+
+

Related Products

  • Blumira
    145 Ratings
    Visit Website
  • ManageEngine Log360
    134 Ratings
    Visit Website
  • ConnectWise SIEM
    191 Ratings
    Visit Website
  • Graylog
    383 Ratings
    Visit Website
  • Guardz
    103 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    189 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    82 Ratings
    Visit Website
  • Wiz
    1,088 Ratings
    Visit Website
  • Resolver
    274 Ratings
    Visit Website
  • Source Defense
    7 Ratings
    Visit Website

About

We know your job isn’t easy. That’s why we combine log management, machine learning, SOAR, UEBA, and NDR to give you broad visibility across your environment so you can quickly uncover threats and minimize risk. But a mature SOC doesn’t just stop threats. With LogRhythm, you’ll easily baseline your security operations program and track your gains — so you can easily report your successes to your board. Defending your enterprise comes with great responsibility — that’s why we built our NextGen SIEM Platform with you in mind. With intuitive, high-performance analytics and a seamless incident response workflow, protecting your business just got easier. With the LogRhythm XDR Stack, your team has an integrated set of capabilities that deliver on the fundamental mission of your SOC — threat monitoring, threat hunting, threat investigation, and incident response — at a low total cost of ownership.

About

Overcome threats and vulnerabilities with SOAR (security orchestration, automation, and response) and risk-based vulnerability management. Say hello to a secure digital transformation. Accelerate incident response with context and AI for smart workflows. Use MITRE ATT&CK to investigate threats and close gaps. Apply risk-based vulnerability management across your infrastructure and applications. Use collaborative workspaces for effective management of risks and IT remediation. Get an executive view of key metrics and indicators with role-based dashboards and reporting. Enhance visibility into your security posture and team performance. Security Operations groups key applications into scalable packages that can grow with you as your needs change. Know your security posture and quickly prioritize high-impact threats in real time and at scale. React faster with collaborative workflows and repeatable processes across security, risk, and IT.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT teams

Audience

Teams looking to identify, prioritize and respond faster to threats

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Exabeam
Founded: 2012
United States
www.exabeam.com/platform/logrhythm-siem/

Company Information

ServiceNow
Founded: 2003
United States
www.servicenow.com/products/security-operations.html

Alternatives

Alternatives

Alert Logic

Alert Logic

Fortra

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

GDPR Compliance Features

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Bug Tracking Features

Backlog Management
Filtering
Issue Tracking
Release Management
Task Management
Ticket Management
Workflow Management

Business Continuity Features

Backup Log
Backup Scheduling
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Multiple System Support
Remote Server Options
Secure Data Storage
Web Access / Restoration

Data Recovery Features

Web Access / Restoration
Backup Log
Backup Scheduling
Compression
Continuous Backup
Encryption
Incremental Backup
Local Server Options
Multiple System Support
Remote Server Options
Secure Data Storage

Integrations

ThreatConnect Risk Quantifier (RQ)
Activu
Baits
Box Shield
Carbon Black EDR
Claroty
Cofense Triage
Cynerio
D3 Smart SOAR
DNSSense
GigaSECURE
HackGuard
Imperva CDN
Intellicta
Intezer Analyze
Microsoft Defender for IoT
Proofpoint Identity Threat Defense
Recorded Future

Integrations

ThreatConnect Risk Quantifier (RQ)
Activu
Baits
Box Shield
Carbon Black EDR
Claroty
Cofense Triage
Cynerio
D3 Smart SOAR
DNSSense
GigaSECURE
HackGuard
Imperva CDN
Intellicta
Intezer Analyze
Microsoft Defender for IoT
Proofpoint Identity Threat Defense
Recorded Future
Claim LogRhythm SIEM and update features and information
Claim LogRhythm SIEM and update features and information
Claim ServiceNow Security Operations and update features and information
Claim ServiceNow Security Operations and update features and information