{"id":7776,"date":"2018-10-11T00:00:00","date_gmt":"2018-10-11T00:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2018\/10\/11\/logrhythm-siem-product-overview-and-insight\/"},"modified":"2022-06-03T16:01:03","modified_gmt":"2022-06-03T16:01:03","slug":"logrhythm","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/","title":{"rendered":"LogRhythm SIEM Definition &amp; Review"},"content":{"rendered":"<div id=\"article-content\">\n<div id=\"article-ads\">\n<div class=\"hidden-xs\">\n<div id=\"daily-newsletter\" class=\"row\">\n<div class=\"text-center\">\n<div class=\"col-md-6 col-md-offset-3\">\n<div id=\"namecard-input-groupwz\" class=\"input-group\">\n<h2>Bottom Line<\/h2>\n<p>LogRhythm&#8217;s SIEM offering boasts high ratings from users and analysts. It is easier to deploy than some top-of-the-line SIEM products, but may not scale to support very high event volume environments. It is best for small and mid-sized organizations that already possess some kind of threat intelligence and analytics functionality.<\/p>\n<h2>Company Description<\/h2>\n<p>Founded in 2003, LogRhythm bills itself as &#8220;the security intelligence company,&#8221; with a primary focus on developing next-generation SIEM solutions. It is privately held.<\/p>\n<h2>Product Description<\/h2>\n<p>LogRhythm unifies SIEM, log management, network and endpoint monitoring and forensics, as well as security analytics. It incorporates threat lifecycle management, security automation and orchestration (SAO), compliance, and targeted searches that use contextual or unstructured criteria. It includes modules such as Platform Manager, AI Engine, Data Processors, Data Indexers and Data Collectors. Earlier this year, LogRhythm released its <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/how-to-comply-with-gdpr\/\">GDPR Compliance<\/a> Module and <span style=\"text-decoration: underline;\">CloudAI<\/span>, an analytics-as-a-service offering leveraging artificial intelligence in support of threat detection.<\/p>\n<p>LogRhythm is consistently rated among the Leaders in Gartner&#8217;s SIEM Magic Quadrant, with its strong core SIEM platform with complementary host and network monitoring capabilities. Gartner lists areas for improvement as machine learning-driven analytics; easier integration with third-party solutions; fully open APIs; and greater support for threat intelligence feeds out of the box. Gartner said it may not scale to support very high-event volume environments and is thus best for small and mid-sized organizations with good threat intelligence and analytics functionality.<\/p>\n<p><em>See our complete list of <a href=\"https:\/\/www.esecurityplanet.com\/products\/siem-tools\/\">Top SIEM Products<\/a>.<br \/>\n<\/em><\/p>\n<h2>LogRhythm SIEM Features Rated<\/h2>\n<p><strong>Threats blocked: <\/strong>Very good<strong>. <\/strong>LogRhythm SIEM provides out-of-the-box analytics content (950+ threat scenarios) available in organized modules, as well as the ability to create custom content. Its processing tier on log data enables pre-defined rules to be vendor-agnostic so users can align them to their use case without customization.<\/p>\n<p><strong>Sources ingested:<\/strong> Best. The LogRhythm NextGen SIEM Platform supports over 850 supported data sources, including IoT devices, physical security systems, operating systems, and applications. A single deployment can process hundreds of thousands of messages across a global environment.<\/p>\n<p><strong>Performance:<\/strong> Very good. SANS Institute verified LogRhythm&#8217;s ability to collect and process a sustained 300,000 messages per second (MPS). A single LogRhythm Data Processor processes up to 40,000 MPS and scales horizontally in an active: active architecture to increase processing rates. LogRhythm Data Indexers process data at more than 20,000 MPS per node. LogRhythm NetMon, a network analytics and forensics sensor, supports up to 10 Gbps.<\/p>\n<p><strong>Value:<\/strong> Good. Users are generally satisfied with what they get for their money. Risk-based scoring, security orchestration and automated or semi-automated tasks can save security teams time and boost productivity.<\/p>\n<p><strong>Implementation:<\/strong> Very good. Ease of deployment is a common theme among users.<\/p>\n<p><strong>Management features:<\/strong> Very good. Users praise the product&#8217;s ease of use, with some noting they&#8217;d like to see more robust reporting features.<\/p>\n<p><strong>Support:<\/strong> Very good. Users rate LogRhythm&#8217;s support above average, with four-hour responses to technical support requests and standard and premium support levels available.<\/p>\n<p><strong>Scalability:<\/strong> Good. LogRhythm supports up to 10 Data Indexers in a cluster and multiple clusters in a single LogRhythm deployment. But Gartner said some clients found it hard to scale to very high-volume environments.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/logrhythm-siem-product-overview-and-insight_5fad09cf397ce.jpeg\" alt=\"LogRhythm SIEM\" width=\"846\" height=\"253\" \/><\/p>\n<h2>Security qualifications<\/h2>\n<p>FISMA, GPG13, PCI DSS, the Health Insurance Portability and Accountability Act (HIPAA), NERC CIP, SOx and ISO 27001.<\/p>\n<h2>Delivery<\/h2>\n<p>Can be deployed as an appliance, software, or virtual instance.<\/p>\n<h2>Agents<\/h2>\n<p>LogRhythm can collect all types of Windows Event Logs with or without the use of an agent. Its agent technology facilitates the aggregation of log data, security events and other machine data. Data Collectors can operate locally or remotely.<\/p>\n<h2>Pricing<\/h2>\n<p>The platform begins at $28,000, with subscription options also available. Subscription pricing is tied to volume consumption. Licensing is also based on a daily (rather than hourly) average of messages per second (MPS).<\/p>\n<p><em>For more analysis of LogRhythm&#8217;s SIEM, see our <\/em><a href=\"https:\/\/www.esecurityplanet.com\/products\/logrhythm-vs-splunk\/\"><strong><em>LogRhythm vs Splunk<\/em><\/strong><\/a><em> SIEM product comparison<\/em>.<\/p>\n<h2>Top LogRhythm SIEM Alternatives<\/h2>\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-vertical\">\n            <!--\n            ICP Plugin - body vertical\n            ----------\n            Category: SEC-SIEM\n            Count: 5\n            Country: HK\n        -->\n    <\/div><!-- ICP Plugin: End -->\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n<div id=\"ta-campaign-widget-66d6ffb36247e-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6ffb36247e\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6ffb36247e\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6ffb36247e\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6ffb36247e\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6ffb36247e\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6ffb36247e\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Bottom Line LogRhythm&#8217;s SIEM offering boasts high ratings from users and analysts. It is easier to deploy than some top-of-the-line SIEM products, but may not scale to support very high event volume environments. It is best for small and mid-sized organizations that already possess some kind of threat intelligence and analytics functionality. Company Description Founded [&hellip;]<\/p>\n","protected":false},"author":213,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[17],"tags":[3482,3483],"b2b_audience":[34],"b2b_industry":[],"b2b_product":[395,375],"class_list":["post-7776","post","type-post","status-publish","format-standard","hentry","category-products","tag-security-information-and-event-management","tag-siem","b2b_audience-evaluation-and-selection","b2b_product-firewalls-and-intrusion-prevention-and-detection","b2b_product-security-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>LogRhythm Definition &amp; Review | What is LogRhythm SIEM?<\/title>\n<meta name=\"description\" content=\"LogRhythm&#039;s SIEM product boasts high ratings from users &amp; analysts. Read about the product, features, &amp; pricing now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LogRhythm Definition &amp; Review | What is LogRhythm SIEM?\" \/>\n<meta property=\"og:description\" content=\"LogRhythm&#039;s SIEM product boasts high ratings from users &amp; analysts. Read about the product, features, &amp; pricing now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-11T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-03T16:01:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/logrhythm-siem-product-overview-and-insight_5fad09cf397ce.jpeg\" \/>\n<meta name=\"author\" content=\"Drew Robb\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Drew Robb\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/\"},\"author\":{\"name\":\"Drew Robb\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\"},\"headline\":\"LogRhythm SIEM Definition &amp; Review\",\"datePublished\":\"2018-10-11T00:00:00+00:00\",\"dateModified\":\"2022-06-03T16:01:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/\"},\"wordCount\":671,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/logrhythm-siem-product-overview-and-insight_5fad09cf397ce.jpeg\",\"keywords\":[\"security information and event management\",\"SIEM\"],\"articleSection\":[\"Products\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/\",\"name\":\"LogRhythm Definition & Review | What is LogRhythm SIEM?\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/logrhythm-siem-product-overview-and-insight_5fad09cf397ce.jpeg\",\"datePublished\":\"2018-10-11T00:00:00+00:00\",\"dateModified\":\"2022-06-03T16:01:03+00:00\",\"description\":\"LogRhythm's SIEM product boasts high ratings from users & analysts. Read about the product, features, & pricing now.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/#primaryimage\",\"url\":\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/logrhythm-siem-product-overview-and-insight_5fad09cf397ce.jpeg\",\"contentUrl\":\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/logrhythm-siem-product-overview-and-insight_5fad09cf397ce.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LogRhythm SIEM Definition &amp; Review\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\",\"name\":\"Drew Robb\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"caption\":\"Drew Robb\"},\"description\":\"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LogRhythm Definition & Review | What is LogRhythm SIEM?","description":"LogRhythm's SIEM product boasts high ratings from users & analysts. Read about the product, features, & pricing now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/","og_locale":"en_US","og_type":"article","og_title":"LogRhythm Definition & Review | What is LogRhythm SIEM?","og_description":"LogRhythm's SIEM product boasts high ratings from users & analysts. Read about the product, features, & pricing now.","og_url":"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/","og_site_name":"eSecurity Planet","article_published_time":"2018-10-11T00:00:00+00:00","article_modified_time":"2022-06-03T16:01:03+00:00","og_image":[{"url":"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/logrhythm-siem-product-overview-and-insight_5fad09cf397ce.jpeg"}],"author":"Drew Robb","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Drew Robb","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/"},"author":{"name":"Drew Robb","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2"},"headline":"LogRhythm SIEM Definition &amp; Review","datePublished":"2018-10-11T00:00:00+00:00","dateModified":"2022-06-03T16:01:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/"},"wordCount":671,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/logrhythm-siem-product-overview-and-insight_5fad09cf397ce.jpeg","keywords":["security information and event management","SIEM"],"articleSection":["Products"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/","url":"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/","name":"LogRhythm Definition & Review | What is LogRhythm SIEM?","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/logrhythm-siem-product-overview-and-insight_5fad09cf397ce.jpeg","datePublished":"2018-10-11T00:00:00+00:00","dateModified":"2022-06-03T16:01:03+00:00","description":"LogRhythm's SIEM product boasts high ratings from users & analysts. Read about the product, features, & pricing now.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/products\/logrhythm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/#primaryimage","url":"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/logrhythm-siem-product-overview-and-insight_5fad09cf397ce.jpeg","contentUrl":"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/logrhythm-siem-product-overview-and-insight_5fad09cf397ce.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/products\/logrhythm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"LogRhythm SIEM Definition &amp; Review"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2","name":"Drew Robb","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","caption":"Drew Robb"},"description":"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.","url":"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7776"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/213"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=7776"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7776\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=7776"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=7776"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=7776"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=7776"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=7776"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=7776"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}