LogRhythm LR-500-XM review
Compliancy with data protection regulations is not to be taken lightly and LogRhythm offers the means to stay on the right side of the law.
There are a good range of log management solutions on the market so companies don’t really have any excuses for failing to meet data protection regulations. LogRhythm scores over many as it is particularly easy to deploy and use and offers good value as all key compliancy report packages are included in the price.
There are plenty of standards designed to protect personal and sensitive data and businesses that don't take regulatory compliance seriously are finding this can be a costly mistake. Log data management and analysis are important parts of the process and LogRhythm combines these functions into an appliance based solution and augments them with detailed log and event analysis.
LogRhythm is deployed as an appliance running Windows Server 2003 R2 and it offers a number of hardware solutions. On review we have the entry-level LR-500-XM, which is delivered as a good quality Dell PowerEdge 1950 1U rack server. The price shown includes support for 100 log sources but this can be upgraded as required.
We deployed our appliance as an all-in-one solution running the Log Manager and Event Manager components but you can distribute functions such as log gathering across multiple servers running LogRhythm agents. LogRhythm offers Log Manager agents for Windows, Unix and Solaris host systems and these don't need to be dedicated to this task.
LogRhythm accepts log data from a wide range of sources and support includes syslog, syslog-ng, Windows drive mapping and Event Logs, ODBC connectors for database logs, flat files such as ASCII text, Cisco NetFlow and CheckPoint OPSEC/LEA collections.
The software is managed locally or remotely with a dedicated console, which we found easy to get to grips with. The console can be installed on any remote system and supports all versions of Windows. Deployment is simple enough as you tell your source devices where to send their log data to and LogRhythm will automatically collect this traffic.
Devices such as Windows servers can be automatically identified by their traffic so the appliance can add information such as the OS and version, hostname, associated IP address and Windows Event Logs. Other devices such as security appliances and routers that may be sending syslog data will need to be updated manually to specify the device type. LogRhythm does this as part of its customer deployment service so no user intervention is required.
Logs stored on the appliance are all digitally signed on receipt so it can be proved they haven't been subsequently tampered with and archives are also digitally signed to ensure their integrity. Archive locations can be any type of storage device such as DAS, NAS, IP SAN and FC SAN.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Dave is an IT consultant and freelance journalist specialising in hands-on reviews of computer networking products covering all market sectors from small businesses to enterprises. Founder of Binary Testing Ltd – the UK’s premier independent network testing laboratory - Dave has over 45 years of experience in the IT industry.
Dave has produced many thousands of in-depth business networking product reviews from his lab which have been reproduced globally. Writing for ITPro and its sister title, PC Pro, he covers all areas of business IT infrastructure, including servers, storage, network security, data protection, cloud, infrastructure and services.
-
EU lawmakers want to limit the use of ‘algorithmic management’ systems at workNews All workplace decisions should have human oversight and be transparent, fair, and safe, MEPs insist
By Emma Woollacott Published
-
Pure DC’s announces 'Europe’s largest standalone hyperscale data center lease' in Amsterdam — but who is the mystery customer?News The company is now constructing a 78MW campus in Westpoort, Amsterdam
By Emma Woollacott Published
-
Cloud security teams are in turmoil as attack surfaces expand at an alarming rateNews Cloud security teams are scrambling to keep pace with expanding attack surfaces, new research from Palo Alto Networks shows, largely due to the rapid adoption of enterprise AI solutions.
By Emma Woollacott Published
