SolarWinds Security Event Manager Description

A lightweight, easy-to-use and affordable solution for event management and security information can help you improve your security posture. Security Event Manager (SEM), will provide additional eyes to monitor suspicious activity 24 hours a day and respond in real-time to minimize its impact. With the intuitive UI and out-of-the box content, virtual appliance deployment is possible. You can get valuable data from your logs quickly and with minimal expertise. Audit-proven reports and tools for HIPAA and PCI DSS, SOX, reduce the time required to prepare and prove compliance. Our licensing is based upon the number of log-emitting source, not log volume. This means that you don't have to be selective about which logs you collect to keep costs down.

Pricing

Pricing Starts At:
$3800 one-time fee
Free Trial:
Yes

Integrations

No Integrations at this time

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
SolarWinds
Year Founded:
1999
Headquarters:
United Kingdom
Website:
www.solarwinds.com/security-event-manager

Media

Recommended Products
Red Hat Enterprise Linux on Microsoft Azure Icon
Red Hat Enterprise Linux on Microsoft Azure

Deploy Red Hat Enterprise Linux on Microsoft Azure for a secure, reliable, and scalable cloud environment, fully integrated with Microsoft services.

Red Hat Enterprise Linux (RHEL) on Microsoft Azure provides a secure, reliable, and flexible foundation for your cloud infrastructure. Red Hat Enterprise Linux on Microsoft Azure is ideal for enterprises seeking to enhance their cloud environment with seamless integration, consistent performance, and comprehensive support.

Product Details

Platforms
SaaS
Windows
Type of Training
Documentation
Live Online
Webinars
Customer Support
Phone Support
24/7 Live Support
Online

SolarWinds Security Event Manager Features and Options

SIEM Software

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Log Management Software

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

PCI Compliance Software

Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management

Network Security Software

Access Control
Analytics / Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning