system. 4. When faced with upgrading to support our log collection demands, the estimated cost was several times greater than the LR deployment.
How was the initial setup?
Depending on the size and complexity of the deployment, i recommend paying for the Professional Services team to assist. All work was done in a remote session.
I also recommend not attending the training sessions until a few weeks of bake-in have occurred. Too many topics were covered to fully absorb all the information that was disseminated.
What about the implementation team?
Our internal security team performed the majority of the installation, again working with the PS group at LogRhythm.
What was our ROI?
We immediately saw benefit on our first investigation.
What's my experience with pricing, setup cost, and licensing?
Depending on the size, number of logs, I recommend deploying VM (or physical) collectors, and have the logs forwarded to the appliance. We are collecting logs from 2500+ systems, and did not want to impact the appliance with collection, but rather, analyzing logs. This solution has worked very well so far.
Which other solutions did I evaluate?
We reviewed several solutions including Alien Vault (not large enough for our needs), Splunk (would need a full time programmer to write queries), QRADAR (since we already had a previous version. We did a month long POC on Correlog, attempted to POC EIQ Networks.
What other advice do I have?
We are very pleased with the LR solution and are looking forward to the upcoming update.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
security solutions integrator at a consultancy with 1-10 employees
The GUI is easy to explore, and it integrates well with other security solutions
Pros and Cons
- "LogRhythm's GUI is easy to explore. We also like other features, such as its integration with other security solutions, log correlation, and the deployment of use cases."
- "LogRhythm's SOAR and NDR features don't stack up well against competitors. maybe integrating theme functionality as the other do. But in general, it's okay."
What is most valuable?
LogRhythm's GUI is easy to explore. We also like other features, such as its integration with other security solutions, log correlation, and the deployment of use cases.
What needs improvement?
LogRhythm's SOAR and NDR features don't stack up well against competitors.
maybe integrating theme functionality as the other do. But in general, it's okay.
For how long have I used the solution?
We started with LogRhythm about three years ago.
What do I think about the stability of the solution?
LogRhythm is stable.
What do I think about the scalability of the solution?
Scalability is a matter of cost. LogRhythm has the technical capacity to scale if you pay for the components and licenses.
How are customer service and support?
LogRhythm's support is good.
How was the initial setup?
Setting up LogRhythm is straightforward. It is not complicated.
What's my experience with pricing, setup cost, and licensing?
We work with French-speaking African countries, and it costs more than the average SIEM solution. Also, the pricing isn't too flexible. AlienVault, Splunk, and IBM QRadar are more suitable for customers on a tight budget.
What other advice do I have?
I rate LogRhythm eight out of 10. With any solution, you need to deploy the use cases correctly, so the customer should understand the use cases for a SIEM. An SIEM solution only collects and centralizes logs instead of detecting unknown malware. There are no use cases that are customized to fit the customers' context.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Network Engineer with 201-500 employees
Allows us to automate a lot of things with a smaller team
Pros and Cons
- "It allows us to automate a lot of things with a smaller team."
- "Move it to Linux. I would like to see it get off the SQL Server."
What is our primary use case?
We use it to alarm our help desk.
We staring to use it for SMART Response. We have been using SMART Response for about a year. Now, we are starting to push that towards the help desk, so the junior analysts can do more.
How has it helped my organization?
It allows us to automate a lot of things with a smaller team.
What is most valuable?
- AI
- SMART Response
- Looking forward to using the playbooks
What needs improvement?
- Move it to Linux. I would like to see it get off the SQL Server.
- I would like it to be containerized.
What do I think about the stability of the solution?
Our appliance is a little older, so we need to upgrade it. We are going to probably move to the software-only version. However, the issues that we have are our own fault because we didn't buy the right-size appliance.
What do I think about the scalability of the solution?
We are not that big of a company. We are only at about 800 events per second.
How is customer service and technical support?
We have had a couple of custom logs built, but we don't call in that much.
How was the initial setup?
The initial setup is easy with the physical appliance.
What about the implementation team?
We have two people who are setting it up and doing the admin side.
What other advice do I have?
Make sure you size the appliance correctly.
We use Ansible and Terraform for infrastructure, so the same concept as the playbooks. We are looking to use the playbooks going forward.
We have about 1500 log sources. We do about a 25 million logs a day. Obviously, they're not all events.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Security Analyst 3 at a comms service provider with 1,001-5,000 employees
It is a single pane of glass for all of the logs
What is most valuable?
- The user interface (UI)
- Ease of use, especially if you are starting off
- The AI
How has it helped my organization?
Key challenges and goals: Anytime you are building a program from the ground up, there is a lot of legwork to be done to get things tuned to the point where they are usable.
Effectiveness of solution in meeting security challenges and goals: It is very effective. It is a single pane of glass for all of the logs, that not just myself, but anybody who is looking for information about how the network is behaving can use. So, not just primarily a security tool, it is a tool for everybody if it is set up that way.
What needs improvement?
We run across the odd vendor which we are using that we think are large players in their environment, but there is not necessarily a native support for their log ingestion per se, where it requires customization in order to be able to parse and accept their logs. I would also like to see them expand on some of the ability to interact with other technologies in real time via the programming platforms.
What was my experience with deployment of the solution?
It pre-existed before I got there. Once it was deployed, I have been responsible for most of the log ingestion and the tuning efforts.
What do I think about the scalability of the solution?
It seems scalable so far. I have not had to add more devices to our deployment yet, but it has yet to be discovered.
How are customer service and technical support?
We have used LogRhythm tech support and they are excellent. They have been very helpful.
Which solution did I use previously and why did I switch?
This is our first adoption of a proper SIEM product, so there is really nothing to compare it to with respect to the job that I am in right now.
How was the initial setup?
It pre-existed before I got there.
What other advice do I have?
I am very happy with the solution right now. I would absolutely recommend it and have.
Most of the basics have been tended to, and as we discover other things that we need to get more data on, and they are brought up, the company addresses them.
The most important criteria when selecting a vendor: It is very important for it to be unified.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Senior Manager IT Security at Virginia Premier Health
Allows us to be more defensive, have a better security posture, and be more prepared for anything that occurs
How has it helped my organization?
It's allowed us to have more visibility into our network as well as be able to respond more quickly to incidents seen on the network.
What is most valuable?
- Being able to gather logs in one place
- Being able to process them and generate alarms
What needs improvement?
I work in a highly regulated industry. I know the product has compliance mechanisms, but being able to get more governance surrounding some of the compliance. Merging things that we have to be on top of would be helpful.
What do I think about the scalability of the solution?
LogRhythm has been able to show that their products are very scalable. Usually, when you buy things that are out of boxes, you get them, they're old. But the new enhancements and things that LogRhythm continues to integrate allow you to scale up with them as they grow. They scale with you also.
How are customer service and technical support?
I've used tech support. They're very helpful, very knowledgeable people who genuinely care about you and want to see not just their product but you, as a company, be successful.
Which solution did I use previously and why did I switch?
This is our first iteration of SIEM at my organization. At the time, my superior had used Splunk previously, and that was what he was a fan of. But LogRhythm is one of the emerging leaders, price point was very important, and also to be with a company that's on the cutting edge of technology.
How was the initial setup?
I think that anytime you're integrating SIEM monitoring tools into an environment, it is complex, but the LogRhythm Professional Services help make things easier, and I've worked with them every step of the way.
What other advice do I have?
It's very important to our organization that the solution be a unified end-to-end solution.
I don't think any company is perfect, but I know that they're striving, and that's why I give them such a high score.
I understand that whatever you're buying with LogRhythm, it is not going to be static. It's a very dynamic company and a lot of new technologies emerge, so ensuring that you get the proper level of training upfront, as well as continued training for your staff, is important for being able to wrap your hands around what LogRhythm is actually doing and where they're going.
You start to talk about some things like blockchain and quantum, I'm sure that LogRhythm is already researching some of those new computer technologies. I didn't know what to expect back in 2015 when we bought the product, but it's showing to be agile, scalable, and the people are very knowledgeable.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free LogRhythm SIEM Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Popular Comparisons
CrowdStrike Falcon
Splunk Enterprise Security
Microsoft Sentinel
IBM Security QRadar
Elastic Security
Sumo Logic Security
Rapid7 InsightIDR
Fortinet FortiSIEM
AlienVault OSSIM
Securonix Next-Gen SIEM
USM Anywhere
Exabeam
ManageEngine Log360
Buyer's Guide
Download our free LogRhythm SIEM Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Between AlienVault and LogRhythm, which solution is suitable for Banks in Gulf Region
- IBM QRadar is rated above competitors (McAfee, Splunk, LogRhythm) in Gartner's 2020 Magic Quandrant. Agree/Disagree?
- Does LogRhythm NextGen SIEM offer good security?
- What Solution for SIEM is Best To Be NIST 800-171 Compliant?
- When evaluating Security Information and Event Management (SIEM), what aspect do you think is the most important feature to look for?
- What are the main differences between Nessus and Arcsight?
- Which is the best SIEM solution for a government organization?
- What is the difference between IT event correlation and aggregation?
- What Is SIEM Used For?
- What Questions Should I Ask Before Buying SIEM?
Cost/License should also be part of the criteria, because the capabilities of these solutions depends on how much EPS it is allowed to process. A lot of "events" goes down the drain if its beyond the EPS that customer license so therefore giving it a incomplete view of the network. Some remarketer of these solutions have crimped their proposal just to make a sale. Just my 2 cents.