LOGRHYTHM in Cybersecurity Software

Are you from this Company ?
LOGRHYTHM
Online
Colorado, USA
2003
$101MN to $500MN
Enterprise
42 Likes
62 Buyers are Negotiating "Group Buyer Deal"

LOGRHYTHM USP

Logrhythm has developed a platform to seamlessly scale with organization and help detect and respond to threats faster. The LogRhythm NextGen SIEM Platform eliminates blind spots across the enterprise, providing visibility into IT and OT environments. Logrhythm Next-generation solutions plots modern security teams need by improving collaboration and effectiveness through automation and defined processes. The company provides a unified user experience that drives highly efficient workflows, offers real-time visibility into endpoints, and produces assessable results. Logrhythm end-to-end platform helps in detecting threats early in the threat lifecycle. 

Request LOGRHYTHM Pricing to get more information.

Summary

Logrhythm Next-generation SIEMs reduce the amount of time taken to detect and respond to a cyber threat. A SIEM is the bedrock of Logrhythm's security operations center (SOC)’s tech stack. LogRhythm’s NextGen SIEM Platform detects and responds to threats measurably faster through: Log management capabilities which identify useful insights via log analysis and big data analytics; Sorting, enriching, and sequencing log data and applying advanced analytics to it; Built-in playbooks which drive executable best practices and automated countermeasures.

Discussions

1
Add Requirements
Added Requirements
“I am looking for a Cybersecurity Software in north America. My budget is $50,000. Looking to buy in 15 days.”
2
Select Vendors
LOGRHYTHM
62 Buyers Negotiating
3
Send Requirement
Get Vendors & Experts Response To Each Requirement Within Hours.
Requirements submitted successfully.
ops! Something went wrong. Please try again later.
Strengths
  • +12
    Professional Services
  • +7
    Customer Redressal Mechanism/Program
  • +6
    Level of Support
  • +14
    Consulting
  • +7
    Risk & Threat Assessment
  • +5
    Support and Maintenance
  • +9
    On-Site Support
  • +10
    Remote Support
  • +9
    Application 
  • +8
    Endpoint 
  • +7
    Network 
  • +9
    Cloud
  • +8
    Dedicated Account Manager (DAM)
  • +8
    On-Premises
  • +6
    Product Demos
  • +7
    Proof of Concept
  • +5
    Software Requirement Specification (SRS)
  • +10
    Full Time Equivalent
  • +5
    Identity and Access Management (IAM)
  • +12
    Intrusion Detection System/Intrusion Prevention System (IDS/IPS)
Weaknesses
  • -10
    Licenses
  • -13
    Managed Services
  • -6
    Training and Education
  • -14
    Compliance Management
  • -5
    Incident Response
  • -6
    Others
  • -13
    Security Monitoring
  • -10
    Cloud 
  • -11
    Wireless 
  • -13
    Directly
  • -11
    Antivirus/Antimalware 
  • -8
    Data Loss Prevention (DLP)
  • -14
    Disaster Recovery 
  • -5
    Distributed Denial of Service (DDoS) Mitigation
  • -7
    Encryption 
  • -10
    Firewall 
  • -12
    Per User / Device Basis
  • -9
    Unified Threat Management (UTM)
  • -14
    Through Partners / Third-Party Vendors
  • -11
    CIO
I agree to 360Quadrants Terms of use and privacy policy
Success
info
Error
Company Size :
  Enterprise
  SME
  Startup