TechValidate Content Library /

TechValidate Research on LogRhythm

34 Case Studies – Page 1 of 4

County Of Sussex Uses LogRhythm to Strengthen Security & Prevent Improper Access to Data

Challenges

  • Addressed the following problems with their LogRhythm deployment:
    • Need for protection from external threats and hackers
    • Need for improved visibility into privileged user behavior
    • Need for protection from advanced persistent threats
    • Need for faster response to security incidents
    • Need for better correlation between events generated by different devices and applications
    • Need for detection of compromised and/or stolen credentials

Use Case

  • Collect and analyze data from the following sources with LogRhythm:
    • Security solutions such as IPS/IDS, firewalls, vulnerability scanners, antivirus software
    • Operating systems / servers
    • Commercial applications
    • Databases
    • Virtual and/or cloud-based environments
  • Installed LogRhythm and began collecting data in 1 to 3 weeks.
  • Has LogRhythm collecting data from 501-1,000 devices.

Results

  • Has used LogRhythm to detect/prevent the following security threats:
    • Malware or virus
    • Stolen or compromised credentials
    • External hacking attempts
    • Improper access/use of confidential data
  • Rated their ability to identify real-time incidents using LogRhythm:
    • Security events: significantly faster
    • Compliance violations: significantly faster
    • Operational issues: significantly faster
  • Describes their security posture as stronger since implementing LogRhythm.
  • Selected LogRhythm over the following products:
    • IBM/Q1 Labs
    • McAfee/NitroSecurity
    • RSA enVision
Source:
William Kosinetz, Chief Information Officer, County of Sussex

Details Share   Cite     Embed Download

Case Study: Texas A&M University Health Science Center Strengthens Security Posture

Challenges

  • Addressed the following problems with their LogRhythm deployment:
    • Need for protection from external threats and hackers
    • Need for improved visibility into privileged user behavior
    • Need for protection from advanced persistent threats
    • Need for faster response to security incidents
    • Need for better correlation between events generated by different devices and applications
    • Need for detection of compromised and/or stolen credentials
    • Need for fraud detection

Use Case

  • Collect and analyze data from the following sources with LogRhythm:
    • Security solutions such as IPS/IDS, firewalls, vulnerability scanners, antivirus software
    • Operating systems / servers
    • Network devices
    • Identity management and access control systems
    • Commercial applications
    • Databases
    • Virtual and/or cloud-based environments
  • Installed LogRhythm and began collecting data in 1-3 Days.
  • Has LogRhythm collecting data from 101-500 devices.

Results

  • Has used LogRhythm to detect/prevent the following security threats:
    • Malware or virus
    • Stolen or compromised credentials
    • External hacking attempts
    • Compromised hosts
  • Rated their ability to identify real-time incidents using LogRhythm:
    • security events: significantly faster
    • compliance violations: significantly faster
    • operational issues: significantly faster
  • Describes their security posture as much stronger since implementing LogRhythm.
Source:
Michael Esparza, Security Officer, Texas A&M University Health Science Center

Details Share   Cite     Embed Download

Case Study: Medium Enterprise Banking Company Detects Malware and Compromised Hosts

Challenges

  • Addressed the following problems with their LogRhythm deployment:
    • Need for protection from external threats and hackers
    • Need for improved visibility into privileged user behavior
    • Need for protection from advanced persistent threats
    • Need for faster response to security incidents
    • Need for better correlation between events generated by different devices and applications

Use Case

  • Collect and analyze data from the following sources with LogRhythm:
    • Security solutions such as IPS/IDS, firewalls, vulnerability scanners, antivirus software
    • Operating systems / servers
    • Network devices
    • Custom applications
    • Commercial applications
    • Databases
    • Virtual and/or cloud-based environments
  • Installed LogRhythm and began collecting data in < 1 week.
  • Has LogRhythm collecting data from 501-1,000 devices.

Results

  • Has used LogRhythm to detect/prevent the following security threats:
    • Malware or virus
    • Compromised hosts
  • Rated their ability to identify real-time incidents using LogRhythm:
    • Security events: faster
    • Compliance violations: faster
    • Operational issues: faster
  • Describes their security posture as stronger since implementing LogRhythm.
  • Selected LogRhythm over the following products:
    • McAfee/NitroSecurity
    • RSA enVision
    • Trigeo/solarwinds, loglogic
Source:
TechValidate Survey of a Medium Enterprise Banking Company

Details Share   Cite     Embed Download

Case Study: Associated Electric Cooperative, Inc. Strengthens Security & Compliance Posture

Challenges

  • Addressed the following problems with their LogRhythm deployment:
    • Need for improved visibility into privileged user behavior
    • Need for faster response to security incidents
    • Need for better correlation between events generated by different devices and applications
    • NERC CIP Compliance

Use Case

  • Collect and analyze data from the following sources with LogRhythm:
    • Security solutions such as IPS/IDS, firewalls, vulnerability scanners, antivirus software
    • Operating systems / servers
    • Network devices
    • Custom applications
    • Databases
  • Installed LogRhythm and began collecting data in 1-3 Days.
  • Has LogRhythm collecting data from 101-500 devices.

Results

  • Has used LogRhythm to detect/prevent the following security threats:
    • Compliance with NERC CIP standards
  • Rated their ability to identify real-time incidents using LogRhythm:
    • security events: significantly faster
    • compliance violations: significantly faster
    • operational issues: significantly faster
  • Describes their security posture as much stronger since implementing LogRhythm.
  • Selected LogRhythm over the following products:
    • McAfee/NitroSecurity
    • RSA enVision
Source:
Jonathan Douglas, Systems Administration Supervisor, Associated Electric Cooperative, Inc.

Details Share   Cite     Embed Download

Case Study: Large Enterprise Aerospace & Defense Company in the UK Gains Visibility

Challenges

  • Addressed the following problems with their LogRhythm deployment:
    • Need for improved visibility into privileged user behavior
    • Lack of protection from advanced persistent threats
    • Need for faster response to security incidents
    • Require better correlation between events generated by different devices and applications
    • Detection of compromised and/or stolen credentials

Use Case

  • Has used LogRhythm to do the following:
    • Locate the source(s) of a data breach
    • Provide evidence of suspicious or unauthorized user activity for an internal investigation
  • Described their LogRhythm deployment in the following ways:
    • Deployed LogRhythm for 1-3 years
    • Used LogRhythm to monitor a centralized network with a large number of satellite or retail locations
    • Used LogRhythm to operate in a classified network with strictly controlled access to specific segments

Results

  • Has used LogRhythm to detect/prevent the following security threats:
    • Compromised hosts
    • Improper access/use of confidential data
  • Chose LogRhythm for the following features:
    • Powerful forensics
    • Ease-of-use
    • Real-time monitoring capabilities
  • LogRhythm delivered the following:
    • Scalability and deployment flexibility
    • Enhanced, enterprise-wide visibility into event data
    • Enterprise-wide, in-depth user monitoring
Source:
TechValidate Survey of a Large Enterprise Aerospace & Defense Company

Details Share   Cite     Embed Download

Case Study: Medium Enterprise Consumer Services Company Prevents APTs with LogRhythm

Challenges

  • Addressed the following problems with their LogRhythm deployment:
    • Lack of protection from external threats and hackers
    • Need for improved visibility into privileged user behavior
    • Lack of protection from advanced persistent threats
    • Require faster response to security incidents
    • Need for better correlation between events generated by different devices and applications
    • Detection of compromised and/or stolen credentials
    • Fraud detection

Use Case

  • Has used LogRhythm to do the following:
    • Identify and/or prevent an advanced persistent threat
  • Described their LogRhythm deployment in the following ways:
    • Deployed LogRhythm for longer than 3 years

Results

  • Has used LogRhythm to detect/prevent the following security threats:
    • Malware or virus
    • Fraud
  • Selected LogRhythm over the following products:
    • Splunk
  • Chose LogRhythm for the following features:
    • Out-of-the-box compliance
    • Real-time monitoring capabilities
    • File integrity monitoring
  • LogRhythm delivered the following:
    • Improved incident response and threat management capabilities
    • Enterprise-wide, in-depth user monitoring
  • Rated LogRhythm’s differentiation compared to other SIEM solutions:
    • Performance: Superior
    • Advanced Correlation: Superior
    • Scalability: Superior
    • Compliance Support: Superior
    • Usability: Superior
Source:
TechValidate Survey of a Medium Enterprise Consumer Services Company

Details Share   Cite     Embed Download

Case Study: Large Enterprise Hospitality Company Gains Visibility Into Abnormal Behavior

Challenges

  • Addressed the following problems with their LogRhythm deployment:
    • Need for improved visibility into privileged user behavior
    • Need for faster response to security incidents
    • Need for better correlation between events generated by different devices and applications
    • Better visibility into server & workstation logs. Meet PCI Requirements for log collection.

Use Case

  • Has used LogRhythm to do the following:
    • Provide evidence of suspicious or unauthorized user activity for an internal investigation
    • Identify and/or prevent an advanced persistent threat
    • Establish a Privileged User Monitoring program
  • Described their LogRhythm deployment in the following ways:
    • Deployed LogRhythm for 1-3 years

Results

  • Has used LogRhythm to detect/prevent the following security threats:
    • External hacking attempts
    • Improper access/use of confidential data
    • Abnormal events.
  • Selected LogRhythm over the following products:
    • HP/ArcSight
    • Splunk
    • NetIQ/Novell Sentinel
    • Solarwinds
  • Chose LogRhythm for the following features:
    • Extensive, automated reporting
    • Ease-of-use
    • Rapid deployment
    • Real-time monitoring capabilities
    • File integrity monitoring
  • LogRhythm delivered the following:
    • Scalability and deployment flexibility
    • Compliance automation and assurance
    • Enterprise-wide, in-depth user monitoring
  • Rated LogRhythm’s differentiation compared to other SIEM solutions:
    • Performance: Superior
    • Advanced Correlation: Superior
    • Scalability: Superior
    • Compliance Support: Superior
    • Usability: Superior

Testimonials

“Just by monitoring daily events we are able to notice anything abnormal. In addition, automated reporting is a great feature to have. Reports are easy to build from scratch and customize.”

Source:
TechValidate Survey of a Large Enterprise Hospitality Company

Details Share   Cite     Embed Download

Case Study: UK County Council Achieves Compliance and Enterprise-wide User Monitoring

Challenges

  • Addressed the following problems with their LogRhythm deployment:
    • Need for improved visibility into privileged user behavior
    • Need for better correlation between events generated by different devices and applications

Use Case

  • Has used LogRhythm to do the following:
    • Provide evidence to law enforcement for a criminal investigation and/or prosecution
    • Provide evidence of suspicious or unauthorized user activity for an internal investigation
    • Establish a Privileged User Monitoring program
  • Described their LogRhythm deployment in the following ways:
    • Deployed LogRhythm for longer than 3 years

Results

  • Has used LogRhythm to detect/prevent the following security threats:
    • Malware or virus
    • Stolen or compromised credentials
    • Compromised hosts
    • Improper access/use of confidential data
  • Selected LogRhythm over the following products:
    • McAfee/NitroSecurity
    • LogLogic
  • Chose LogRhythm for the following features:
    • Extensive, automated reporting
    • Ease-of-use
    • Rapid deployment
    • Out-of-the-box compliance
    • Real-time monitoring capabilities
  • LogRhythm delivered the following:
    • Improved incident response and threat management capabilities
    • Compliance automation and assurance
    • Deployment and support simplicity
    • Enterprise-wide, in-depth user monitoring
  • Rated LogRhythm’s differentiation compared to other SIEM solutions:
    • Performance: Far better
    • Scalability: Far better
    • Compliance Support: Superior
    • Usability: Superior
Source:
TechValidate Survey of a UK County Council

Details Share   Cite     Embed Download

Case Study: Medium Enterprise Hospitality Company Gains Real-Time Threat Protection

Challenges

  • Addressed the following problems with their LogRhythm deployment:
    • Lack of visibility into privileged user behavior
    • Need for faster response to security incidents
    • Need for better correlation between events generated by different devices and applications

Use Case

  • Has used LogRhythm to do the following:
    • Locate the source(s) of a data breach
    • Provide evidence to law enforcement for a criminal investigation and/or prosecution
    • Provide evidence of suspicious or unauthorized user activity for an internal investigation
    • Minimize the impact and/or spread of a malware incident
    • Establish a Privileged User Monitoring program
  • Described their LogRhythm deployment in the following ways:
    • Deployed LogRhythm for 1-3 years
    • Used LogRhythm in a heterogeneous environment (multiple OS, network device and application vendors)

Results

  • Has used LogRhythm to detect/prevent the following security threats:
    • Malware or virus
    • External hacking attempts
    • Compromised hosts
    • Improper access/use of confidential data
  • Chose LogRhythm for the following features:
    • Out-of-the-box compliance
    • Real-time monitoring capabilities
  • LogRhythm delivered the following:
    • Scalability and deployment flexibility
    • Real-time threat detection and advanced correlation
    • Improved incident response and threat management capabilities
    • Compliance automation and assurance
    • Enterprise-wide, in-depth user monitoring
  • Rated LogRhythm’s differentiation compared to other SIEM solutions:
    • Performance: Far better
    • Scalability: Better
    • Usability: Better

Testimonials

“The product has a near time ability to take a raw incident and send out an alarm which is very good. It allows us to identify and mitigate a real-time attack quickly. "

Source:
TechValidate Survey of a Medium Enterprise Hospitality Company

Details Share   Cite     Embed Download

Financial Services Company in the UK Improves Security Intelligence with LogRhythm

Challenges

  • Addressed the following problems with their LogRhythm deployment:
    • Lack of protection from external threats and hackers
    • Need for improved visibility into privileged user behavior
    • Weak protection from advanced persistent threats
    • Need for faster response to security incidents
    • Lack of detection of compromised and/or stolen credentials

Use Case

  • Has used LogRhythm to do the following:
    • Provide evidence of suspicious or unauthorized user activity for an internal investigation
    • Establish a Privileged User Monitoring program
  • Described their LogRhythm deployment in the following ways:
    • Deployed LogRhythm for 1-3 years

Results

  • Has used LogRhythm to detect/prevent the following security threats:
    • Malware or virus
    • Stolen or compromised credentials
    • External hacking attempts
    • Compromised hosts
    • Stolen records
  • Chose LogRhythm for the following features:
    • Extensive, automated reporting
    • Ease-of-use
    • Real-time monitoring capabilities
    • File integrity monitoring
  • LogRhythm delivered the following:
    • Scalability and deployment flexibility
    • Real-time threat detection and advanced correlation
    • Improved incident response and threat management capabilities
    • Compliance automation and assurance
    • Enhanced, enterprise-wide visibility into event data
    • Deployment and support simplicity
    • Enterprise-wide, in-depth user monitoring
  • Rated LogRhythm’s differentiation compared to other SIEM solutions:
    • Performance: Superior
    • Advanced Correlation: Superior
    • Scalability: Superior
    • Usability: Superior

Testimonials

“LogRhythm provides us with a level of security intelligence and analytics that goes way above traditional SIEM. It not only allows us to monitor compliance, but also allows us to show the true value of security to the board.”

Source:
TechValidate Survey of a Medium Enterprise Financial Services Company

Details Share   Cite     Embed Download


More Research on LogRhythm   Explore all TechValidate Research


© Copyright 2014 TechValidate Software Inc. All marks used on this site are the property of their respective owners.   Privacy Policy   Terms of Use   Credits