LogRhythm LR-500-XM review

Compliancy with data protection regulations is not to be taken lightly and LogRhythm offers the means to stay on the right side of the law.

The console opens with the My Personal Dashboard tab, which provides graphical views on virtually any type of log related activity and potential security breach. Events are shown by functions such as operational, security and audit functions and you can decide how device log data events are to be classified.

You can select events and drill down for more information. Select a spike on a graph and the Log/Event Analyser will show you only those related events. The Log Viewer displays raw data and selecting a single event shows more detailed information including metadata.

Forensics tools are accessed from the Investigate screen where query creation is helped along by wizard based routines. You can choose a log source and time period, pick from a list of event types, add filters to fine tune the results and schedule them to run at regular intervals. The LogRhythm Tail feature can be configured to monitor multiple log streams enabling you to run forensics investigations in real time.

Reporting is very good as the LogRhythm Report Center offers a wide range of predefined reports, which can be customised to suit. A key feature is LogRhythm includes all report packages for PCI DSS, HIPAA, SOX, FISMA and GLBA as standard LogLogic, for example, considers them options and charges accordingly.

The latest LogRhythm 4.1 software offers a number of new features and first up is Second Look. When data is collected it is parsed and metadata for various fields is maintained on the appliance. This means original log data can be archived quickly to ensure space on the appliance is put to best use.

Second Look enables archived logs to be imported back into the appliance and additional rules run against them to update their metadata. It's also worth noting that when archived data is restored it goes into a separate database on the appliance and is check-summed to make sure it hasn't been tampered with.

LogRhythm's host based contextualization enables you to follow a set of seemingly unrelated incidents that together could be considered a security breach. For example, this function could be used to monitor a specific user authentication followed by a transfer of a file over a certain size to an external IP address outside normal business hours.

Access controls to log data are extensive with administrators having full access, whilst analyst accounts enables these users to see log data and reports but not administer the appliance. Roles restrict access further as these contain specific devices, groups of devices and log data sources. A good example would be restricting analysts to viewing the Windows security event log on specified systems but not their application log.

For storage management, you have full control over how all log and event information is stored. You can decide at the device, event and rule level whether data should be archived, how long it should be kept on the appliance, when it can be discarded or if it should be kept at all. This flexibility over how log data should be retained enables local storage to be managed more efficiently thus negating the need to upgrade to higher capacity and higher cost hardware platforms.

The comprehensive log monitoring and reporting tools offered by LogRhythm will make it much easier for businesses to tighten security and prove regulatory compliance. The appliance is very easy to deploy and scores highly for value as the price includes all the key standards compliancy report packages.

Verdict

There are a good range of log management solutions on the market so companies don’t really have any excuses for failing to meet data protection regulations. LogRhythm scores over many as it is particularly easy to deploy and use and offers good value as all key compliancy report packages are included in the price.

Chassis: Dell PowerEdge 1950 1U rack CPU: 2.66GHz quad-core Xeon Memory: 4GB 667MHz FB-DIMM Storage: 2 x 300GB Seagate Cheetah 15K.5 SAS drives in RAID-1 RAID: Dell PERC 6/i controller Network: 2 x Gigabit Ethernet Power: 2 x hot-swap supplies OS: Windows Server 2003 R2 (5 CALs) Database: SQL Server 2005 Enterprise (3 CALs) Management: LogRhythm Console utility

Dave Mitchell

Dave is an IT consultant and freelance journalist specialising in hands-on reviews of computer networking products covering all market sectors from small businesses to enterprises. Founder of Binary Testing Ltd – the UK’s premier independent network testing laboratory - Dave has over 45 years of experience in the IT industry.

Dave has produced many thousands of in-depth business networking product reviews from his lab which have been reproduced globally. Writing for ITPro and its sister title, PC Pro, he covers all areas of business IT infrastructure, including servers, storage, network security, data protection, cloud, infrastructure and services.