- Reporting - we need to do a lot of security monitoring
- It doesn't have a lot of forensics, but we appreciate fact that it has the capability
- The ability to collect a lot of information, as we have 200 users and a lot of log sources
Vice President at a financial services firm with 1,001-5,000 employees
We're able to create customized monitoring reports that extract info from event logs.
What is most valuable?
How has it helped my organization?
The fact we're able to create customized monitoring reports that extract info from event logs, helps us a lot. We used to have ad hoc reports created by IT department, which meant they could manipualte content. if they ever wanted to tamper with output. Now, there's no risk for us to worry about.
What needs improvement?
Lots of concern these days regarding vulnerability, and being able to interface with other tuypes of applications when creating event log. We have lots of other applications to monitor. Logrhythm can extract that info, but some require converting before LogRythem. Windows logs don't need converting, but SQL, & XML do require conversion and monitoring.
What other advice do I have?
You should consult with LogRhythm experts because there are lots of features and customizations, and you need to figure out what's needed for your specific environment, for example, regulatory compliance issues. They do great job of making clear what's needed.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Manager, Enterprise Risk Consulting at a tech company with 1,001-5,000 employees
HP ArcSight vs. IBM QRadar vs. McAfee Nitro vs. Splunk vs. RSA Security vs. LogRhythm
We at Infosecnirvana.com have done several posts on SIEM. After the Dummies Guide on SIEM, we are following it up with a SIEM Product Comparison – 101 deck. So, here it is for your viewing pleasure. Let me know what you think by posting your comments below. The key products compared here are based on Gartner Magic Q which is what Organizations typically use to select SIEM vendors. The Vendors mentioned here in the deck are :
1. HP ArcSight
2. McAfee Nitro
3. IBM QRadar
4. Splunk SIEM
5. RSA Security Analytic
6. LogRhythm.
SIEM Technology Space
SIEM market analysis of the last 3 years suggest:
HPArcSight
The ArcSight Enterprise Threat and Risk Management (ETRM) Platform is an integrated set of products for collecting, analysing, and managing enterprise Security Event information.
- ArcSight Enterprise Security Manager (ESM): Correlation and analysis engine used to identify security threat in real-time& virtual environments
- ArcSight Logger: Log storage and Search solution
- ArcSight IdentityView: User Identity tracking/User activity monitoring
- ArcSight Connectors: For data collection from a variety of data sources
- ArcSight Auditor Applications: Automated continuous controls monitoring for both mobile
Strengths | Weaknesses |
Extensive Log collection support for commercial IT products & applications | Complex deployment & configuration |
Advanced support for Threat Management, Fraud Management & Behavior Analysis | Mostly suited for Medium to Large Scale deployment |
Mature Event Correlation, Categorization & Reporting | Requires skilled resources to manage the solution |
Tight integration with Big data Analytics platform like Hadoop | Steep learning curve for Analysts & Operators |
Highly customizable based on organization’s requirements | |
Highly Available & Scalable Architecture supporting Multi-tier & Multi-tenancy |
IBM QRadar
The QRadar Integrated Security Solutions (QRadar) Platform is an integrated set of products for collecting, analysing, and managing enterprise Security Event information.
- QRadar Log Manager – Turn key log management solution for Event log collection & storage
Strengths | Weakness |
Very simple deployment & configuration | Limited customizations capabilities |
Integrated view of the threat environment using Netflow data, IDS/IPS data & Event logs from the environment | Limited Multi-tenancy support |
Behavior & Anomaly Detection capabilities for both Netflow & Log data | Limited capability to perform Advanced Use Case development & analytics |
Suited for small, medium & large enterprises | |
Highly Scalable & Available architecture |
McAfee Nitro
The McAfee Enterprise Security Management (formerly Nitro Security) Platform is an integrated set of products for collecting, analysing, and managing enterprise Security Event information.
- McAfee Enterprise Log Manager – turn key log management solution for Event log collection & storage
- McAfee Event Receiver – collecting log data & native flow data
- McAfee Database Event Monitor – database transaction & Log monitoring
- McAfee Application data Monitor – application layer event monitoring
- McAfee Advanced Correlation Engine – advanced correlation engine for correlating events both historical & real time
Strengths | Weaknesses |
Integrated Application Data monitoring & Deep Packet Inspection | Very basic correlation capabilities when compared with HP & IBM |
Integrated Database monitoring without dependence on native audit functions | Limitations in user interface when it concerns navigation |
High event collection rate suited for very large scale deployment | Requires a lot of agent installs for Application & database monitoring thereby increasing management complexity |
Efficient query performance in spite of high event collection rate | No Big Data Analytics capability |
Limited customization capabilities | |
Limited support for multi-tier & multi-tenancy architecture |
Splunk
Splunk Enterprise is an integrated set of products that provide Log Collection, management & reporting capabilities using
- Splunk Indexer – used to collect and index logs from IT environment
- Splunk Search Heads – used to search & report on IT logs
- Splunk App for Enterprise Security - used to collect external threat intelligence feeds, parse log sources and provide basic analytics for session monitoring (VPN, Netflow etc.)
Strengths | Weakness |
Extensive Log collection capabilities across the IT environment | Pre-SIEM solution with very limited correlation capabilities |
Log search is highly intuitive – like Google search | Even though easy to deploy, increasingly difficult to configure for SIEM related functions |
Flexible dash boarding & analytics capability improves Log visualization capabilities | |
Built-in support for external threat intelligence feeds both open source & commercial | |
“App Store” based architecture allowing development of Splunk Plugins to suit monitoring & analytics requirements |
RSA Security
RSA Security Analytics is an integrated set of products that provide Network Forensics, Log Collection, management & reporting capabilities using
-
Capture Infrastructure
- RSA Security Analytics Decoder – Real time capture of Network Packet and log data with Analysis and filtering capabilities
- RSA Security Analytics Concentrator – Aggregates metadata from the Decoder
- RSA Security Analytics Broker Server – For reporting, management and administration of capture data
-
Analysis & Retention Infrastructure
- Event Stream Analysis – Correlation Engine
- Archiver – Long term retention, storage, security & compliance reporting
- RSA Security Analytics Warehouse – Big Data Infrastructure for Advanced Analytics
Strengths | Weakness |
Great Analytics using Event Log Data & Network Packet Capture | New Product release from RSA, hence advanced Security correlation support is poor |
Network forensics, Big Data (Parallel Computing) are cornerstones in SIEM world | Security Analytics Warehouse is a new capability with very little real world use cases |
Tightly Integrates with RSA ecosystem for Threat Intelligence, Fraud Detection, Malware Analysis etc. (each requires separate RSA Tools) | Suited only for large enterprises with need for complex deployment and management resources. Poor deployment options for small and midsize customers |
LogRhythm
The LogRhythm SIEM 2.0 Security Intelligence Platform is an integrated set of products for collecting, analysing, and managing enterprise Security Event information.
- Log Manager – high performance, distributed and redundant log collection and management appliance
Strengths | Weakness |
Well balanced log management, reporting, event management, privileged user monitoring and File integrity monitoring capabilities | Suitable for Security event data only, as Operational data sets cause slowing performance for searches and reports |
Fast deployment with minimal configuration because of appliance form factor | No Support for Active Directory integration for Role- Based Access Control |
Quarterly Health Check programs post-deployment offers great After sales-Service experience | Suited best for small and mid size companies with basic security, regulatory compliance and reporting needs. Not scalable for very large deployments. |
A Summary scoring sheet for SIEM Vendors based on their Core capabilities is given below
Capability | RSA Security Analytics | Log Rhythm | Splunk | McAfee Nitro | IBM Qradar | HP ArcSight |
Real-time Security Monitoring | 3.1 | 3.2 | 2.5 | 3.9 | 4.2 | 4.4 |
Threat Intelligence | 3.7 | 2.5 | 3.0 | 2.8 | 3.5 | 4.5 |
Behavior Profiling | 2.5 | 2.3 | 3.0 | 3.0 | 5.0 | 4.0 |
Data & End User Monitoring | 3.6 | 3.5 | 1.7 | 3.6 | 3.5 | 4.0 |
Application Monitoring | 3.8 | 3.5 | 1.8 | 3.7 | 3.3 | 3.8 |
Analytics | 2.5 | 2.5 | 3.8 | 4.5 | 3.5 | 4.0 |
Log Management & Reporting | 3.5 | 3.8 | 3.5 | 3.8 | 3.9 | 4.0 |
Deployment & Support Simplicity | 3.0 | 4.0 | 2.5 | 3.5 | 3.5 | 3.0 |
Total (Weighted Score) | 25.7 | 25.3 | 21.8 | 28.8 | 30.4 | 31.7 |
1.0 = Low level of capability
5.0 = High level of capability
SIEM Vendors – Use Cases Score Card
Use Cases | RSA Security Analytics | Log Rhythm | Splunk | McAfee Nitro | IBM Qradar | HP ArcSight |
Overall Use Cases | 3.2 | 3.2 | 2.7 | 3.6 | 3.8 | 4.0 |
Compliance Use Cases | 3.3 | 3.7 | 3.0 | 3.7 | 3.8 | 3.8 |
Threat Monitoring | 3.1 | 3.1 | 2.9 | 3.8 | 3.7 | 4.0 |
SIEM | 3.2 | 3.4 | 2.8 | 3.6 | 3.8 | 3.9 |
Total (Weighted Score) | 12.8 | 13.4 | 11.4 | 14.7 | 15.1 | 15.7 |
1.0 = Low level of capability
5.0 = High level of capability
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
LogRhythm SIEM
September 2025

Learn what your peers think about LogRhythm SIEM. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
An extremely valuable correlation engine that uses machine learning to identify network issues
Pros and Cons
- "The correlation engine is extremely valuable because it uses machine learning to process information from the central manager and identifies issues in the network."
- "The security playbook could be pre-defined and available to other analysts with similar security issues."
What is our primary use case?
Our company manages the solution as a threat hunting platform for a semi-government client in the Hong Kong insurance industry. We collect logs for video, active directories, antivirus, and firewalls to consolidate them in the solution.
From the central log collector, we build detection policies to identify threats or possible breaches. The solution also serves as a data storage platform to troubleshoot issues and find root causes.
In addition, logs that include performance data are created for devices such as routers and switches to monitor the availability of the office network.
We also perform ongoing maintenance of the solution and all components to ensure everything runs smoothly.
What is most valuable?
The correlation engine is extremely valuable because it uses machine learning to process information from the central manager and identifies issues in the network.
The engine accurately and quickly identifies problem areas as it correlates events from various devices.
Without this engine, logs would have to be built individually for each device.
What needs improvement?
The security playbook could be pre-defined and available to other analysts with similar security issues. Currently, playbooks are individually written for various actions and threats.
It would be faster and easier to react to issues if pre-defined playbooks were accessible to all analysts.
For how long have I used the solution?
I have been using the solution for seventeen years.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
The solution is scalable.
How are customer service and support?
I have escalated issues to technical support and rate the assistance I received an eight out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is complex and I rate it a six out of ten.
What about the implementation team?
We implement the solution for our customers.
Which other solutions did I evaluate?
The solution remains a top choice for our customers because of its performance, indexing rate, and coalition engine speed. Customers trying to use SIEM to collect logs and identify threats require a solution that responds quickly.
The solution's correlation engine is very important because it uses machine learning to automatically collect and analyze quite a bit of data.
What other advice do I have?
When choosing a solution, it is important to determine what you want to achieve instead of how the solution works. Most solutions have a method for collecting logs, relaying information, and identifying issues so selection is more about the speed and accuracy of end results.
I rate the solution an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Principal Consultant at ITSEC Asia
It improves response times and makes it easier for us to analyze threats
Pros and Cons
- "LogRhythm NextGen SIEM covers all our primary security analysis needs. It makes it easier for us to analyze threats and improves our response times. It's a versatile platform that performs queries fast compared to other SIEM solutions."
- "The reporting on the dashboard should be improved from a management perspective. It would be helpful if they adjusted the colors and the presentation to make things clearer and easier to read."
What is our primary use case?
LogRhythm is a cybersecurity solution. It's used for detection, lateral movement or initial access.
How has it helped my organization?
LogRhythm NextGen SIEM covers all our primary security analysis needs. It makes it easier for us to analyze threats and improves our response times. It's a versatile platform that performs queries fast compared to other SIEM solutions.
What is most valuable?
LogRhythm's dashboard can link to many other kinds of information.
What needs improvement?
The reporting on the dashboard should be improved from a management perspective. It would be helpful if they adjusted the colors and the presentation to make things clearer and easier to read.
For how long have I used the solution?
I used the product for the first time last year, and we deployed it for one of our clients about five months ago.
What do I think about the stability of the solution?
LogRhythm's performance is average. We don't have many issues. There are a few at the moment, but I think it's because the message per second is above the design. If we reduce that, the solution will perform well
How are customer service and support?
We haven't had any issues with support so far. It's okay.
How was the initial setup?
Setting up LogRhythm SIEM is complex. Everything is complicated — the activity, integration, and analysis.
What other advice do I have?
I rate LogRhythm NextGen SIEM nine out of 10. People should consider LogRhythm. Take a close look and try it. It's one of the best SIEM solutions in the world.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Team Lead - Network and Security at Connex Information Technologies
A user-friendly and straightforward solution with good technical support
Pros and Cons
- "I would rate the product a ten out of ten. The solution is very user-friendly and straightforward. The tool's report customization is interesting."
- "The software needs to work on its pricing."
What needs improvement?
The software needs to work on its pricing.
For how long have I used the solution?
I have been using the tool for five years.
What do I think about the stability of the solution?
The product is very stable. I would rate its stability a nine out of ten.
What do I think about the scalability of the solution?
I would rate the tool's scalability a ten out of ten.
How are customer service and support?
The tool's support is good. They support us 24/7.
How would you rate customer service and support?
Positive
How was the initial setup?
The tool's setup is very straightforward. I would rate the tool's setup a ten out of ten. The tool's deployment depends on the use cases, environment, etc. The tool's deployment takes one month to complete.
What's my experience with pricing, setup cost, and licensing?
I would rate the tool's pricing around eight out of ten.
What other advice do I have?
I would rate the product a ten out of ten. The solution is very user-friendly and straightforward. The tool's report customization is interesting.
Disclosure: My company has a business relationship with this vendor other than being a customer.
Consultant at a tech services company with 11-50 employees
User-friendly security solution
Pros and Cons
- "NextGen SIEM's most valuable feature is its user-friendliness."
- "NextGen SIEM's integration with other software is good but could be improved."
What is our primary use case?
NextGen SIEM is primarily used by the SOC team to detect attacks.
What is most valuable?
NextGen SIEM's most valuable feature is its user-friendliness.
What needs improvement?
NextGen SIEM's integration with other software is good but could be improved.
For how long have I used the solution?
I've been working with LogRhythm NextGen SIEM for three years.
What do I think about the stability of the solution?
NextGen SIEM is stable.
How was the initial setup?
The initial setup was straightforward.
What other advice do I have?
I would recommend NextGen SIEM to those considering implementing it and would rate it eight out of ten.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer.
SOC Analyst
Great dashboards at a competitive price
Pros and Cons
- "NextGen SIEM's best feature is how it presents logs."
- "NextGen SIEM has separate rules for AI, advanced intelligence, and MP rules - it would be better to have a centralized way to write the rules and create alarms."
What is most valuable?
NextGen SIEM's best feature is how it presents logs. For example, the dashboard view is detachable from other things.
What needs improvement?
NextGen SIEM has separate rules for AI, advanced intelligence, and MP rules - it would be better to have a centralized way to write the rules and create alarms. In the next release, I would like to see the network hierarchy diagram that QRadar offers.
For how long have I used the solution?
I've been using LogRhythm NextGen SIEM for one year.
What do I think about the stability of the solution?
NextGen SIEM's performance is quite good.
What do I think about the scalability of the solution?
NextGen SIEM is easy to scale.
Which solution did I use previously and why did I switch?
I previously used QRadar SIEM.
How was the initial setup?
The initial setup was simple, and it took two days to deploy.
What's my experience with pricing, setup cost, and licensing?
NextGen SIEM's pricing is moderate. There are additional costs for different applications.
What other advice do I have?
I would recommend NextGen SIEM to other users as it is a leading solution with new features at a better price than competitors like Splunk and QRadar.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. partners

Buyer's Guide
Download our free LogRhythm SIEM Report and get advice and tips from experienced pros
sharing their opinions.
Updated: September 2025
Popular Comparisons
CrowdStrike Falcon
Dynatrace
Datadog
Microsoft Sentinel
Splunk Enterprise Security
IBM Security QRadar
Elastic Security
Grafana Loki
Graylog Enterprise
Security Onion
Rapid7 InsightIDR
Fortinet FortiSIEM
Amazon CloudWatch
Buyer's Guide
Download our free LogRhythm SIEM Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Between AlienVault and LogRhythm, which solution is suitable for Banks in Gulf Region
- IBM QRadar is rated above competitors (McAfee, Splunk, LogRhythm) in Gartner's 2020 Magic Quandrant. Agree/Disagree?
- Does LogRhythm NextGen SIEM offer good security?
- What Solution for SIEM is Best To Be NIST 800-171 Compliant?
- When evaluating Security Information and Event Management (SIEM), what aspect do you think is the most important feature to look for?
- What are the main differences between Nessus and Arcsight?
- What's The Best Way to Trial SIEM Solutions?
- Which is the best SIEM solution for a government organization?
- What is the difference between IT event correlation and aggregation?
- What Is SIEM Used For?
Cost/License should also be part of the criteria, because the capabilities of these solutions depends on how much EPS it is allowed to process. A lot of "events" goes down the drain if its beyond the EPS that customer license so therefore giving it a incomplete view of the network. Some remarketer of these solutions have crimped their proposal just to make a sale. Just my 2 cents.