צרו קשר
צרו קשר ונחזור אליכם בהקדם

Log & Event Manager

SIEM tools make it easier to use event logs for security, compliance, and troubleshooting

 

Key Features

  • Integrated compliance reporting tools
  • Event-time correlation of security events
  • Automated threat remediation
  • Advanced search and forensic analysis
  • File integrity monitoring
  • USB device monitoring

 

Starts at $4,585


DOWNLOAD FREE TRIAL

Over 3500 resource-constrained security professionals rely on SolarWinds Log & Event Manager (SIEM) for powerful, affordable, and efficient security information and event management. The all-in-one SolarWinds Log & Event Manager combines business tools such as log management, correlation, reporting, file integrity monitoring, user activity monitoring, USB detection and prevention, threat intelligence and active response in a virtual appliance –  that’s easy to deploy, manage, and use.

SolarWInds Log & Event Manager: Dashboard Overview

KEY FEATURES OF SOLARWINDS LOG & EVENT MANAGER

PROACTIVE LOG ANALYSIS

The multitude of distributed systems, applications, and networks in the organisation’s infrastructure  – they all have associated log files. However, this information is useless if the organisation can’t effectively collect and analyse it. SolarWinds Log & Event Manager not only provides real-time log analysis, but also delivers interactive data visualisation and built-in knowledge that automates collecting, normalising, and interpreting logs from a variety of devices and applications. This means users can immediately spot events that are of interest and take action.

REAL-TIME EVENT CORRELATION

Correlating millions of events from organisation’s network, systems, applications, virtual machines, and storage infrastructure can be daunting… unless organisations have SolarWinds Log & Event Manager at their fingertips. With nearly 700 built-in correlation rules, SolarWinds LEM starts delivering visibility right out of the box, eliminating hours of work. Moreover, it creates a very simple correlation rule builder that employs a graphical interface to quickly build custom rules.

AD HOC IT SEARCHSolarWinds Log & Event Manager: Database Maintenance Report

Log & Event Manager’s advanced ad-hoc IT search capability makes it easy to discover issues using a drag-and-drop interface that tracks events instantly. With an intuitive search interface, customers can get immediate insight into activities that would normally go unnoticed.Using a unique Word Cloud, along with treemaps, bubble charts, and histograms, SolarWinds Log & Event Manager offers a fully interactive search environment that enables users to visualise search data and understand how to take action on it. Finally, innovative approach to data aggregation, archiving, and encryption enables users to quickly and securely search terabytes of data.

COMPLIANCE REPORTING

Log & Event Manager makes it easy to generate and schedule compliance reports quickly using over 300 audit-proven templates and a console that enables to customise reports for organisation’s specific compliance needs. Users can even schedule the reports to run on a regular basis. Moreover, reports can be exported in a wide variety of formats. Finally, users can be assured that SolarWinds Log & Event Manager also meets the security monitoring and log management requirements imposed by every major auditing authority.

ACTIVE RESPONSE & THREAT MITIGATION

Log & Event Manager enables organisations to immediately respond to security, operational, and policy driven events. With built-in active responses users can quarantine infected machines, block IP addresses, kill processes, and adjust Active Directory® settings.

USB DETECTION & PREVENTION

USB devices are a nightmare for IT administrators because gigabytes of sensitive data can just walk out through the door. In order to prevent business from data loss,  Log & Event Manager includes unique technology that tracks USB activity identifies unauthorised use or copying of sensitive files. In fact, this  product can notify network admins in real time, disable user account or automatically eject the USB drive.

WHO SHOULD USE LOG & EVENT MANAGER?

Resource-constrained security pros challenged with:

  • Lack of visibility into attacks as well as limited time for staffed monitoring
  • Compliance demands requiring automation or file integrity monitoring
  • Inability to prioritise, manage, and respond to security incidents
  • Slow incident response time
  • Inability to determine the root cause of suspicious activity
  • The need to monitor internal users for acceptable use and insider threats
  • The need to share log and activity data across security, network, applications, and systems
  • Inefficient, inoperable, or costly existing SIEM implementations
     

DOWNLOAD FREE TRIAL

שתף עמוד:
מס' מדרגים: 2  ממוצע: 5
11/12/2018 01:21
מחפשים את השלב הבא בקריירה ?

אנו 'חיים' חדשנות וטכנולוגיה, מכירים היטב את עולם ההיי-טק ואת החברות שבהן דרושים מהנדסים למקצועות ההיי-טק - שלחו לנו קורות חיים, אנחנו כבר נדאג לכל השאר.

צרו קשר
שלח קו"ח
צרו קשר
צרו קשר ונחזור אליכם בהקדם