With Security Event Manager you can easily:

  1. Log all network device activities in a central location

    Secure your network from potential threats and keep track of all device logs in a central location.

  2. Track and analyze suspicious network events

    Use built-in and customizable real-time event correlation rules to detect and respond to suspicious network activities.

  3. Simplify router and firewall security auditing and compliance

    Generate periodic router and firewall audit reports, and demonstrate compliance with out-of-the-box templates.

Mehr anzeigen
Weniger anzeigen

1 Log all network device activities in a central location


1 Log all network device activities in a central location

SolarWinds® Security Event Manager supports hundreds of multi-vendor routers, switches, IDS/IPS, and firewalls, and collects their logs and events in a central location. Network security events that get logged include connections permitted/denied, user activity, bandwidth usage, protocol usage, inbound/outbound traffic. Simply add the network node you need to monitor to the Node Health widget under the Ops Center. Use the syslog node option after clicking Add Node on the Node Health widget. Enter the IP address and select the device vendor from the drop-down list.
Learn more

2 Track and analyze suspicious network events


2 Track and analyze suspicious network events

The effectiveness of a core network device is based on the rules defined in it. Security Event Manager includes several built-in rules under the Build section for multiple correlations in real-time. You can choose from predefined rules, customize them, or create a new one. You are alerted in real-time based on your rule configurations for ICMP/IP traffic, malware, asymmetric routing, IPsec failure, anonymous web traffic, and so on. You can also monitor user activity on critical routers/switches/firewalls to detect privileged account abuse, unauthorized configuration changes, and failed login attempts.
Learn more

3 Simplify router and firewall security auditing and compliance


3 Simplify router and firewall security auditing and compliance

Organizations and businesses outline security policies and define firewall, router, and switch configurations to meet industry compliance regulations and IT security audit requirements. Log & Event Manage's firewall auditing tool includes over 300 built-in audit report templates for standards such as PCI DSS, SOX, HIPAA, DISA STIG, and these are available from the Reports console. To determine the complete firewall security audit trail, you can choose a time window, run a specific report, then use the Select Expert utility to get details about a specific event or user.
Learn more
"Someone made a firewall change without notifying anyone else and broke the site-to-site VPN. I went in just to check and found that someone made a change. I quickly moved it back, and we were up fast. Saved my day!"
IT Manager
Medium Enterprise Computer Service Company

Make firewalls audit-ready; stay compliant and improve security

Security Event Manager

  • Das Erreichen einer nachprüfbaren Compliance unter branchenspezifischen IT-Rahmenbedingungen ist keine leichte Aufgabe.

  • Verzögerungen bei der Erkennung und Reaktion auf eine Sicherheitsbedrohung können für Unternehmen aller Größenordnungen sehr kostspielig werden.

  • Die Wirksamkeit Ihrer Sicherheitsinitiativen hängt größtenteils davon ab, wie schnell Sie auf Sicherheitsbedrohungen reagieren können.

Ab $4,665
TESTVERSION DOWNLOADEN 30 Tage volle Funktionalität
Weitere Informationen
Sprechen Sie uns an.
Wenden Sie sich an unser Team. Wir sind rund um die Uhr für Sie da.
Make your firewalls audit-ready and improve security