LogRhythm

LogRhythm Security Intelligence Platform

You need deep, real-time visibility into your entire IT environment to defend your organization from today’s threats. LogRhythm analyzes all of your forensic data. It fills gaps with endpoint and network sensors. With LogRhythm, you get the intelligence and tools you need to protect your network.

7.8

Composite Score

Composite
Score

+78

Emotional Footprint

Emotional
Footprint

84%

Likeliness to Recommend

Likeliness
to Recommend

8/13 in Security Incident and Event Management

Response
Distribution
17Reviews
Category Features
  • Analytics and Reporting
  • |
  • Data Enrichment
  • |
  • Correlation
  • |
  • Big Data Analytics
  • |
  • Forensic Analysis Support
  • |
  • Data Security and Retention
  • |
  • Threat Intelligence
  • |
  • Incident Management and Remediation
  • |
  • Security Threat Visibility
  • |
  • Scalability and Network Performance
  • |
  • CAN

Sample Report

Product Scorecard

A comprehensive report on a specific software product, aggregating feedback from real IT professionals and business leaders.

  • Net Promoter Score and Planned Renewal Rates
  • Feature and Vendor Capability Breakdown
  • Version and Module Satisfaction Levels
  • Comparisons by Organization Size, Usage, and Role
  • Individual Comments and Recommendations from Users
Buy Report / $499

Word Cloud

As organizations become more and more dependent on software to automate and streamline operations, users are developing strong emotional connections to their applications and vendors. The SoftwareReviews Word Cloud aggregates the most commonly experienced pain points and prevailing opinions held by its users. Use this at-a-glance summary to evaluate the vendor-client relationship and product effectiveness.

Word Cloud legend

Product Scorecard

Dive Into Data

Explore every product feature, vendor capability, and so much more, in our comprehensive Product Scorecard, giving you unparalleled insight into the software.

See Full Report

Product Reviews

  • -
  • 1
  • 2
  • 3
  • 4
Recommends
10/10

Information Technology

Once configured properly with near real time alarms, there is no need to access the application regularly.

Vendor Capability Satisfaction

  • 4
  • Availability and Quality of Training
  • 4
  • Breadth of Features
  • 4
  • Business Value Created
  • 2
  • Ease of Customization
  • 3
  • Ease of Data Integration
  • 3
  • Ease of Implementation
  • 2
  • Ease of IT Administration
  • 3
  • Product Strategy and Rate of Improvement
  • 4
  • Quality of Features
  • 2
  • Usability and Intuitiveness
  • 3
  • Vendor Support

Product Feature Satisfaction

  • 3
  • Analytics and Reporting
  • -
  • Big Data Analytics
  • -
  • CAN
  • 3
  • Correlation
  • -
  • Data Enrichment
  • 3
  • Data Security and Retention
  • 3
  • Forensic Analysis Support
  • 3
  • Incident Management and Remediation
  • 3
  • Scalability and Network Performance
  • 3
  • Security Threat Visibility
  • 4
  • Threat Intelligence