LogRhythm LR-500-XM review

Compliancy with data protection regulations is not to be taken lightly and LogRhythm offers the means to stay on the right side of the law.

The console opens with the My Personal Dashboard tab, which provides graphical views on virtually any type of log related activity and potential security breach. Events are shown by functions such as operational, security and audit functions and you can decide how device log data events are to be classified.

You can select events and drill down for more information. Select a spike on a graph and the Log/Event Analyser will show you only those related events. The Log Viewer displays raw data and selecting a single event shows more detailed information including metadata.

Forensics tools are accessed from the Investigate screen where query creation is helped along by wizard based routines. You can choose a log source and time period, pick from a list of event types, add filters to fine tune the results and schedule them to run at regular intervals. The LogRhythm Tail feature can be configured to monitor multiple log streams enabling you to run forensics investigations in real time.

Reporting is very good as the LogRhythm Report Center offers a wide range of predefined reports, which can be customised to suit. A key feature is LogRhythm includes all report packages for PCI DSS, HIPAA, SOX, FISMA and GLBA as standard LogLogic, for example, considers them options and charges accordingly.

The latest LogRhythm 4.1 software offers a number of new features and first up is Second Look. When data is collected it is parsed and metadata for various fields is maintained on the appliance. This means original log data can be archived quickly to ensure space on the appliance is put to best use.

Second Look enables archived logs to be imported back into the appliance and additional rules run against them to update their metadata. It's also worth noting that when archived data is restored it goes into a separate database on the appliance and is check-summed to make sure it hasn't been tampered with.

LogRhythm's host based contextualization enables you to follow a set of seemingly unrelated incidents that together could be considered a security breach. For example, this function could be used to monitor a specific user authentication followed by a transfer of a file over a certain size to an external IP address outside normal business hours.

Access controls to log data are extensive with administrators having full access, whilst analyst accounts enables these users to see log data and reports but not administer the appliance. Roles restrict access further as these contain specific devices, groups of devices and log data sources. A good example would be restricting analysts to viewing the Windows security event log on specified systems but not their application log.

For storage management, you have full control over how all log and event information is stored. You can decide at the device, event and rule level whether data should be archived, how long it should be kept on the appliance, when it can be discarded or if it should be kept at all. This flexibility over how log data should be retained enables local storage to be managed more efficiently thus negating the need to upgrade to higher capacity and higher cost hardware platforms.

The comprehensive log monitoring and reporting tools offered by LogRhythm will make it much easier for businesses to tighten security and prove regulatory compliance. The appliance is very easy to deploy and scores highly for value as the price includes all the key standards compliancy report packages.

Verdict

There are a good range of log management solutions on the market so companies don’t really have any excuses for failing to meet data protection regulations. LogRhythm scores over many as it is particularly easy to deploy and use and offers good value as all key compliancy report packages are included in the price.

Chassis: Dell PowerEdge 1950 1U rack CPU: 2.66GHz quad-core Xeon Memory: 4GB 667MHz FB-DIMM Storage: 2 x 300GB Seagate Cheetah 15K.5 SAS drives in RAID-1 RAID: Dell PERC 6/i controller Network: 2 x Gigabit Ethernet Power: 2 x hot-swap supplies OS: Windows Server 2003 R2 (5 CALs) Database: SQL Server 2005 Enterprise (3 CALs) Management: LogRhythm Console utility

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Recommended

Supermicro A+ Server 1114S-WN10RT review: EPYC power, but poorly presented
Server & storage

Supermicro A+ Server 1114S-WN10RT review: EPYC power, but poorly presented

14 Apr 2021
Broadberry CyberServe Xeon E-RS100-E10 review: A cracking specification at a great price
Server & storage

Broadberry CyberServe Xeon E-RS100-E10 review: A cracking specification at a great price

8 Mar 2021
Dell EMC PowerEdge R340 review: A sound investment for small businesses
Server & storage

Dell EMC PowerEdge R340 review: A sound investment for small businesses

1 Mar 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans
Laptops

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans

11 Oct 2021
Windows 11 has problems with Oracle VirtualBox
Microsoft Windows

Windows 11 has problems with Oracle VirtualBox

5 Oct 2021