LogRhythm LR-500-XM review
Compliancy with data protection regulations is not to be taken lightly and LogRhythm offers the means to stay on the right side of the law.
There are a good range of log management solutions on the market so companies don’t really have any excuses for failing to meet data protection regulations. LogRhythm scores over many as it is particularly easy to deploy and use and offers good value as all key compliancy report packages are included in the price.
There are plenty of standards designed to protect personal and sensitive data and businesses that don't take regulatory compliance seriously are finding this can be a costly mistake. Log data management and analysis are important parts of the process and LogRhythm combines these functions into an appliance based solution and augments them with detailed log and event analysis.
LogRhythm is deployed as an appliance running Windows Server 2003 R2 and it offers a number of hardware solutions. On review we have the entry-level LR-500-XM, which is delivered as a good quality Dell PowerEdge 1950 1U rack server. The price shown includes support for 100 log sources but this can be upgraded as required.
We deployed our appliance as an all-in-one solution running the Log Manager and Event Manager components but you can distribute functions such as log gathering across multiple servers running LogRhythm agents. LogRhythm offers Log Manager agents for Windows, Unix and Solaris host systems and these don't need to be dedicated to this task.
LogRhythm accepts log data from a wide range of sources and support includes syslog, syslog-ng, Windows drive mapping and Event Logs, ODBC connectors for database logs, flat files such as ASCII text, Cisco NetFlow and CheckPoint OPSEC/LEA collections.
The software is managed locally or remotely with a dedicated console, which we found easy to get to grips with. The console can be installed on any remote system and supports all versions of Windows. Deployment is simple enough as you tell your source devices where to send their log data to and LogRhythm will automatically collect this traffic.
Devices such as Windows servers can be automatically identified by their traffic so the appliance can add information such as the OS and version, hostname, associated IP address and Windows Event Logs. Other devices such as security appliances and routers that may be sending syslog data will need to be updated manually to specify the device type. LogRhythm does this as part of its customer deployment service so no user intervention is required.
Logs stored on the appliance are all digitally signed on receipt so it can be proved they haven't been subsequently tampered with and archives are also digitally signed to ensure their integrity. Archive locations can be any type of storage device such as DAS, NAS, IP SAN and FC SAN.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Dave is an IT consultant and freelance journalist specialising in hands-on reviews of computer networking products covering all market sectors from small businesses to enterprises. Founder of Binary Testing Ltd – the UK’s premier independent network testing laboratory - Dave has over 45 years of experience in the IT industry.
Dave has produced many thousands of in-depth business networking product reviews from his lab which have been reproduced globally. Writing for ITPro and its sister title, PC Pro, he covers all areas of business IT infrastructure, including servers, storage, network security, data protection, cloud, infrastructure and services.
-
ROI is about more than profitability when it comes to AI adoption – here’s what enterprises are looking forNews A survey from KPMG suggests enterprises are measuring more than just financial returns
By Emma Woollacott Published
-
Alteryx appoints new CIO in AI transformation pushNews Irish will lead the analytics vendor’s global IT organization as it looks to scale its internal technology capabilities.
By Daniel Todd Published
-
NCSC issues alert over Russian hacker campaign targeting SOHO routersNews The APT28 group has exploited vulnerable internet routers to covertly reroute internet traffic through malicious servers
By Emma Woollacott Published
