LOGRHYTHM in Anomaly Detection Software

The company offers a wide array of anomaly detection products such as, security intelligence platform, SIEM, security analytics, log management, network monitoring and forensics, netmon freemium, endpoint monitoring and forensics.The company’s next-generation log management platform provides real-time identification, alerting against external and internal security threats, compliance monitoring and reporting. LogRhythm uses machine learning and other techniques to surface advanced threats. The LogRhythm security intelligence platform is an SIEM product for enterprise use. It is used to collect security event log data from software throughout an enterprise, including network security controls, operating systems and user applications. The SIEM tool analyzes the data to identify possible signs of malicious activities, so that humans or automated processes can stop attacks in progress or recover from successful attacks. LogRhythm's security analytics platform is the security application that leverage big data technologies to help mitigate the risk of targeted, persistent threats.

USP : LogRhythm's products enable organizations to secure their networks and optimize information technology operations. In addition to this, it strives to automate collection, organization, analysis, archival, and recovery of log data that enables enterprises to comply with log data retention regulations. The product’s components include collection, system and network monitoring, analytics modules, log and event managing, and an AI engine.

BUYERS
VENDORS
EXPERTS
ANALYSTS
 

LOGRHYTHM detailed analysis

Product Maturity
Company Maturity
Most IMPORTANT
3.3
4.0
3.3
Breadth and Depth of Product Offerings
3.35
5.00
3.30
Product Features and Functionality
3.25
3.50
2.90
Product Branding
4.00
4.60
3.95
Product Differentiation and Impact on Customer Value
2.70
3.80
2.80
Product Quality and Reliability
3.30
2.55
3.55
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

LOGRHYTHM has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Middle East and Africa

    17 Participants

  • Niche Quadrant

    All-Asia-Pacific

    16 Participants

  • Niche Quadrant

    All-Europe

    21 Participants

SECTORS
REGIONS
North America Latin America Middle East and Africa Asia-Pacific Europe
STRENGTHS
  • Product Maturity / Products Offered
    Network Behaviour Anomoly Detection
  • Product Maturity / Products Offered
    User Behaviour Anomoly Detection
  • Product Maturity / Technology Offered
    Big Data Analytics
  • Product Maturity / Technology Offered
    Machine Learning & AI
  • Product Maturity / Solutions Offered
    Identity and access management (IAM)
  • Product Maturity / Solutions Offered
    Network Intelligence and Security (DDOS and IDS/IPS)
  • Product Maturity / Solutions Offered
    SIEM(Log Management)
  • Product Maturity / Solutions Offered
    Threat Intelligence and Management
  • Company Maturity / Industry Verticals
    BFSI
  • Company Maturity / Industry Verticals
    Healthcare and Life Sciences
  • Company Maturity / Industry Verticals
    Other Industry Verticals
  • Company Maturity / Industry Verticals
    Retail and Consumer Goods
  • Product Maturity / Services Offered
    Support & Maintenance
  • Product Maturity / End-Users
    Large Enterprises
  • Product Maturity / End-Users
    SME's
  • Product Maturity / Medium of Delivery of Support Services
    Remote Support
  • Company Maturity / Geographic Footprint
    Direct Presence - Asia-Pacific
  • Company Maturity / Geographic Footprint
    Direct Presence - Europe
  • Company Maturity / Geographic Footprint
    Direct Presence - Latin America
  • Company Maturity / Geographic Footprint
    Direct Presence - Middle East and Africa
WEAKNESSES
  • Product Maturity / Technology Offered
    Data Mining & Business Intelligence
  • Product Maturity / Technology Offered
    Other technology offered
  • Product Maturity / Solutions Offered
    Network Traffic Analytics (Traffic Monitoring)
  • Company Maturity / Industry Verticals
    IT and Telecom
  • Company Maturity / Industry Verticals
    Manufacturing
  • Company Maturity / Industry Verticals
    Media and Entertainment
  • Product Maturity / Services Offered
    Business Consulting Services
  • Product Maturity / Services Offered
    Integration & Deployment
  • Product Maturity / Services Offered
    Other Services
  • Company Maturity / Effectiveness of Organic Growth Strategy
    R&D Spend
  • Product Maturity / Solutions Offered
    Data Loss Prevention (DLP)
  • Product Maturity / Solutions Offered
    Other Features Offered
  • Product Maturity / Solutions Offered
    Risk Mitigation and Management (Network Dectection)
  • Product Maturity / Medium of Delivery of Support Services
    On-Site Support
  • Company Maturity / Geographic Footprint
    Indirect Presence - Asia-Pacific
  • Company Maturity / Geographic Footprint
    Indirect Presence - Europe
  • Company Maturity / Geographic Footprint
    Indirect Presence - Latin America
  • Company Maturity / Geographic Footprint
    Indirect Presence - Middle East and Africa
  • Company Maturity / Geographic Footprint
    Indirect Presence - North America
  • Company Maturity / Partner Ecosystem
    Solution Providers

Have you EVER used LOGRHYTHM Products?

Share your experience with potential buyers.

TOP FEATURES
  • Product Features and Functionality
    Solutions Offered
  • Technology Offered
    Machine Learning & AI
  • Solutions Offered
    Threat Intelligence and Management
  • Solutions Offered
    SIEM(Log Management)
  • Medium of Delivery of Support Services
    Remote Support
  • Support Services
    Documentation
  • End-Users
    SME's
  • Technology Offered
    Big Data Analytics
  • Industry Verticals
    Healthcare and Life Sciences
  • End-Users
    Large Enterprises

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

LOGRHYTHM Presence in Anomaly Detection Software

Questions & Answers

TOP REVIEWS

Looking for Anomaly Detection Software? Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.

TOP NEWS