Better Security and Services Start Here

Read and watch in-depth reviews from real LogRhythm users

Gartner peerinsights awards

2018 Gartner Peer Insights Customer Choice Designation

LogRhythm is honored to receive a 4.4 out of 5 star rating from over 300 verified customer reviews. Across industries and company sizes, our users have recognized the positive impact our solutions have had on improving security posture. Read the reviews and compare LogRhythm against other SIEM market vendors.

Read Gartner Peer Reviews
It Central Station tech reviews of LogRhythm

Verified User Reviews of LogRhythm’s NextGen SIEM Solution

Get an inside look at why customers chose LogRhythm, the security capabilities valued most by users, and advice for selecting a SIEM—all verified by IT Central Station.

Read More Reviews

Customer Video Testimonials

See what our customers have to say about their experience with LogRhythm.

  • SIEM Review: Chris Smith Information Security Architect | Health Care
  • Shane Addison Information Security Officer | Financial Services
  • LogRhythm SIEM Review Technical Systems Analyst LogRhythm Review
  • Jon Nicholson Cybersecurity Ops Manager | Old National Bank
  • Steven McDonald Security Engineer | Finance Industry
  • Dan Ney Security and Risk Manager Lead | Baker Tilley LLP
  • Jack Callahan Senior Security Analyst | Financial Service
  • Jorge Trujillo Information Security Team Lead | Financial Services
  • Marc White Deputy CISO | Optomany
  • Seth Shestack Deputy CISO | Temple University
  • LogRhythm SIEM Review: Sr. Systems Network Engineer | Non-Profit
  • LogRhythm SIEM Review: Network Security Office | Energy/Utilities
  • LogRhythm SIEM Review: Information Security Officer | Insurance
  • Tommy Scott Operations Team Lead | Mary Kay Inc
  • LogRhythm CloudAI Review: Hayden Prichard Cybersecurity Manager | Health Care
  • Eric Knopp Data Security Program Manager | Insurance

Customer Testimonials

EMW

“By taking a more centralized approach to security, our team can investigate alerts straightaway, which not only gives us a much better chance of halting an attack before it has a chance to cause any damage, but it saves our team a lot of time manually looking for threats.”

Lee Killner, IT Manager at EMW

Conduent

“We were able to correlate internet activity and logon attempts with a brute-force attempt that our current cobbled-together reporting solution could not show us. It was immediately and visually apparent that someone was knocking at the door.”

Bob Mace, senior information security analyst at Conduent

University of Massachusetts

“From the onset, LogRhythm fully understood our vision and what it would take to succeed. Together, our teams formulated a scalable, affordable plan that closely aligned with our business model and our broader mission to improve cyber-education of the people of the Commonwealth and the region.”

Larry Wilson, the chief information security officer at the UMass President’s Office

Deloitte Canada

“We’re thrilled to formalize our relationship with LogRhythm. LogRhythm’s powerful next-generation TLM technology, combined with our managed security services and cybersecurity team, provide our clients a world-class set of solutions to meet the challenges of today’s continually evolving threat landscape.”

Rocco Galletto, partner at Deloitte Canada

Central Bank of Barbados

My experience with LogRhythm has been extremely positive. As a SMB, we appreciate the knowledge and professionalism that the LogRhythm team was able to bring to the table. We put a lot of effort into selecting a SIEM solution and we are satisfied that the LogRhythm product meets our needs.

Terry Burke, Information Security Officer

Coalfire

To meet PCI requirements and other data security mandates, organizations must have adequate controls for log management, including collection, review, retention and destruction. Automated and centralized solutions like LogRhythm are essential for companies to meet key parts of the PCI regulation. Coalfire has validated LogRhythm’s technology as meeting requirements under PCI and industry standards and best practices for this key control area.

Alan Ferguson, Vice President and Co-Founder

Camelot

Given the completeness of the LogRhythm solution combined with its ease-of-use and implementation, I anticipate a rapid and substantial return on investment.

Paul Jay, Head of Information Security

Redcats

LogRhythm provides a single view into all log and event data. Having meaningful data in one place empowers me to act quickly and precisely with appropriate security measures.

Bernie Rominski, IT Security Officer

Cardiff County

LogRhythm is easy and intuitive to use and has been imperative to Cardiff County Council achieving CoCo and GCSX compliance.

Mike Selley, IT Service Delivery Manager

Request More Information

Let us help answer your questions.