

LogRhythm SIEM and OpenText Behavioral Signals both compete in the security and data analysis industry. LogRhythm SIEM appears stronger in comprehensive security management, while OpenText Behavioral Signals specializes in behavioral data insights, making it attractive despite a higher price.
Features:LogRhythm SIEM provides real-time threat detection, a centralized log management system, and compliance reporting capabilities. OpenText Behavioral Signals offers advanced behavioral data analysis, customer engagement insights, and machine learning-assisted alerts.
Room for Improvement:LogRhythm SIEM could improve by enhancing its forensic capabilities, expanding cloud integration, and simplifying user interfaces. OpenText Behavioral Signals may benefit from reducing its pricing, offering more flexible deployment options, and expanding its integration with other analytics tools.
Ease of Deployment and Customer Service:LogRhythm SIEM features streamlined deployment processes and excellent customer support, essential for enterprise security applications. OpenText Behavioral Signals offers simple deployment and dedicated support, favoring businesses focusing on behavioral insights.
Pricing and ROI:LogRhythm SIEM offers a stable upfront cost with high ROI in security management efficiencies. OpenText Behavioral Signals involves a higher initial setup cost, but its ROI shines in areas prioritizing behavioral analytics, making it valuable for specific sectors prioritizing data-driven insights.
The technical support is good; we have a separate portal for partners, and since we are paying for the service, they provide a response timeframe based on severity—critical issues are addressed within four hours, medium issues within one day, and non-urgent issues may take a couple of days.
The automated responses and detections of LogRhythm SIEM are much better and faster compared to others.
Customer support is very helpful and effectively solves my problems.
The scalability of LogRhythm SIEM is good enough, warranting an eight out of ten rating.
LogRhythm SIEM is highly scalable as it has modular components allowing me to expand storage, indexing, or other resources as needed.
LogRhythm SIEM is scalable; it can handle about 200 or 500 devices without much difference.
The platform needs regular updates to fix problems encountered with each quarterly patch and version release.
LogRhythm SIEM still needs improvement regarding stability, particularly in environments with heavy data consumption.
If LogRhythm SIEM could make a lightweight version of their solution, that would be quite competitive because some of my customers have a very large need but refuse to go with LogRhythm SIEM due to its complexity and high resource intensity.
I have noticed some problems with parsing errors, event mismatches, and data mismatching, so ensuring accurate parsing and continuous improvement according to device updates are my basic expectations as a detection engineer.
There is currently no way to determine how much data is being consumed in terms of gigabytes, terabytes, or petabytes from particular devices or environments.
The license cost is around $10 per MPS.
I find LogRhythm SIEM affordable, as it is a bit less costly than QRadar.
We have enough budget for cloud deployment, but we choose to keep it on-prem to ensure data privacy; cyberattacks are a concern, but data privacy is the foremost priority due to sensitive government information.
This helps SOC analysts significantly as they can monitor all log sources through a dashboard, quickly identifying which sources haven't reported within their specified timeframes.
The seamless integration for case management, along with a user-friendly dashboard user interface, makes tasks like threat hunting more efficient.
| Product | Mindshare (%) |
|---|---|
| LogRhythm SIEM | 2.5% |
| OpenText Behavioral Signals | 0.9% |
| Other | 96.6% |

| Company Size | Count |
|---|---|
| Small Business | 38 |
| Midsize Enterprise | 39 |
| Large Enterprise | 83 |
LogRhythm SIEM offers advanced threat intelligence, scalable deployment, and streamlined log management. It enhances security posture with AI-driven threat detection and comprehensive monitoring.
LogRhythm SIEM stands out for its AI-driven threat correlation, ease of log aggregation, and robust reporting. Offering real-time visibility and analytics through consistent navigation and dashboards, it integrates with security components for enhanced monitoring and response. Advanced threat intelligence and customizable alerts streamline processes and bolster security. While it faces challenges with log parsing, reporting, and dashboard intuitiveness, plans to enhance cloud integration and transition to Linux are noted.
What are the standout features?In industries like banking and finance, organizations utilize LogRhythm SIEM for centralized log management, security monitoring, and compliance. It helps detect insider threats, analyze server logs, correlate events, and monitor user behaviors. Appreciated for log ingestion and anomaly identification, it ensures robust cybersecurity and incident response by integrating data from multiple sources.
OpenText Behavioral Signals enhances organizational security monitoring with its robust correlation engine and streamlined dashboard, offering customization to suit different environments like airports or banks.
OpenText Behavioral Signals effectively integrates device logs through its strong correlation engine. The platform's customization options enable tailored alerts to match specific use cases, such as airports or banks. Although it needs more frequent updates to stay aligned with global incidents, it provides a centralized dashboard that ensures comprehensive visibility across networks. Users find the interface intuitive, making rule writing and report access easy, aiding in a comprehensive understanding of the network environment.
What are the key features of OpenText Behavioral Signals?In industries like banking and airports, OpenText Behavioral Signals is implemented for gathering global intelligence from the cloud. It notifies organizations about global attacks and updates its correlation engines. These industries utilize the platform for monitoring and analyzing logs from network devices, security log management, and addressing network challenges like link failures and unauthorized login attempts, ensuring better security posture with behavioral analytics and log integration using Unix and Microsoft-based connectors.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.