Product

  • Log and Event Manager

    Resource Type

    Languages

     

    Resources Icon Legend

    New Resource
    Featured Resource

    Log and Event Manager Resources


    You are viewing 143 resources

    Selecting links in the lefthand column enables you to further refine the list of resources shown below.


    It’s pretty straightforward: If you work for a U.S.-based, publicly traded organization, a U.S.-based privately held company poised for IPO, or a subsidiary of a foreign company that is based in the U.S., and you are responsible for the IT... View More

    Date: 18 Oct, 2016 | Registration Required

    The cybersecurity landscape is undoubtedly changing. This coupled with limited budgets, resources, and a shrinking IT talent pool is creating a climate where security incidents involving highly sensitive data are occurring with greater fre... View More

    Date: 26 Aug, 2016 | Registration Required

    As a newly minted IT or security admin in the banking industry, expect to be introduced to a whole host of new IT, security, and compliance requirements.

    Date: 16 Aug, 2016 | Registration Required

    SolarWinds: IT Management That’s Powerful, Affordable, & Easy-to-Use!

    Date: 01 Jun, 2016

    Join SolarWinds for a live Air Force webinar to learn how to leverage a Security Information and Event Management (SIEM) tool to improve security, stay compliant and troubleshoot IT problems. Our solution, Log & Event Manager (LEM), combin... View More

    Date: 31 May, 2016

    This paper gives you an overview of PCI for card-present and card-not-present transactions, as well as an update on EMV card processing. We’ll give you some practical IT and security guidance to help you select vendors for payment processi... View More

    Date: 02 May, 2016 | Registration Required

    This paper is designed to help IT professionals understand and prepare for compliance because most compliance involves IT. Here we’ll outline the basics of the major IT compliance schemes, provide a foundation in compliance programs, and i... View More

    Date: 26 Apr, 2016 | Registration Required

    This whitepaper from Enterprise Management Associates (EMA) discusses the top five components that are at the core of network security and key to getting the job done right.

    Date: 12 Apr, 2016 | Registration Required

    Check out the Voluntary Product Accessibility Template™ summary table for SolarWinds Log & Event Manager.

    Date: 15 Dec, 2015

    SolarWinds has released new versions of our products in the last few months, with more to come. Join us for a live, interactive Federal and National Government webinar to see the latest SolarWinds products and features of most interest to ... View More

    Date: 20 Oct, 2015 | Registration Required

    SolarWinds SIEM threat intelligence feed provides the latest information on known bad IP addresses. This information allows security teams to leverage out of the box rules to alert and take action against any suspicious activity tied to th... View More

    Date: 06 Oct, 2015

    In this video, we discuss how SolarWinds can help government IT organizations meet DISA STIG and NIST FISMA compliance requirements.

    Date: 06 Oct, 2015

    A long time ago, in a galaxy far far away, AV was invented. Then firewalls and IDS and SIEM and NAC and DLP and on and on. With all these products, it seems like a career in information security is really more about managing tools than de... View More

    Date: 06 Oct, 2015 | Registration Required

    A long time ago, in a galaxy far far away, AV was invented. Then firewalls and IDS and SIEM and NAC and DLP and on and on. With all these products, it seems like a career in information security is really more about managing tools than de... View More

    Date: 06 Oct, 2015

    For a complete picture of what’s going on in your network, look beyond the network itself to correlate events in applications, databases, and middleware. Network admins owe it to themselves to learn enough about SIEM to put it to work for ... View More

    Date: 19 Aug, 2015 | Registration Required

    How many times have you heard the phrase “there’s an app for that?” Today, there are more Web applications being created than ever before. Unfortunately, many Web applications often contain vulnerabilities commonly targeted by cyber crimin... View More

    Date: 18 Aug, 2015 | Registration Required

    Group VP of Product Strategy Nikki Jennings shares an overview of the SolarWinds product vision of an application-centric approach to monitoring and troubleshooting across a hybrid IT environment.

    Date: 04 Aug, 2015

    CTO and CIO Joel Dolisy provides a whiteboard explanation of the SolarWinds key areas of technology focus and investment behind the Solarwinds product vision.

    Date: 04 Aug, 2015

    Join SolarWinds security experts as they discuss how the continuous evaluation of controls and procedures used to manage privileged accounts is critical to the security of any organization.

    Date: 28 Jul, 2015 | Registration Required

    Firewalls are a critical part of your security infrastructure, and they should also be a critical part of your security monitoring processes. Firewalls also combine the richness of data with the volume of data, making it easy for the nugge... View More

    Date: 23 Jul, 2015 | Registration Required

    Related Resource Links

    View Resource Map »