SC Labs Recognizes LogRhythm with Five Stars for Excellent Functionality in Log and Security Event Management
Aug. 12, 2010 – LogRhythm, the company that makes log data useful, today announced that SC Magazine, the information security industry’s leading news and product evaluation publication, has given the LogRhythm Log Management and SIEM platform a perfect five star rating and the only Recommended Award in the 2010 SIEM Group Test. The full product review appears in the August issue of SC Magazine and online at http://www.scmagazineus.com/logrhythm/review/3261/
SC Magazine editors said, “The LogRhythm appliance offers some very powerful functionality for log management and security event management. With features that include log management and analysis, file integrity monitoring, event management, network and user monitoring, and geolocation, this product can provide the detail needed for in-depth security event analysis. Designed for large enterprise and distributed environments, and delivered with excellent functionality, we give LogRhythm our 5-Star ‘Recommended’ rating.”
SC Magazine Group Tests rigorously evaluate and rate products in six categories: Features, Ease of Use, Performance, Documentation, Support, and Value for Money. LogRhythm achieved a perfect five star score in each category, with the reviewers stating they did not find any weaknesses to report.
“For the second consecutive year, SC Magazine has awarded LogRhythm a perfect five-star score for the breadth and depth of our integrated Log Management and SIEM capabilities, and powerful analysis and forensics tools. As such, LogRhythm is the only SIEM solution recommended by SC Magazine,” said Chris Petersen, CTO and co-founder of LogRhythm. “We are focused on enhancing the LogRhythm platform with functionality that addresses specific customer problems like insider privilege abuse, computer crime, sophisticated intrusions, and data leakage. By adding context and intelligence to raw logs and events via automated analysis capabilities we help our customers identify and address security problems as they happen, not after the damage is done.”