Better Security and Services Start Here

Read and watch in-depth customer reviews from LogRhythm users

Hear directly from our customers!

Our customers have spoken! We heard straight from LogRhythm customers around the world at our seventh annual user conference, RhythmWorld 2023. Check out why they chose LogRhythm!

Verified user reviews of LogRhythm SIEM solution

Get an inside look at why customers chose LogRhythm, the security capabilities valued most by users, and advice for selecting a SIEM—all verified by PeerSpot, previously IT Central Station. 

Read LogRhythm customer reviews on G2

G2 reports compare the leading security information and event management (SIEM) solutions based on genuine customer reviews, focusing on the following criteria:
  • Ability to aggregate and store IT security data
  • Assistance in user provisioning and governance
  • Identification of vulnerabilities in systems and endpoints
  • Monitoring for anomalies within an IT system
See what our customers are saying and compare SIEM solutions on G2.
LogRhythm SIEM is a leader in Security Information and Event Management (SIEM) on G2 Users love LogRhythm SIEM on G2 LogRhythm SIEM is a leader in Asia Pacific Security Information and Event Management (SIEM) on G2
LogRhythm has been named a Leader multiple times in the G2 Grid® for Security Information and Event Management (SIEM), System Security, & Incident Response.

See what our customers have to say about their experience with LogRhythm.

For a full list of testimonials, view our Product Reviews on YouTube.

How Does LogRhythm Help Your Organization?
What's Your Favorite Feature in LogRhythm SIEM?
LogRhythm vs. Other Solutions
How Has LogRhythm Impacted Your Workflow?
How Do You Use LogRhythm SmartResponse™?
Why Do You like LogRhythm SIEM's Customizable Dashboards?
What Is The Value Of A SIEM On Your Security Posture?
LogRhythm SIEM Review | Kevin Merolla | Security Manager
LogRhythm SIEM Review | Waqas Akkawi | CISO & DPO

EMW

“By taking a more centralized approach to security, our team can investigate alerts straightaway, which not only gives us a much better chance of halting an attack before it has a chance to cause any damage, but it saves our team a lot of time manually looking for threats.”

Lee Killner, IT Manager at EMW

Conduent

“We were able to correlate internet activity and logon attempts with a brute-force attempt that our current cobbled-together reporting solution could not show us. It was immediately and visually apparent that someone was knocking at the door.”

Bob Mace, senior information security analyst at Conduent

University of Massachusetts

“From the onset, LogRhythm fully understood our vision and what it would take to succeed. Together, our teams formulated a scalable, affordable plan that closely aligned with our business model and our broader mission to improve cyber-education of the people of the Commonwealth and the region.”

Larry Wilson, the chief information security officer at the UMass President’s Office

Deloitte Canada

“We’re thrilled to formalize our relationship with LogRhythm. LogRhythm’s powerful next-generation TLM technology, combined with our managed security services and cybersecurity team, provide our clients a world-class set of solutions to meet the challenges of today’s continually evolving threat landscape.”

Rocco Galletto, partner at Deloitte Canada

Central Bank of Barbados

My experience with LogRhythm has been extremely positive. As a SMB, we appreciate the knowledge and professionalism that the LogRhythm team was able to bring to the table. We put a lot of effort into selecting a SIEM solution and we are satisfied that the LogRhythm product meets our needs.

Terry Burke, Information Security Officer

Coalfire

To meet PCI requirements and other data security mandates, organizations must have adequate controls for log management, including collection, review, retention and destruction. Automated and centralized solutions like LogRhythm are essential for companies to meet key parts of the PCI regulation. Coalfire has validated LogRhythm’s technology as meeting requirements under PCI and industry standards and best practices for this key control area.

Alan Ferguson, Vice President and Co-Founder

Camelot

Given the completeness of the LogRhythm solution combined with its ease-of-use and implementation, I anticipate a rapid and substantial return on investment.

Paul Jay, Head of Information Security

Cardiff County

LogRhythm is easy and intuitive to use and has been imperative to Cardiff County Council achieving CoCo and GCSX compliance.

Mike Selley, IT Service Delivery Manager

The Salvation Army

What we liked about LogRhythm over its competitors was its large array of pre-built integrations, and its superior automation and orchestration capabilities. We were also attracted by the ease of use of the analyst console and the platform’s very competitive pricing.

Lachlan McGill, Executive Cybersecurity Manager

Mahec

My organization has spent thousands of dollars with LogRhythm to obtain training and I can tell you unequivocally that this does not scratch the surface of the value I have received from my Co-Pilot‘s guidance and training.

Miakai Robinson, Senior Security Engineeer

Read verified LogRhythm customer reviews on Gartner Peer Insights

See what your peers have to say about leading SIEM solutions

Trusted by the Best

How Can We Help?

LogRhythm is here for you every step of the way throughout your security journey. Contact us to learn more about how we can address your security challenges and requirements. 

See what we've been working on...

See how we're delivering on promises to better serve our customers