The Federal Energy Regulatory Commission (FERC) and the North American Electric Reliability Corporation (NERC) require energy companies to comply with the Critical Infrastructure Protection (CIP) mandate. SolarWinds Log & Event Manager (LEM) uncovers FERC / NERC CIP policy violations with real-time log analysis and powerful cross-device event correlation covering your entire infrastructure.
SolarWinds Log & Event Manager (LEM) provides two methods to find potential FERC / NERC CIP compliance violations: for interactive, ad-hoc searches, use the context-aware console, or for finding events of interest automatically, use the rule-based, real-time event correlation engine. Eliminate hours of work with over 700 out-of-the-box event correlation rules, many of which are specific to FERC / NERC CIP regulations.
LEM helps you ensure compliance with Critical Cyber Assets CIP protection requirements using Active Responses to address critical events and shut down security threats automatically and immediately. Automated actions are triggered in real-time using a rule-based event correlation engine executed in memory. Build and trigger Active Responses interactively using the console.
SolarWinds LEM can disable network access on a user’s PC after excessive attempts to access a secure network, or it can immediately eject USB devices when inserted into restricted PCs by using an extensive library of built-in actions. This saves hours wasted writing rules and shortens the deployment ramp.
Built-in Active Responses include:
LEM includes over 300 pre-built “audit-proven” reporting templates. Customize them for internal requirements using the reporting console or use them out of the box to generate reports complying with FERC / NERC CIP regulations.
Log & Event Manager
Lograr el cumplimiento auditable en marcos normativos de TI específicos del sector no es una tarea sencilla.
Un retraso en la capacidad de detectar y responder a una amenaza de seguridad puede ser costoso para las empresas de todos los tamaños.
La eficacia de sus iniciativas de seguridad dependen en gran medida de su habilidad para responder fácilmente a las amenazas de seguridad.