LogRhythm LR-500-XM review

Compliancy with data protection regulations is not to be taken lightly and LogRhythm offers the means to stay on the right side of the law.

The console opens with the My Personal Dashboard tab, which provides graphical views on virtually any type of log related activity and potential security breach. Events are shown by functions such as operational, security and audit functions and you can decide how device log data events are to be classified.

Advertisement - Article continues below

You can select events and drill down for more information. Select a spike on a graph and the Log/Event Analyser will show you only those related events. The Log Viewer displays raw data and selecting a single event shows more detailed information including metadata.

Forensics tools are accessed from the Investigate screen where query creation is helped along by wizard based routines. You can choose a log source and time period, pick from a list of event types, add filters to fine tune the results and schedule them to run at regular intervals. The LogRhythm Tail feature can be configured to monitor multiple log streams enabling you to run forensics investigations in real time.

Reporting is very good as the LogRhythm Report Center offers a wide range of predefined reports, which can be customised to suit. A key feature is LogRhythm includes all report packages for PCI DSS, HIPAA, SOX, FISMA and GLBA as standard LogLogic, for example, considers them options and charges accordingly.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

The latest LogRhythm 4.1 software offers a number of new features and first up is Second Look. When data is collected it is parsed and metadata for various fields is maintained on the appliance. This means original log data can be archived quickly to ensure space on the appliance is put to best use.

Second Look enables archived logs to be imported back into the appliance and additional rules run against them to update their metadata. It's also worth noting that when archived data is restored it goes into a separate database on the appliance and is check-summed to make sure it hasn't been tampered with.

LogRhythm's host based contextualization enables you to follow a set of seemingly unrelated incidents that together could be considered a security breach. For example, this function could be used to monitor a specific user authentication followed by a transfer of a file over a certain size to an external IP address outside normal business hours.

Advertisement - Article continues below

Access controls to log data are extensive with administrators having full access, whilst analyst accounts enables these users to see log data and reports but not administer the appliance. Roles restrict access further as these contain specific devices, groups of devices and log data sources. A good example would be restricting analysts to viewing the Windows security event log on specified systems but not their application log.

For storage management, you have full control over how all log and event information is stored. You can decide at the device, event and rule level whether data should be archived, how long it should be kept on the appliance, when it can be discarded or if it should be kept at all. This flexibility over how log data should be retained enables local storage to be managed more efficiently thus negating the need to upgrade to higher capacity and higher cost hardware platforms.

Advertisement - Article continues below

The comprehensive log monitoring and reporting tools offered by LogRhythm will make it much easier for businesses to tighten security and prove regulatory compliance. The appliance is very easy to deploy and scores highly for value as the price includes all the key standards compliancy report packages.

Verdict

There are a good range of log management solutions on the market so companies don’t really have any excuses for failing to meet data protection regulations. LogRhythm scores over many as it is particularly easy to deploy and use and offers good value as all key compliancy report packages are included in the price.

Chassis: Dell PowerEdge 1950 1U rack CPU: 2.66GHz quad-core Xeon Memory: 4GB 667MHz FB-DIMM Storage: 2 x 300GB Seagate Cheetah 15K.5 SAS drives in RAID-1 RAID: Dell PERC 6/i controller Network: 2 x Gigabit Ethernet Power: 2 x hot-swap supplies OS: Windows Server 2003 R2 (5 CALs) Database: SQL Server 2005 Enterprise (3 CALs) Management: LogRhythm Console utility

Featured Resources

Preparing for long-term remote working after COVID-19

Learn how to safely and securely enable your remote workforce

Download now

Cloud vs on-premise storage: What’s right for you?

Key considerations driving document storage decisions for businesses

Download now

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Transforming productivity

Solutions that facilitate work at full speed

Download now
Advertisement

Most Popular

Visit/business-strategy/careers-training/356422/ibm-job-ad-calls-for-12-year-experience-with-6-year-old
Careers & training

IBM job ad calls for 12-years of experience with six-year-old Kubernetes

13 Jul 2020
Visit/business/business-operations/356395/nvidia-overtakes-intel-as-most-valuable-us-chipmaker
Business operations

Nvidia overtakes Intel as most valuable US chipmaker

9 Jul 2020
Visit/security/cyber-attacks/356417/trump-confirms-cyber-attacks-on-russia-election-trolls
cyber attacks

Trump confirms US cyber attack on Russia election trolls

13 Jul 2020