Rapid7 vs Log360

Last Updated:

Our analysts compared Rapid7 vs Log360 based on data from our 400+ point analysis of SIEM Tools, user reviews and our own crowdsourced data from our free software selection platform.

Rapid7 Software Tool

Product Basics

Rapid7 is a comprehensive cybersecurity solution known for its vulnerability management and incident detection capabilities. It caters to a broad audience, from small businesses to large enterprises. Users commend Rapid7 for its "robust vulnerability scanning and detection," which aids in identifying potential security threats proactively. The product's strength lies in its user-friendly interface, which enhances accessibility for security professionals. Users appreciate its automation features, such as remediation workflows and customizable reporting, which streamline security operations. However, pricing can be a concern for some, as one user notes, "Rapid7's pricing may be a bit steep for smaller businesses." Compared to competitors, users find Rapid7 to be a solid choice for vulnerability management and appreciate its dynamic capabilities in threat detection and response.


Pros
  • Robust vulnerability scanning
  • User-friendly interface
  • Automation features
  • Customizable reporting
  • Dynamic threat detection
Cons
  • Price may be steep
  • Complexity for beginners
  • Resource-intensive at times
  • Integration challenges
  • Support response time
read more...
Log360 is a comprehensive security information and event management (SIEM) solution designed to enhance an organization's cybersecurity posture. It is particularly well-suited for medium and large enterprises seeking to strengthen their security infrastructure. Log360 offers a range of key features, including log management, threat detection, incident response, and compliance reporting. Users have praised its ability to provide real-time threat intelligence and automated incident response. One user stated, "Log360's real-time threat detection has been instrumental in thwarting potential security breaches." However, some users have noted that the pricing structure may be on the higher side. Despite this, they believe that the investment is justified due to the product's robust capabilities. One user commented, "While the pricing may be a consideration, Log360's comprehensive features make it a valuable investment for our organization." Compared to similar products, users find Log360 to be a top choice, citing its ease of use and strong threat detection capabilities. They appreciate its ability to centralize logs and provide actionable insights, making it a vital tool for maintaining a secure IT environment. Overall, Log360 is favored for its contribution to proactively addressing cybersecurity threats.

Pros

  • Robust threat detection
  • Real-time monitoring
  • Incident response automation
  • Centralized log management
  • Comprehensive compliance reporting

Cons

  • Pricing considerations
  • Complex for small businesses
  • Steep learning curve
  • Resource-intensive
  • Integration challenges
read more...
$52 Monthly
Free Trial is unavailable →
Get a free price quote
Tailored to your specific needs
$99 Monthly
Get a free price quote
Tailored to your specific needs
Small 
i
Medium 
i
Large 
i
Small 
i
Medium 
i
Large 
i
Windows
Mac
Linux
Android
Chromebook
Windows
Mac
Linux
Android
Chromebook
Cloud
On-Premise
Mobile
Cloud
On-Premise
Mobile
we're gathering data
Cisco
IBM
Northrop Grumman
Symantec

Product Assistance

Documentation
In Person
Live Online
Videos
Webinars
Documentation
In Person
Live Online
Videos
Webinars
Email
Phone
Chat
FAQ
Forum
Knowledge Base
24/7 Live Support
Email
Phone
Chat
FAQ
Forum
Knowledge Base
24/7 Live Support

Product Insights

  • Enhanced Security Posture: Rapid7's vulnerability management and incident detection capabilities empower organizations to bolster their security posture. By identifying and mitigating vulnerabilities in real-time, it reduces the risk of cyber threats and data breaches. Users value the ability to proactively address security issues and maintain a robust defense against evolving threats.
  • Efficient Threat Response: Rapid7's dynamic threat detection and response mechanisms enable swift reactions to security incidents. It assists in identifying and mitigating potential threats as they emerge. This agility is crucial for minimizing the impact of security breaches and maintaining business continuity.
  • User-Friendly Interface: The user-friendly interface simplifies the management of complex security processes. This benefit is particularly valuable for security professionals who need to navigate the system efficiently. Users appreciate the ease of use, which streamlines their daily tasks.
  • Customizable Reporting: Rapid7 offers customizable reporting, allowing users to tailor reports to their specific needs. This flexibility enhances communication within the organization, making it easier to convey critical security information to stakeholders and management. It's a valuable tool for demonstrating compliance and the effectiveness of security measures.
  • Automation Features: Automation is a key benefit, as it reduces manual workloads and accelerates security processes. Rapid7 supports remediation workflows, enabling the automatic resolution of identified vulnerabilities. Users find this feature crucial in saving time and resources while maintaining security standards.
  • Scalability and Flexibility: Rapid7 can cater to organizations of various sizes, from small businesses to large enterprises. It scales to meet the evolving needs of users, which is essential as businesses grow and their security requirements change. This scalability ensures that Rapid7 remains a long-term solution for users.
  • Proactive Security Measures: Rapid7 helps organizations adopt a proactive approach to security. It actively identifies vulnerabilities, potential threats, and issues before they can be exploited by malicious actors. Users appreciate this proactive stance in safeguarding their digital assets.
  • Resource Optimization: The platform's optimization of resources is beneficial, as it minimizes unnecessary expenses and helps allocate resources more efficiently. By pinpointing vulnerabilities and automating remediation, Rapid7 helps organizations make the most of their security investments.
  • Comprehensive Security Insights: Rapid7 provides in-depth security insights through its robust reporting and analytics. Users gain a holistic view of their security environment, which is instrumental in making informed decisions and improvements. These insights empower organizations to continuously enhance their security measures.
  • Effective Collaboration: Rapid7 fosters effective collaboration among security teams and across the organization. Its features for sharing knowledge, insights, and reports enhance communication and cooperation. This collaboration results in a more unified and proactive security strategy.
read more...
  • Automate Threat Detection & Response: Save time by automatically compiling data from several platforms like SaaS, IaaS, PaaS, exchange servers, applications and on-premise network devices in a centralized console. Accelerate threat resolution by automating incident response using workflow options.
  • Maximize ROI: Reduce upfront costs with low-cost enterprise-grade services. Minimize investment by leveraging service providers for implementation and quick deployment.
  • Ensure Privileged User Monitoring:  Eliminate the risk of privileged users going rogue by continuously monitoring user activities. Prevent insider attacks with regular reports on suspicious behavior.
  • Strengthen Compliance:: Maintain compliance with regulatory mandates like PCI, GLBA, DSS, HIPAA, FISMA, SOX and ISO 27001. Access audit-related report templates and get alerts to avoid violation risks and fines.
  • Prevent Security Event Threats:  Detect and prevent advanced threats like brute force attacks, privilege escalation and misuse, and data breaches with signature-based MITRE ATT&CK technique, ML-based behavior analytics, and integrated CASB and DLP capabilities.
  • Enhanced Threat Detection: Log360 provides robust threat detection capabilities that enable organizations to identify and respond to security threats in real-time. This benefit ensures proactive security measures and minimizes the risk of breaches.
  • Real-Time Monitoring: Users appreciate Log360's ability to offer real-time monitoring of their IT environments. This ensures that any suspicious activities or anomalies are immediately detected, allowing for swift action.
  • Incident Response Automation: Log360 streamlines incident response through automation. This benefit reduces the response time to security incidents, minimizing potential damage and data breaches.
  • Centralized Log Management: Log360 simplifies log management by centralizing log data from various sources. This centralization offers a comprehensive view of an organization's IT environment, facilitating easier analysis and troubleshooting.
  • Comprehensive Compliance Reporting: Users value Log360's capability to generate compliance reports. This feature aids in meeting regulatory requirements and streamlining compliance processes, ensuring data security and integrity.
read more...
  • Vulnerability Scanning: Rapid7 offers comprehensive vulnerability scanning capabilities, allowing users to identify weaknesses and security gaps in their systems, networks, and applications. It provides a detailed inventory of vulnerabilities, prioritizes them, and offers remediation recommendations, enabling proactive risk mitigation.
  • Incident Detection and Response: Rapid7 excels in detecting and responding to security incidents in real-time. Its robust incident detection system helps users identify and investigate security threats swiftly, while its response features enable them to take immediate action to contain and mitigate incidents effectively.
  • User-Friendly Dashboard: The user interface of Rapid7 is designed for ease of use and quick access to critical security information. The dashboard provides a centralized view of the organization's security posture, making it easy for security professionals to monitor and manage ongoing security operations.
  • Automation Workflows: Automation is a standout feature, allowing users to create workflows that automate repetitive security tasks. Rapid7 streamlines vulnerability remediation, incident response, and reporting, reducing manual effort and ensuring consistent, efficient security processes.
  • Customizable Reporting: Rapid7 enables users to generate customized reports tailored to their specific requirements. This feature simplifies the communication of security insights and compliance status to stakeholders and management. It facilitates data-driven decision-making and aids in demonstrating regulatory compliance.
  • Threat Intelligence: The platform incorporates threat intelligence feeds to enhance its detection capabilities. It provides users with up-to-date information on emerging threats, helping them stay ahead of cyber adversaries and take preemptive action to protect their assets.
  • Cloud Security: Rapid7 offers robust support for securing cloud environments. It extends its capabilities to cloud infrastructure, ensuring that users can maintain a strong security posture in both on-premises and cloud-based systems, addressing the evolving challenges of modern IT environments.
  • Compliance Management: Rapid7 aids users in managing compliance with industry regulations and standards. It provides tools for assessing and demonstrating compliance, making it easier for organizations to meet the necessary security and privacy requirements in their respective industries.
  • Collaboration Tools: Rapid7 promotes effective collaboration within security teams and across departments. It offers features for sharing security insights, knowledge, and reports, enhancing communication and cooperation to build a unified security strategy that encompasses the entire organization.
  • Resource Optimization: The platform optimizes resources by helping users allocate security investments more efficiently. It identifies and prioritizes vulnerabilities, making sure that resources are directed to address the most critical security issues, thereby maximizing the effectiveness of security budgets.
read more...
  • Incident Detection: Detect suspicious activities and malicious incidents with continuous log data monitoring, analysis and reporting. Get incident alerts with a real-time alert feature.
  • Security Analytics:  Spot network threats, intrusions and breaches by analyzing events from servers, network devices, Microsoft Office 365 platforms and exchange servers. Respond to anomalies with interactive dashboards and customized analytics reports.
  • Threat Intelligence: Stay on top of evolving threats with an integrated threat intelligence platform. Get updated information on the latest threats with a TAXII/STIX threat feed processor that retrieves global threat data and maintains a database of malicious IPs.
  • Incident Resolution: Automatically assign teams to security alerts and track the incident resolution progress. Automated workflows ensure the timely implementation of preventive measures against threats.
  • Cloud Monitoring: Continuously monitor and identify threats on cloud-based PaaS and IaaS platforms like Amazon web services, Microsoft Azure and SaaS solutions like Salesforce.
  • Data Security: Discover and prioritize personal and sensitive information throughout your Windows infrastructure with confidential data detection policies. Protect data from breach attempts with file integrity monitoring capabilities.
  • Forensic Analysis: Assess post-attack impact and identify attacking patterns to avoid future threats by analyzing event and log data. Automatically perform forensic analysis and mitigate the possibility of human error or oversight in drilling down data.
  • Event Correlation: Correlate information from various sources like endpoints, servers and intrusion prevention systems into a single console to get a comprehensive idea of the company’s security situation. Customize correlation rules and regulations with a custom rule builder and quickly detect and resolve security incidents.
  • User Entity and Behavior Analytics (UEBA): Identify anomalous activities in the network using analysis reports on even slight changes in user and entity behavioral patterns.
read more...

Product Ranking

#2

among all
SIEM Tools

#4

among all
SIEM Tools

Find out who the leaders are

Analyst Rating Summary

we're gathering data
85
we're gathering data
100
we're gathering data
100
we're gathering data
84
Show More Show More

Analyst Ratings for Functional Requirements Customize This Data Customize This Data

Rapid7
Log360
+ Add Product + Add Product
Dashboards And Reporting Log Collection And Management Platform Capabilities Security Orchestration, Automation And Response (SOAR) Threat Detection, Investigation And Response (TDIR) User And Entity Behavior Analytics (UEBA) 100 100 84 100 80 100 0 25 50 75 100
we're gathering data
N/A
we're gathering data
N/A
we're gathering data
N/A
100%
0%
0%
we're gathering data
N/A
we're gathering data
N/A
we're gathering data
N/A
100%
0%
0%
we're gathering data
N/A
we're gathering data
N/A
we're gathering data
N/A
83%
0%
17%
we're gathering data
N/A
we're gathering data
N/A
we're gathering data
N/A
100%
0%
0%
we're gathering data
N/A
we're gathering data
N/A
we're gathering data
N/A
80%
0%
20%
we're gathering data
N/A
we're gathering data
N/A
we're gathering data
N/A
100%
0%
0%

Analyst Ratings for Technical Requirements Customize This Data Customize This Data

we're gathering data
N/A
we're gathering data
N/A
we're gathering data
N/A
71%
0%
29%
we're gathering data
N/A
we're gathering data
N/A
we're gathering data
N/A
88%
0%
12%

User Sentiment Summary

Great User Sentiment 766 reviews
Excellent User Sentiment 62 reviews
84%
of users recommend this product

Rapid7 has a 'great' User Satisfaction Rating of 84% when considering 766 user reviews from 3 recognized software review sites.

94%
of users recommend this product

Log360 has a 'excellent' User Satisfaction Rating of 94% when considering 62 user reviews from 3 recognized software review sites.

4.0 (10)
4.4 (12)
n/a
4.6 (10)
4.2 (681)
4.8 (40)
4.2 (75)
n/a

Awards

we're gathering data

Log360 stands above the rest by achieving an ‘Excellent’ rating as a User Favorite.

User Favorite Award

Synopsis of User Ratings and Reviews

Comprehensive Security: Users appreciate Rapid7's ability to provide end-to-end security solutions, encompassing vulnerability management, incident detection, and response in one platform, streamlining their security operations.
Effective Threat Detection: Rapid7's robust threat detection mechanisms allow users to identify potential security threats in real-time, enabling them to respond quickly and minimize the impact of incidents.
User-Friendly Interface: Rapid7 offers a user-friendly dashboard that simplifies security management. Users find it intuitive and accessible, reducing the complexity of navigating security processes.
Customizable Reporting: The ability to create customized reports tailored to specific requirements aids users in conveying security insights effectively, supporting compliance, and decision-making.
Resource Optimization: Rapid7 optimizes resources by prioritizing vulnerabilities, ensuring that users can allocate their security investments more efficiently to address the most critical issues.
Show more
Effective Threat Detection: Log360 is highly praised for its robust threat detection capabilities, allowing users to proactively identify and respond to potential security threats in real-time.
Real-Time Monitoring: Users appreciate Log360's ability to provide real-time monitoring of their IT environments, enabling them to detect and respond to suspicious activities promptly.
Incident Response Automation: Log360 streamlines incident response through automation, reducing response times and minimizing the impact of security incidents.
Centralized Log Management: The product's centralized log management feature simplifies log data collection from various sources, offering a comprehensive view of the organization's IT environment for analysis and troubleshooting.
Comprehensive Compliance Reporting: Log360's ability to generate comprehensive compliance reports is highly valued, as it simplifies compliance processes and helps organizations meet regulatory requirements effectively.
Show more
Pricing Concerns: Some users find Rapid7's pricing to be on the higher side, making it less budget-friendly for smaller organizations.
Learning Curve: Users have reported that Rapid7 can have a learning curve, especially for new users, due to its extensive features and capabilities.
Resource Intensity: In certain scenarios, Rapid7's resource requirements can be demanding, impacting system performance and potentially requiring substantial infrastructure resources.
Integration Complexity: Some users have faced challenges when integrating Rapid7 with their existing security tools and systems, which can require additional time and expertise.
Support Response Time: Users have expressed concerns about the response time of Rapid7's customer support in certain situations, indicating that timely assistance can sometimes be a limitation when addressing issues or questions.
Show more
Resource-Intensive: Some users find that Log360 can be resource-intensive, which can pose challenges, especially for smaller organizations with limited hardware and IT resources.
Complex for Small Businesses: Small businesses may struggle with the complexity of Log360, as the feature set and learning curve might be beyond their specific needs and budget constraints.
Steep Learning Curve: Implementing Log360 can present a significant learning curve, and users may require dedicated training and onboarding efforts to make the most of the product.
Integration Challenges: Some users report challenges when trying to integrate Log360 with specific third-party applications and systems, which can disrupt workflows and necessitate additional effort.
Pricing Considerations: Pricing may be a limitation for some organizations, particularly those with budget constraints. Users should carefully consider the investment required to implement Log360.
Show more

User reviews of Rapid7 paint a picture of a versatile cybersecurity platform with notable strengths and a few drawbacks. Users applaud Rapid7 for its comprehensive approach to security, offering features that span vulnerability management, incident detection, and response. This breadth simplifies security operations and minimizes the need for multiple tools. One user stated, "Rapid7 is a one-stop-shop for security; it covers all the bases." However, some users have voiced concerns about the pricing, which they find to be relatively high, potentially limiting its accessibility for smaller businesses. Additionally, the platform may have a learning curve, particularly for new users, given its extensive capabilities. As one user noted, "It took some time to get the hang of it." Rapid7 is praised for its robust threat detection and real-time incident response capabilities, which empower users to proactively identify and mitigate security threats. It's valued for its user-friendly interface, making it accessible for security professionals. Users also appreciate the option to create customized reports, which enhances communication and reporting. Compared to similar products, users see Rapid7 as a powerful, all-in-one solution, but they've reported complexities in integrating it with other security tools. Resource intensity and support response times are also areas of concern for some users, affecting their overall experience. Overall, Rapid7 earns recognition for its comprehensive security features but may require careful consideration of pricing and the learning curve, particularly for new users.

Show more

User reviews of Log360 reveal a generally positive sentiment, highlighting its strengths in centralized log management, real-time threat detection, and ease of use. One user remarked, "Log360 has helped us centralize our logs from all our systems, giving us a complete picture of our security posture. This makes it much easier to identify and investigate potential threats." Another user appreciated the real-time threat detection capabilities, stating, "Log360 has helped us prevent several security incidents by detecting suspicious activity before it could become a major problem." However, some users also mention challenges related to the initial setup and learning curve. One user commented, "Setting up Log360 can be a bit complex for first-time users." Another user noted, "The interface can be a bit overwhelming at first, but there are plenty of resources available to help you get up to speed." Overall, users believe that Log360 offers a powerful and comprehensive SIEM solution at a competitive price. They appreciate its user-friendly interface, extensive features, and cloud-based deployment. One user compared Log360 to other SIEM solutions, saying, "We considered several SIEM solutions, but Log360 offered the best combination of features and price." Another user highlighted Log360's unique cloud-based approach, stating, "We were looking for a SIEM solution that was easy to deploy and maintain, and Log360's cloud-based platform was perfect for us." Based on the user reviews, Log360 is a compelling choice for businesses of all sizes looking for a powerful and user-friendly SIEM solution. Its strengths in centralized log management, real-time threat detection, and ease of use make it a valuable tool for enhancing security posture and mitigating potential risks.

Show more

Screenshots

we're gathering data

Top Alternatives in SIEM Tools


ArcSight ESM

Converged SIEM

Elastic Security

Exabeam

FortiSIEM

Gurucul

IBM QRadar

InsightIDR

Log360

LogRhythm

Microsoft Sentinel

Securonix

Splunk Enterprise Security

Sumo Logic

Trellix Enterprise Security Manager

USM Anywhere

WE DISTILL IT INTO REAL REQUIREMENTS, COMPARISON REPORTS, PRICE GUIDES and more...

Compare products
Comparison Report
Just drag this link to the bookmark bar.
?
Table settings