Solution Overview

SolarWinds Security Event Manager

A SIEM that makes it easy to use logs for security, compliance, and troubleshooting

At A Glance

SolarWinds® Security Event Manager (formerly Log & Event Manager) is a virtual appliance capable of collecting logs and events from almost any network-connected device and then correlating that data for further analysis. The SEM virtual appliance can be deployed in either a VMware ESX or Microsoft Hyper-V virtual environment and can provide insight into security events, as well as help with performance monitoring and compliance management.

Features Overview

  • Real-time event correlation
  • Threat intelligence
  • Active response
  • Advanced search and forensic analysis
  • USB device monitoring
  • IT compliance reporting

Key Features

Real-time event correlation

A lag in detecting and responding to security threats can be costly for businesses of all sizes.

Receive instant notification and quickly remediate threats by processing log data in-memory.

Threat intelligence

IT security threats are dynamic, and attack vectors are ever-changing.

Alert on suspicious security events via a threat intelligence feed that inspects for matches against known bad hosts and other risks to your environment.

Active response

Continuous IT security requires swift action at the first sign of concern.

Mitigate threats instantly with automated actions that block IPs, stop services, disable users, and more.

Advanced search and forensic analysis

Your ability to prove the limited impact of a security incident could save your business from fines, penalties, and even legal action.

See value instantly with built-in defaults, correlation rules, reports, and active responses.

USB device monitoring

USB flash drives pose an ongoing risk to IT security—whether by aiding data leaks or introducing threats to your network.

Gain valuable insight into USB device and file activity while enforcing USB policies.

IT compliance reporting

Demonstrating continuous IT compliance to auditors can be both challenging and time consuming.

Generate compliance reports using hundreds of audit-proven templates and a console that lets you customize reports.

Resources

NetSuite Selects SolarWinds for Global, End-to-End IT Infrastructure Management
NetSuite uses SolarWinds to achieve global, end-to-end operational efficiency. Once SolarWinds products were implemented, NetSuite’s IT Team saw significant improvement in visibility, stability and understanding of their environment.
EasyStreet Case Study
As a cloud service provider, EasyStreet offers a spectrum of services, with SIEM and Log Management as recent additions. EasyStreet helps its customers create a flexible computing infrastructure to improve—and protect—the way they do business. It has built HIPAA-compliant private clouds and is SSAE 16 Type II audited.
United States Postal Service Federal Credit Union
The USPS FCU faces strict regulatory guidelines and annual audits executed by the NCUA, created to interpret and enforce the provisions of the Federal Credit Union Act (FCUA).
Legacy Texas Bank Case Study
LegacyTexas Bank is a full-service community bank serving businesses and families throughout North Texas with 19 branches, 350 employees and over $1.6 billion in assets. Network and information security is absolutely vital, as is compliance with FFIEC and FDIC regulations.
Energy Federal Credit Union
EFCU was using passive log capture technology to track traffic entering and exiting its network by manually examining firewall activity logs.
SolarWinds Overview Brochure
SolarWinds: IT Management That’s Powerful, Affordable, & Easy-to-Use!
Datasheet: SolarWinds Log & Event Manager
SolarWinds Log & Event Manager (LEM) is a powerful and affordable SIEM virtual appliance that provides real-time threat intelligence, security automation and compliance support for the resource-constrained security departments.
Datasheet: VPAT SolarWinds Log & Event Manager
Check out the Voluntary Product Accessibility Template™ summary table for SolarWinds Log & Event Manager.
Cybersecurity in the Federal Government
In December 2014, Market Connections, a leading government market research provider, in conjunction with SolarWinds conducted its second annual blind survey of 200 IT and IT security decision makers in the federal government, military and intelligence communities in an effort to uncover their most critical IT security challenges and to determine how to make potential security threats visible so IT can confront them. Respondents weighed in on top cybersecurity threat sources, obstacles to threat prevention, necessary tools for threat prevention, and their concerns, investment and policies regarding cybersecurity. A key finding was that federal IT pros identified careless and untrained insiders as their greatest source of cybersecurity threats – over malicious external sources such as hackers and terrorists – yet disparately reported that malicious external threat sources maintained priority for threat prevention investment. SolarWinds explored cybersecurity policies, processes and threat prevention tools to address this lack of internal threat visibility.
Continuous Monitoring: Managing the Unpredictable Human Element of Cybersecurity
SolarWinds® partnered with leading government research provider Market Connections to survey 200 federal IT and IT security professionals to find out their top cybersecurity concerns and the obstacles they face when implementing IT security strategies. View the infographic for data on Security Event Detection, Continuous Monitoring Implementation and return on investment, top obstacles and frustrations, and cybersecurity threats and threat sources.
Simplifying PCI Compliance For IT Professionals
This paper gives you an overview of PCI for card-present and card-not-present transactions, as well as an update on EMV card processing. We’ll give you some practical IT and security guidance to help you select vendors for payment processing, and determine if you can self-attest to your implementation. Finally, we include the high-level requirements for a PCI compliance credit card processing program so you can compare your current security program with PCI requirements.
Introduction to Compliance for IT Professionals
This paper is designed to help IT professionals understand and prepare for compliance because most compliance involves IT. Here we’ll outline the basics of the major IT compliance schemes, provide a foundation in compliance programs, and introduce common terminology that IT staff will encounter as they engage with compliance program managers, stakeholders, and auditors.
Simplifying HIPAA compliance for IT professionals
This paper provides information about the Health Insurance Portability and Accountability Act (HIPAA) and offers guidance on how to work with an existing program or how to start your own. A well-designed compliance program can improve overall IT and security efficiency while saving time and energy otherwise spent remediating audit failures/gaps. Electronic records are a cornerstone of modern healthcare delivery, and IT and security professionals need to be aware of how those records are managed and secured.
Case Studies
NetSuite Selects SolarWinds for Global, End-to-End IT Infrastructure Management
NetSuite uses SolarWinds to achieve global, end-to-end operational efficiency. Once SolarWinds products were implemented, NetSuite’s IT Team saw significant improvement in visibility, stability and understanding of their environment.
EasyStreet Case Study
As a cloud service provider, EasyStreet offers a spectrum of services, with SIEM and Log Management as recent additions. EasyStreet helps its customers create a flexible computing infrastructure to improve—and protect—the way they do business. It has built HIPAA-compliant private clouds and is SSAE 16 Type II audited.
United States Postal Service Federal Credit Union
The USPS FCU faces strict regulatory guidelines and annual audits executed by the NCUA, created to interpret and enforce the provisions of the Federal Credit Union Act (FCUA).
Legacy Texas Bank Case Study
LegacyTexas Bank is a full-service community bank serving businesses and families throughout North Texas with 19 branches, 350 employees and over $1.6 billion in assets. Network and information security is absolutely vital, as is compliance with FFIEC and FDIC regulations.
Energy Federal Credit Union
EFCU was using passive log capture technology to track traffic entering and exiting its network by manually examining firewall activity logs.
Data Sheets
SolarWinds Overview Brochure
SolarWinds: IT Management That’s Powerful, Affordable, & Easy-to-Use!
Datasheet: SolarWinds Log & Event Manager
SolarWinds Log & Event Manager (LEM) is a powerful and affordable SIEM virtual appliance that provides real-time threat intelligence, security automation and compliance support for the resource-constrained security departments.
Datasheet: VPAT SolarWinds Log & Event Manager
Check out the Voluntary Product Accessibility Template™ summary table for SolarWinds Log & Event Manager.
Infographics
Cybersecurity in the Federal Government
In December 2014, Market Connections, a leading government market research provider, in conjunction with SolarWinds conducted its second annual blind survey of 200 IT and IT security decision makers in the federal government, military and intelligence communities in an effort to uncover their most critical IT security challenges and to determine how to make potential security threats visible so IT can confront them. Respondents weighed in on top cybersecurity threat sources, obstacles to threat prevention, necessary tools for threat prevention, and their concerns, investment and policies regarding cybersecurity. A key finding was that federal IT pros identified careless and untrained insiders as their greatest source of cybersecurity threats – over malicious external sources such as hackers and terrorists – yet disparately reported that malicious external threat sources maintained priority for threat prevention investment. SolarWinds explored cybersecurity policies, processes and threat prevention tools to address this lack of internal threat visibility.
Continuous Monitoring: Managing the Unpredictable Human Element of Cybersecurity
SolarWinds® partnered with leading government research provider Market Connections to survey 200 federal IT and IT security professionals to find out their top cybersecurity concerns and the obstacles they face when implementing IT security strategies. View the infographic for data on Security Event Detection, Continuous Monitoring Implementation and return on investment, top obstacles and frustrations, and cybersecurity threats and threat sources.
White Papers
Simplifying PCI Compliance For IT Professionals
This paper gives you an overview of PCI for card-present and card-not-present transactions, as well as an update on EMV card processing. We’ll give you some practical IT and security guidance to help you select vendors for payment processing, and determine if you can self-attest to your implementation. Finally, we include the high-level requirements for a PCI compliance credit card processing program so you can compare your current security program with PCI requirements.
Introduction to Compliance for IT Professionals
This paper is designed to help IT professionals understand and prepare for compliance because most compliance involves IT. Here we’ll outline the basics of the major IT compliance schemes, provide a foundation in compliance programs, and introduce common terminology that IT staff will encounter as they engage with compliance program managers, stakeholders, and auditors.
Simplifying HIPAA compliance for IT professionals
This paper provides information about the Health Insurance Portability and Accountability Act (HIPAA) and offers guidance on how to work with an existing program or how to start your own. A well-designed compliance program can improve overall IT and security efficiency while saving time and energy otherwise spent remediating audit failures/gaps. Electronic records are a cornerstone of modern healthcare delivery, and IT and security professionals need to be aware of how those records are managed and secured.