LogRhythm vs ArcSight ESM

Last Updated:

Our analysts compared LogRhythm vs ArcSight ESM based on data from our 400+ point analysis of SIEM Tools, user reviews and our own crowdsourced data from our free software selection platform.

LogRhythm Software Tool

Product Basics

LogRhythm, a robust cybersecurity solution, empowers organizations to fortify their digital defenses. It serves as a comprehensive security information and event management (SIEM) platform, ideal for businesses seeking a resilient shield against cyber threats. Its core features include real-time monitoring, threat intelligence integration, and incident response orchestration. Users applaud its prowess, with one stating, "LogRhythm's real-time monitoring is unparalleled, providing unmatched visibility into our network." However, some limitations exist, such as the initial learning curve and resource-intensive deployment. Pricing varies based on the organization's size and requirements, making it adaptable to diverse budgets. In user feedback, one client emphasized, "LogRhythm outshines competitors like Splunk with its robust threat intelligence integration." This testament underscores its prominence in the cybersecurity domain, making it a top choice for companies seeking cutting-edge protection against evolving threats.

Pros
  • Real-time monitoring
  • Threat intelligence integration
  • Incident response orchestration
  • Comprehensive cybersecurity solution
  • Adaptable pricing options
Cons
  • Initial learning curve
  • Resource-intensive deployment
  • Varied pricing based on needs
  • No visible border
  • Limited to 5 items per list
read more...

ArcSight, a robust software solution from OpenText, specializes in Security Information and Event Management (SIEM). It is designed to help organizations detect, analyze, and respond to security threats in real-time. ArcSight is particularly well-suited for large enterprises and government agencies that require comprehensive security monitoring and incident response capabilities due to its scalability and advanced analytics.

Key benefits of ArcSight include enhanced threat detection, improved compliance reporting, and streamlined security operations. Popular features encompass real-time event correlation, advanced threat intelligence, and extensive log management. Users appreciate its ability to handle large volumes of data and its integration with various security tools, although some note a steep learning curve.

Pricing for ArcSight can vary widely based on factors such as deployment size and specific requirements. For precise pricing details, it is recommended to contact SelectHub for a tailored quote. Overall, ArcSight stands out for its powerful analytics and comprehensive security features, making it a valuable asset for organizations with complex security needs.


Pros
  • Effective threat detection
  • User behavior analytics
  • Comprehensive security
  • Rich data source support
  • Automated incident response
Cons
  • Complex pricing model
  • Steep learning curve
  • Resource-intensive setup
  • High data ingestion rates
  • Not suitable for small businesses
read more...
$2,000 Annually
Get a free price quote
Tailored to your specific needs
Undisclosed
Get a free price quote
Tailored to your specific needs
Small 
i
Medium 
i
Large 
i
Small 
i
Medium 
i
Large 
i
Windows
Mac
Linux
Android
Chromebook
Windows
Mac
Linux
Android
Chromebook
Cloud
On-Premise
Mobile
Cloud
On-Premise
Mobile

Product Assistance

Documentation
In Person
Live Online
Videos
Webinars
Documentation
In Person
Live Online
Videos
Webinars
Email
Phone
Chat
FAQ
Forum
Knowledge Base
24/7 Live Support
Email
Phone
Chat
FAQ
Forum
Knowledge Base
24/7 Live Support

Product Insights

  • Advanced Threat Detection: LogRhythm excels at identifying and mitigating sophisticated threats that may bypass conventional security measures. Its advanced threat detection capabilities ensure that even the most elusive attacks are quickly detected and neutralized.
  • Real-Time Monitoring: One of the standout benefits of LogRhythm is its real-time monitoring feature. This allows organizations to have constant visibility into their network activities, ensuring that any suspicious behavior is promptly addressed.
  • Efficient Incident Response: LogRhythm streamlines incident response by providing automated orchestration and response workflows. This expedites the resolution of security incidents, reducing potential damage and downtime.
  • Comprehensive Compliance Management: LogRhythm assists organizations in meeting regulatory compliance requirements by offering detailed reporting and compliance automation tools. This benefit is particularly valuable for industries with strict data security regulations.
  • Scalability and Adaptability: LogRhythm's scalability allows it to cater to businesses of all sizes. Whether you're an SMB or a large enterprise, LogRhythm can adapt to your security needs and grow with your organization.
  • Threat Intelligence Integration: LogRhythm integrates threat intelligence feeds, enriching its threat detection capabilities. By leveraging the latest threat intelligence data, it enhances its ability to identify and combat emerging threats effectively.
  • User Behavior Analytics: LogRhythm's UBA feature helps organizations identify anomalies in user behavior. It is instrumental in detecting insider threats and preventing data breaches from within the organization.
  • Reduced False Positives: LogRhythm's sophisticated algorithms and machine learning technologies minimize false positives, ensuring that security teams focus on genuine threats rather than noise.
  • Cost-Effective Security: While pricing varies based on the organization's requirements, LogRhythm offers adaptable pricing options, making it a cost-effective choice for businesses looking to invest in robust cybersecurity.
  • Customizable Dashboards and Reporting: LogRhythm provides customizable dashboards and reporting capabilities, allowing organizations to tailor their security monitoring to their specific needs and preferences.
read more...
  • Enhanced Threat Detection: ArcSight's advanced analytics and correlation capabilities enable quicker identification of potential security threats, reducing the time to detect and respond to incidents.
  • Comprehensive Log Management: By aggregating and normalizing logs from various sources, ArcSight provides a unified view of security events, simplifying compliance and audit processes.
  • Scalability: Designed to handle large volumes of data, ArcSight can scale to meet the needs of growing organizations, ensuring consistent performance and reliability.
  • Real-Time Monitoring: Continuous monitoring of network activity allows for immediate detection of anomalies, helping to prevent breaches before they occur.
  • Customizable Dashboards: Tailored dashboards provide security teams with relevant, actionable insights, enhancing their ability to make informed decisions quickly.
  • Automated Response: ArcSight's automation capabilities streamline incident response processes, reducing manual intervention and minimizing the impact of security events.
  • Regulatory Compliance: Built-in compliance reporting tools help organizations meet regulatory requirements such as GDPR, HIPAA, and PCI-DSS, reducing the risk of non-compliance penalties.
  • Integration with Existing Tools: Seamless integration with other security and IT management tools enhances overall security posture by providing a more comprehensive defense strategy.
  • Historical Data Analysis: The ability to analyze historical data aids in identifying trends and patterns, improving future threat detection and prevention strategies.
  • Reduced Operational Costs: By automating routine tasks and improving efficiency, ArcSight helps lower the overall cost of security operations.
read more...
  • Real-Time Monitoring: LogRhythm offers real-time monitoring capabilities, enabling organizations to continuously track network activities and swiftly detect any suspicious behavior. This feature provides crucial visibility into potential security threats as they happen.
  • Incident Response Orchestration: LogRhythm streamlines incident response with automated workflows. It allows security teams to respond to security incidents promptly and effectively, reducing the potential impact of security breaches.
  • Threat Intelligence Integration: LogRhythm integrates threat intelligence feeds, enhancing its threat detection capabilities. By leveraging the latest threat data, it stays up-to-date with emerging threats and bolsters its ability to counteract them.
  • User Behavior Analytics (UBA): The UBA feature is designed to detect anomalies in user behavior. It plays a pivotal role in identifying insider threats and preventing data breaches originating from within the organization.
  • Comprehensive Compliance Management: LogRhythm provides detailed reporting and compliance automation tools to assist organizations in meeting regulatory requirements. This feature is particularly beneficial for industries subject to strict data security regulations.
  • Advanced Threat Detection: LogRhythm excels in identifying and mitigating sophisticated threats, even those that can evade conventional security measures. Its advanced threat detection capabilities are critical for robust cybersecurity.
  • Customizable Dashboards and Reporting: LogRhythm's customizable dashboards and reporting features empower organizations to tailor their security monitoring to their specific needs and preferences.
  • Reduced False Positives: LogRhythm employs sophisticated algorithms and machine learning technologies to minimize false positives, ensuring that security teams focus on genuine threats rather than irrelevant noise.
  • Scalability and Adaptability: LogRhythm's scalability makes it suitable for organizations of varying sizes, from small businesses to large enterprises. It can grow with the organization's evolving security needs.
  • Cost-Effective Security: LogRhythm offers adaptable pricing options, making it a cost-effective choice for businesses seeking comprehensive cybersecurity solutions that fit their budget.
read more...
  • Real-time Threat Detection: ArcSight provides real-time monitoring and analysis of security events, enabling quick identification and response to potential threats.
  • Advanced Correlation Engine: The software uses a sophisticated correlation engine to link disparate security events, helping to uncover complex attack patterns that might otherwise go unnoticed.
  • Scalability: ArcSight is designed to scale from small environments to large, enterprise-level deployments, ensuring consistent performance regardless of the size of the network.
  • Comprehensive Log Management: It offers extensive log collection, storage, and analysis capabilities, supporting a wide range of log formats and sources.
  • Compliance Reporting: ArcSight includes built-in compliance reporting templates for various standards such as PCI-DSS, HIPAA, and GDPR, simplifying the audit process.
  • Integration with Other Security Tools: The platform integrates seamlessly with other security solutions, including firewalls, intrusion detection systems, and endpoint protection tools, enhancing overall security posture.
  • Customizable Dashboards: Users can create personalized dashboards to visualize security data in a way that best suits their needs, providing clear insights into the security landscape.
  • Automated Incident Response: ArcSight supports automated workflows for incident response, reducing the time and effort required to address security incidents.
  • Machine Learning Capabilities: The software leverages machine learning algorithms to improve threat detection accuracy and reduce false positives.
  • Data Enrichment: ArcSight enriches raw security data with contextual information, making it easier to understand and act upon.
  • Role-based Access Control: It provides granular access control, ensuring that users only have access to the data and functionalities relevant to their roles.
  • Threat Intelligence Integration: The platform can incorporate threat intelligence feeds, enhancing its ability to detect and respond to emerging threats.
  • Forensic Analysis: ArcSight offers robust forensic analysis tools, allowing security teams to investigate incidents in depth and understand the full scope of an attack.
  • High Availability: The software is designed for high availability, ensuring continuous monitoring and protection even in the event of hardware failures.
  • Multi-tenancy Support: ArcSight supports multi-tenancy, making it suitable for managed security service providers (MSSPs) and large organizations with multiple departments or subsidiaries.
read more...

Product Ranking

#7

among all
SIEM Tools

#11

among all
SIEM Tools

Find out who the leaders are

Analyst Rating Summary

91
87
100
90
100
95
94
100
Show More Show More
Dashboards and Reporting
Log Collection and Management
Security Orchestration, Automation and Response (SOAR)
User and Entity Behavior Analytics (UEBA)
Platform Capabilities
Platform Capabilities
Security Orchestration, Automation and Response (SOAR)
Log Collection and Management
Security Compliance
Dashboards and Reporting

Analyst Ratings for Functional Requirements Customize This Data Customize This Data

LogRhythm
ArcSight ESM
+ Add Product + Add Product
Dashboards And Reporting Log Collection And Management Platform Capabilities Security Orchestration, Automation And Response (SOAR) Threat Detection, Investigation And Response (TDIR) User And Entity Behavior Analytics (UEBA) 100 100 94 100 80 97 90 95 100 100 60 60 0 25 50 75 100
100%
0%
0%
86%
0%
14%
100%
0%
0%
90%
0%
10%
92%
0%
8%
100%
0%
0%
100%
0%
0%
100%
0%
0%
80%
0%
20%
60%
0%
40%
100%
0%
0%
60%
0%
40%

Analyst Ratings for Technical Requirements Customize This Data Customize This Data

86%
0%
14%
86%
0%
14%
94%
0%
6%
94%
0%
6%

User Sentiment Summary

Great User Sentiment 914 reviews
Great User Sentiment 295 reviews
86%
of users recommend this product

LogRhythm has a 'great' User Satisfaction Rating of 86% when considering 914 user reviews from 4 recognized software review sites.

86%
of users recommend this product

ArcSight ESM has a 'great' User Satisfaction Rating of 86% when considering 295 user reviews from 4 recognized software review sites.

4.1 (142)
3.7 (17)
4.4 (10)
4.1 (12)
4.4 (693)
4.5 (235)
3.8 (69)
3.4 (31)

Awards

we're gathering data

SelectHub research analysts have evaluated ArcSight ESM and concluded it earns best-in-class honors for Platform Capabilities.

Platform Capabilities Award

Synopsis of User Ratings and Reviews

Robust Security: Users appreciate LogRhythm for its strong security capabilities, providing a resilient defense against cyber threats.
Real-Time Monitoring: LogRhythm's real-time monitoring is lauded for its unmatched visibility into network activities, enabling quick threat detection.
Effective Threat Intelligence: Users find value in LogRhythm's integration of threat intelligence feeds, which enhances its ability to identify and combat emerging threats.
Incident Response Automation: The automated incident response workflows streamline resolution, reducing potential damage and downtime.
Compliance Management: LogRhythm's compliance tools and reporting features are praised for helping organizations meet regulatory requirements.
Show more
Comprehensive Security: ArcSight is praised for its comprehensive security capabilities, offering a wide range of features for monitoring, detecting, and responding to security threats effectively.
Real-Time Monitoring: Users appreciate the real-time monitoring and alerting features that help them stay informed about security incidents as they occur, allowing for prompt responses.
Scalability: ArcSight is often commended for its scalability, making it suitable for large organizations with extensive security data and event logs to manage.
Compliance Capabilities: Organizations in regulated industries value ArcSight's compliance reporting features, which simplify the process of demonstrating adherence to regulatory requirements.
Incident Response: Users find the automated incident response workflows valuable in streamlining the identification and mitigation of security incidents, reducing response times.
Show more
Initial Learning Curve: Some users mention that LogRhythm may have a learning curve, especially for those new to the system, due to its advanced features.
Resource-Intensive Deployment: Users find the initial deployment process resource-intensive, requiring significant time and effort for setup and configuration.
Varied Pricing: While LogRhythm offers adaptable pricing, users note that the cost can vary based on the specific requirements of the organization, making it less predictable for budget planning.
No Visible Border: Some users prefer a visible border for the product interface, which LogRhythm lacks.
Limited List Items: In some scenarios, users find the limitation of only being able to include up to 5 items in a list to be restrictive when presenting information.
Show more
Complex Pricing: Users often find ArcSight's pricing model complex and challenging to predict accurately, especially when factors like data ingestion rates influence costs.
Steep Learning Curve: Some users report a steep learning curve when implementing and managing ArcSight due to its advanced features and complexity, which may require dedicated training and expertise.
Resource-Intensive Setup: The initial setup of ArcSight can be resource-intensive, necessitating the availability of hardware, software, and experienced personnel for optimal configuration.
High Data Ingestion Rates: Users note that high data ingestion rates can lead to increased costs, making it essential to monitor and manage data volume effectively to control expenses.
Not Suitable for Small Businesses: ArcSight's advanced features and pricing model are often considered impractical for small businesses with simpler security needs, limiting its suitability.
Show more

User reviews for LogRhythm highlight its strengths in robust security, real-time monitoring, and effective threat intelligence integration. Users commend its ability to provide unmatched visibility into network activities, ensuring quick threat detection. The automated incident response workflows streamline resolution, reducing potential damage and downtime. LogRhythm's compliance tools and reporting features are praised for helping organizations meet regulatory requirements. One user's experience underscores this, stating, "LogRhythm's real-time monitoring is unparalleled, providing unmatched visibility into our network." On the flip side, users have noted certain limitations. Some find an initial learning curve, particularly for those new to the system, due to its advanced features. The deployment process is perceived as resource-intensive, demanding substantial time and effort for setup and configuration. Pricing variability based on specific organizational needs can make budget planning less predictable. Additionally, the absence of a visible border in the product interface may not align with the preferences of some users. Comparatively, LogRhythm is deemed competitive in the cybersecurity market. Users suggest that it outshines competitors like Splunk with its robust threat intelligence integration. However, it's essential to weigh the pros and cons to determine if it aligns with the unique needs of each organization. Overall, LogRhythm is lauded for its ability to offer comprehensive security and compliance solutions while requiring users to navigate some initial complexities.

Show more

Is ArcSight the right choice for your security needs? User reviews from the past year present a mixed bag. While ArcSight is praised for its powerful real-time correlation engine, which provides critical insights from security data, and its extensive integration options, making it a good fit for complex security environments, users also point out some significant drawbacks. A recurring concern is the product's complexity, which translates into a steep learning curve and makes it challenging to deploy and manage, especially for organizations with limited IT resources. For instance, setting up and customizing dashboards can be time-consuming. This complexity often necessitates dedicated training and expertise. Another common gripe is the product's hunger for hardware resources, which can lead to performance issues, especially for organizations dealing with high volumes of security data. While some users applaud its performance, others report slow search functionality, indicating that experience can vary. These factors make ArcSight a good fit for large enterprises with complex security needs and the resources to handle its demands. However, smaller organizations or those with limited IT staff and expertise might find it overwhelming and resource-intensive. They might be better served by a SIEM solution with a shallower learning curve and less demanding hardware requirements.

Show more

Screenshots

we're gathering data

Top Alternatives in SIEM Tools


ArcSight ESM

Converged SIEM

Elastic Security

Exabeam

FortiSIEM

Gurucul

IBM QRadar

InsightIDR

Log360

Microsoft Sentinel

Securonix

Splunk Enterprise Security

Sumo Logic

Trellix Enterprise Security Manager

USM Anywhere

Related Categories

WE DISTILL IT INTO REAL REQUIREMENTS, COMPARISON REPORTS, PRICE GUIDES and more...

Compare products
Comparison Report
Just drag this link to the bookmark bar.
?
Table settings