Log & Event Manager

Log management software for security, compliance, and troubleshooting

https://play.vidyard.com/VtVhHqGL5EQLnTSakKEzHN.jpg

 

Starts at $4,495

Try it now.

Get your free, fully functional 30-day trial.

SolarWinds is trusted by 250,000 customers in 170 countries

Key Features

  • Features Overview
  • Fast and easy compliance reporting
  • Real-time event correlation
  • Real-time remediation
  • Advanced search and forensic analysis
  • File integrity monitoring
  • USB device monitoring
  • Features Overview

    Improve security and compliance with easy-to-use, affordable log management software.

    Detect suspicious activity
    Eliminate threats faster with instantaneous detection of suspicious activity and automated responses.
    Mitigate security threats
    Conduct security event investigations and forensics for mitigation and compliance.
    Achieve auditable compliance
    Demonstrate compliance with audit-proven reporting for HIPAA, PCI DSS, SOX, and more.
    Maintain continuous security
    Improve security measures with LEM, a hardened virtual appliance with data encryption in transit and at rest, SSO/smart card integration, and more.
  • Fast and easy compliance reporting

    Achieving auditable compliance across industry-specific IT regulatory frameworks is no easy task.

    Streamline compliance with out-of-the-box reporting for HIPAA, PCI DSS, SOX, ISO, NCUA, FISMA, FERPA, GLBA, NERC CIP, GPG13, DISA STIG, and more.

    /-/media/solarwinds/swdcv2/licensed-products/log-event-manager/images/product-screenshots/lem-compliance-reports-list.ashx
  • Real-time event correlation

    A lag in the ability to detect and respond to a security threats can be costly for businesses of all sizes.

    In memory, cross platform event processing for instant notification and remediation without waiting on data queries.

    /-/media/solarwinds/swdcv2/licensed-products/log-event-manager/images/product-screenshots/lem-rule-creation-dashboard.ashx
  • Real-time remediation

    The effectiveness of your security initiatives is largely dependent on your ability to quickly respond to security threats.

    Mitigate issues in real-time with active responses that will block IPs, change privileges, disable accounts, block USB devices, and kill applications.

    https://play.vidyard.com/cSVUQtVrWKXHfJQa88Sa8i.jpg
  • Advanced search and forensic analysis

    Your ability to prove the limited impact of a security incident could save your business from fines, penalties, and even legal action.

    Dig deep into security data to investigate incidents for remediation or audit reporting purposes.

    /-/media/solarwinds/swdcv2/licensed-products/log-event-manager/images/product-screenshots/lem-ndepth-dashboard.ashx
  • File integrity monitoring

    File modifications, deletions, and permission changes could be the sign of something worse.

    Monitor and alert on registry, file, and folder activity to detect suspicious and malicious behavior.

    /-/media/solarwinds/swdcv2/licensed-products/log-event-manager/images/product-screenshots/lem-user-file-changes.ashx
  • USB device monitoring

    USB flash drives pose an ongoing risk to IT security—whether it's aiding data leaks or introducing threats to your network.

    Gain valuable insight into USB device and file activity while enforcing USB policies with USB Analyzer.

    /-/media/solarwinds/swdcv2/licensed-products/log-event-manager/images/product-screenshots/lem-usb-defender.ashx
Next Feature:
See More Features +
See Less Features -

Key Features

Features Overview Improve security and compliance with easy-to-use, affordable log management software.
Fast and easy compliance reporting
Achieving auditable compliance across industry-specific IT regulatory frameworks is no easy task. Streamline compliance with out-of-the-box reporting for HIPAA, PCI DSS, SOX, ISO, NCUA, FISMA, FERPA, GLBA, NERC CIP, GPG13, DISA STIG, and more. /-/media/solarwinds/swdcv2/licensed-products/log-event-manager/images/product-screenshots/lem-compliance-reports-list.ashx
Close Feature
Real-time event correlation
A lag in the ability to detect and respond to a security threats can be costly for businesses of all sizes. In memory, cross platform event processing for instant notification and remediation without waiting on data queries. /-/media/solarwinds/swdcv2/licensed-products/log-event-manager/images/product-screenshots/lem-rule-creation-dashboard.ashx
Close Feature
Real-time remediation
The effectiveness of your security initiatives is largely dependent on your ability to quickly respond to security threats. Mitigate issues in real-time with active responses that will block IPs, change privileges, disable accounts, block USB devices, and kill applications. https://play.vidyard.com/cSVUQtVrWKXHfJQa88Sa8i.jpg
Close Feature
Advanced search and forensic analysis
Your ability to prove the limited impact of a security incident could save your business from fines, penalties, and even legal action. Dig deep into security data to investigate incidents for remediation or audit reporting purposes. /-/media/solarwinds/swdcv2/licensed-products/log-event-manager/images/product-screenshots/lem-ndepth-dashboard.ashx
Close Feature
File integrity monitoring
File modifications, deletions, and permission changes could be the sign of something worse. Monitor and alert on registry, file, and folder activity to detect suspicious and malicious behavior. /-/media/solarwinds/swdcv2/licensed-products/log-event-manager/images/product-screenshots/lem-user-file-changes.ashx
Close Feature
USB device monitoring
USB flash drives pose an ongoing risk to IT security—whether it's aiding data leaks or introducing threats to your network. Gain valuable insight into USB device and file activity while enforcing USB policies with USB Analyzer. /-/media/solarwinds/swdcv2/licensed-products/log-event-manager/images/product-screenshots/lem-usb-defender.ashx
Close Feature

Log & Event Manager is an industry favorite. Hands down.

Breaking rules. Nabbing accolades.

Questions, meet answers.

  • Can LEM provide value out of the box?
  • How is LEM priced?
  • How is LEM deployed?
  • Do you offer training?
  • Do you offer technical support?
  • Is maintenance included?
See More See Less
  • Can LEM provide value out of the box?

    Yes, it can! And in more ways than one!

    LEM is capable of pulling log data from over 1,200 systems, applications, and network devices right out of the box. It also comes with pre-built, ready-to-use rules, alerts, dashboards, and reports that can easily be turned on and used as is or customized for your specific security or compliance needs.

    https://play.vidyard.com/VtVhHqGL5EQLnTSakKEzHN.jpg
  • How is LEM priced?

    Affordable, tiered pricing, and specialized Windows® Workstations pricing.

    LEM is priced by the node starting at 30 nodes for $4995. In addition to being one of the most competitively priced solutions on the market, customers can receive additional savings using our specialized Windows Workstation pricing.

  • How is LEM deployed?

    On a hardened virtual appliance with additional security included.

    LEM is implemented as a virtual appliance, a ready-made virtual machine image you can run on VMware® ESX® or Microsoft Windows Hyper-V®.

  • Do you offer training?

    Absolutely! We’re here to help.

    Our Success Center offers a variety of resources to help you get started using LEM. From in-depth documentation to help with installing and configuring, to a library of training videos and regularly scheduled LEM 101 classes, we have everything you need to get started and ramp up quickly.

    /-/media/solarwinds/swdcv2/global/images/success-center-home.ashx
  • Do you offer technical support?

    In-house tech support is only a call or click away.

    We offer excellent, in-house technical support from professionals whose goal is to help solve your problems in one phone call. Beyond this, THWACK, our very own user community of IT professionals, serves as an excellent resource to consult and learn from other LEM users.

    THWACK home
  • Is maintenance included?

    Maintenance is included and free for one year.

    SolarWinds licensed products include a year of maintenance from the date of purchase. Annual maintenance can be purchased at a fraction of the list price. Discover the benefits.

Next Question:

Questions, meet answers.)

Can LEM provide value out of the box?
Yes, it can! And in more ways than one! LEM is capable of pulling log data from over 1,200 systems, applications, and network devices right out of the box. It also comes with pre-built, ready-to-use rules, alerts, dashboards, and reports that can easily be turned on and used as is or customized for your specific security or compliance needs. https://play.vidyard.com/VtVhHqGL5EQLnTSakKEzHN.jpg
Close FAQ
How is LEM priced?
Affordable, tiered pricing, and specialized Windows® Workstations pricing. LEM is priced by the node starting at 30 nodes for $4995. In addition to being one of the most competitively priced solutions on the market, customers can receive additional savings using our specialized Windows Workstation pricing.
Close FAQ
How is LEM deployed?
On a hardened virtual appliance with additional security included. LEM is implemented as a virtual appliance, a ready-made virtual machine image you can run on VMware® ESX® or Microsoft Windows Hyper-V®.
Close FAQ
Do you offer training?
Absolutely! We’re here to help. Our Success Center offers a variety of resources to help you get started using LEM. From in-depth documentation to help with installing and configuring, to a library of training videos and regularly scheduled LEM 101 classes, we have everything you need to get started and ramp up quickly. /-/media/solarwinds/swdcv2/global/images/success-center-home.ashx
Close FAQ
Do you offer technical support?
In-house tech support is only a call or click away. We offer excellent, in-house technical support from professionals whose goal is to help solve your problems in one phone call. Beyond this, THWACK, our very own user community of IT professionals, serves as an excellent resource to consult and learn from other LEM users. THWACK home
Close FAQ
Is maintenance included?
Maintenance is included and free for one year. SolarWinds licensed products include a year of maintenance from the date of purchase. Annual maintenance can be purchased at a fraction of the list price. Discover the benefits.
Close FAQ
See More See Less

Try It Out for 30 Days

Fully functional, free trial DOWNLOAD FREE TRIAL EMAIL LINK TO FREE TRIAL
Let's Talk it Over.
Contact our team. Anytime.
866.530.8100
Get a Quote Buy Now
What is log management?
definition
Log management involves the aggregation, parsing, and indexing of log files from a variety of sources including network devices, security devices, applications, operating systems, and more. The primary drivers of the collection and analysis of logs are IT security, improving IT and networking efficiency, and meeting and maintaining regulatory IT compliance.

Select a license

LEM30

SolarWinds Log & Event Manager LEM30 (up to 30 nodes)

$4,495

LEM50

SolarWinds Log & Event Manager LEM50 (up to 50 nodes)

$7,485

LEM100

SolarWinds Log & Event Manager LEM100 (up to 100 nodes)

$12,995

LEM250

SolarWinds Log & Event Manager LEM250 (up to 250 nodes)

$28,075

LEM500

SolarWinds Log & Event Manager LEM500 (up to 500 nodes)

$40,035

LEM650

SolarWinds Log & Event Manager LEM650 (up to 650 nodes)

$47,245

LEM800

SolarWinds Log & Event Manager LEM800 (up to 800 nodes)

$54,075

LEM1000

SolarWinds Log & Event ManagerLEM1000 (up to 1000 nodes)

$64,795

LEM1500

SolarWinds Log & Event Manager LEM1500 (up to 1500 nodes)

$77,755

LEM2500

SolarWinds Log & Event Manager LEM2500 (up to 2500 nodes)

$99,995

{{STATIC CONTENT}}

{{CAPTION_TITLE}}

{{CAPTION_CONTENT}}

{{TITLE}}