SIEM: Log & Event Manager

A SIEM that makes it easy to use logs for security, compliance, and troubleshooting

https://play.vidyard.com/VtVhHqGL5EQLnTSakKEzHN.jpg

 

Starts at $4,495

Try it now.

Get your free, fully functional 30-day trial.

SolarWinds is trusted by 250,000 customers in 170 countries

Key Features

  • Features Overview
  • Real-time event correlation
  • Threat intelligence
  • Active response
  • Advanced search and forensic analysis
  • USB device monitoring
  • IT compliance reporting
  • Features Overview

    Improve security and compliance with an easy-to-use, affordable SIEM tool.

    Detect suspicious activity
    Eliminate threats faster with instantaneous detection of suspicious activity and automated responses.
    Mitigate security threats
    Conduct security event investigations and forensics for mitigation and compliance.
    Achieve auditable compliance
    Demonstrate compliance with audit-proven reporting for HIPAA, PCI DSS, SOX, and more.
    Maintain continuous security
    LEM is deployed as a hardened virtual appliance with encryption of data  in transit and at rest, SSO/smart card integration, and more.
  • Real-time event correlation

    A lag in detecting and responding to security threats can be costly for businesses of all sizes.

    Receive instant notification and quickly remediate threats by processing log data in-memory.

    https://play.vidyard.com/AAjXL1ezCfzBVgvXW3QCL7.jpg
  • Threat intelligence

    IT security threats are dynamic, and attack vectors are ever-changing.

    Alert on suspicious security events via a threat intelligence feed that inspects for matches against known bad hosts and other risks to your environment.

    https://play.vidyard.com/cSVUQtVrWKXHfJQa88Sa8i.jpg
  • Active response

    Continuous IT security requires swift action at the first sign of concern.

    Mitigate threats instantly with automated actions that block IPs, stop services, disable users, and more.

    /-/media/solarwinds/swdcv2/licensed-products/log-event-manager/images/product-screenshots/lem-compliance-reports-list.ashx
  • Advanced search and forensic analysis

    Your ability to prove the limited impact of a security incident could save your business from fines, penalties, and even legal action.

    See value instantly with built-in defaults, correlation rules, reports, and active responses.

    /-/media/solarwinds/swdcv2/licensed-products/log-event-manager/images/product-screenshots/lem-ndepth-dashboard.ashx
  • USB device monitoring

    USB flash drives pose an ongoing risk to IT security—whether by aiding data leaks or introducing threats to your network.

    Gain valuable insight into USB device and file activity while enforcing USB policies.

    /-/media/solarwinds/swdcv2/licensed-products/log-event-manager/images/product-screenshots/lem-usb-defender.ashx
  • IT compliance reporting

    Demonstrating continuous IT compliance to auditors can be both challenging and time consuming.

    Streamline compliance with out-of-the-box reporting for HIPAA, PCI DSS, SOX, ISO, NCUA, FISMA, FERPA, GLBA, NERC CIP, GPG13, DISA STIG, and more.

    /-/media/solarwinds/swdcv2/licensed-products/log-event-manager/images/product-screenshots/lem-compliance-reports-list.ashx
Next Feature:
See More Features +
See Less Features -

Key Features

Features Overview Improve security and compliance with an easy-to-use, affordable SIEM tool.
Real-time event correlation
A lag in detecting and responding to security threats can be costly for businesses of all sizes. Receive instant notification and quickly remediate threats by processing log data in-memory. https://play.vidyard.com/AAjXL1ezCfzBVgvXW3QCL7.jpg
Close Feature
Threat intelligence
IT security threats are dynamic, and attack vectors are ever-changing. Alert on suspicious security events via a threat intelligence feed that inspects for matches against known bad hosts and other risks to your environment. https://play.vidyard.com/cSVUQtVrWKXHfJQa88Sa8i.jpg
Close Feature
Active response
Continuous IT security requires swift action at the first sign of concern.

Mitigate threats instantly with automated actions that block IPs, stop services, disable users, and more.

/-/media/solarwinds/swdcv2/licensed-products/log-event-manager/images/product-screenshots/lem-compliance-reports-list.ashx
Close Feature
Advanced search and forensic analysis
Your ability to prove the limited impact of a security incident could save your business from fines, penalties, and even legal action. See value instantly with built-in defaults, correlation rules, reports, and active responses. /-/media/solarwinds/swdcv2/licensed-products/log-event-manager/images/product-screenshots/lem-ndepth-dashboard.ashx
Close Feature
USB device monitoring
USB flash drives pose an ongoing risk to IT security—whether by aiding data leaks or introducing threats to your network.

Gain valuable insight into USB device and file activity while enforcing USB policies.

/-/media/solarwinds/swdcv2/licensed-products/log-event-manager/images/product-screenshots/lem-usb-defender.ashx
Close Feature
IT compliance reporting
Demonstrating continuous IT compliance to auditors can be both challenging and time consuming.

Streamline compliance with out-of-the-box reporting for HIPAA, PCI DSS, SOX, ISO, NCUA, FISMA, FERPA, GLBA, NERC CIP, GPG13, DISA STIG, and more.

/-/media/solarwinds/swdcv2/licensed-products/log-event-manager/images/product-screenshots/lem-compliance-reports-list.ashx
Close Feature

SIEM: Log & Event Manager is an industry favorite. Hands down.

Breaking rules. Nabbing accolades.

Questions, meet answers.

  • Can LEM provide value out of the box?
  • How is LEM priced?
  • How is LEM deployed?
  • Do you offer training?
  • Do you offer technical support?
  • Is maintenance included?
See More See Less
  • Can LEM provide value out of the box?

    Yes, it can! And in more ways than one.

    LEM is capable of pulling log data from over 1,200 systems, applications, and network devices right out of the box. It also comes with pre-built, ready-to-use rules, alerts, dashboards, and reports that can easily be turned on and used as is, or customized for your specific needs.

    https://play.vidyard.com/VtVhHqGL5EQLnTSakKEzHN.jpg
  • How is LEM priced?

    Affordable, tiered pricing, and specialized Windows® Workstations pricing.

    LEM is priced by the node starting at 30 nodes for $4995. In addition to being one of the most competitively priced solutions on the market, customers can receive additional savings using our specialized Windows Workstation pricing.

  • How is LEM deployed?

    On a hardened virtual appliance with additional security included.

    LEM is implemented as a virtual appliance, a ready-made virtual machine image you can run on VMware® ESX® or Microsoft Windows Hyper-V®

  • Do you offer training?

    Absolutely! We’re here to help.

    Our Success Center offers a variety of resources to help you get started using LEM. From in-depth documentation to help with installing and configuring, to a library of training videos and regularly scheduled LEM 101 classes, we have everything you need to get started and ramp up quickly.

    /-/media/solarwinds/swdcv2/global/images/success-center-home.ashx
  • Do you offer technical support?

    In-house tech support is only a call or click away.

    We offer excellent, in-house technical support from professionals whose goal is to help solve your problems in one phone call. Beyond this, THWACK, our very own user community of IT professionals, serves as an excellent resource to consult and learn from other LEM users.

    THWACK home
  • Is maintenance included?

    Maintenance is included and free for one year.

    SolarWinds licensed products include a year of maintenance from the date of purchase. Annual maintenance can be purchased at a fraction of the list price. Discover the benefits.

Next Question:

Questions, meet answers.)

Can LEM provide value out of the box?
Yes, it can! And in more ways than one.

LEM is capable of pulling log data from over 1,200 systems, applications, and network devices right out of the box. It also comes with pre-built, ready-to-use rules, alerts, dashboards, and reports that can easily be turned on and used as is, or customized for your specific needs.

https://play.vidyard.com/VtVhHqGL5EQLnTSakKEzHN.jpg
Close FAQ
How is LEM priced?
Affordable, tiered pricing, and specialized Windows® Workstations pricing. LEM is priced by the node starting at 30 nodes for $4995. In addition to being one of the most competitively priced solutions on the market, customers can receive additional savings using our specialized Windows Workstation pricing.
Close FAQ
How is LEM deployed?
On a hardened virtual appliance with additional security included. LEM is implemented as a virtual appliance, a ready-made virtual machine image you can run on VMware® ESX® or Microsoft Windows Hyper-V®
Close FAQ
Do you offer training?
Absolutely! We’re here to help. Our Success Center offers a variety of resources to help you get started using LEM. From in-depth documentation to help with installing and configuring, to a library of training videos and regularly scheduled LEM 101 classes, we have everything you need to get started and ramp up quickly. /-/media/solarwinds/swdcv2/global/images/success-center-home.ashx
Close FAQ
Do you offer technical support?
In-house tech support is only a call or click away. We offer excellent, in-house technical support from professionals whose goal is to help solve your problems in one phone call. Beyond this, THWACK, our very own user community of IT professionals, serves as an excellent resource to consult and learn from other LEM users. THWACK home
Close FAQ
Is maintenance included?
Maintenance is included and free for one year. SolarWinds licensed products include a year of maintenance from the date of purchase. Annual maintenance can be purchased at a fraction of the list price. Discover the benefits.
Close FAQ
See More See Less

Try It Out for 30 Days

Fully functional, free trial DOWNLOAD FREE TRIAL EMAIL LINK TO FREE TRIAL
Let's Talk it Over.
Contact our team. Anytime.
866.530.8100
Get a Quote Buy Now
What is SIEM security?
definition
SIEM security involves using a security information and event management tool to collect, normalize, analyze, and correlate data from a variety of log sources to provide actionable IT security intelligence to help stop cybersecurity threats.

Select a license

LEM30

SolarWinds Log & Event Manager LEM30 (up to 30 nodes)

$4,495

LEM50

SolarWinds Log & Event Manager LEM50 (up to 50 nodes)

$7,485

LEM100

SolarWinds Log & Event Manager LEM100 (up to 100 nodes)

$12,995

LEM250

SolarWinds Log & Event Manager LEM250 (up to 250 nodes)

$28,075

LEM500

SolarWinds Log & Event Manager LEM500 (up to 500 nodes)

$40,035

LEM650

SolarWinds Log & Event Manager LEM650 (up to 650 nodes)

$47,245

LEM800

SolarWinds Log & Event Manager LEM800 (up to 800 nodes)

$54,075

LEM1000

SolarWinds Log & Event ManagerLEM1000 (up to 1000 nodes)

$64,795

LEM1500

SolarWinds Log & Event Manager LEM1500 (up to 1500 nodes)

$77,755

LEM2500

SolarWinds Log & Event Manager LEM2500 (up to 2500 nodes)

$99,995

{{STATIC CONTENT}}

{{CAPTION_TITLE}}

{{CAPTION_CONTENT}}

{{TITLE}}