SolarWinds has been named an April 2019 Gartner Peer Insights Customers’ Choice for Security Information and Event Management (SIEM) Software.

Log & Event Manager
SIEM tools make it easier to use event logs for security, compliance, and troubleshooting

Starts at $4,665
fn_vidyard_vPtR37rPnge6b5V7uYnpoo();
https://play.vidyard.com/vPtR37rPnge6b5V7uYnpoo.jpg

Key Features

  • Features Overview
  • Integrated compliance reporting tools
  • Event-time correlation of security events
  • Automated threat remediation
  • Advanced search and forensic analysis
  • File integrity monitoring
  • USB device monitoring
  • Log forwarding
  • Features Overview

    Improve security and compliance with an easy-to-use, affordable SIEM tool.

    Detect suspicious activity
    Identify threats faster with event-time detection of suspicious activity.
    Mitigate security threats
    Conduct security event investigations and forensics for mitigation and compliance with SolarWinds SIEM software.
    Regulatory compliance readiness
    Demonstrate compliance with audit-proven reporting for HIPAA, PCI DSS, SOX, DISA STIG, and more.
    Maintain continuous security
    Improve security measures with SolarWinds® Log & Event Manager (LEM) SIEM tool, a hardened virtual appliance with encryption capabilities for data in transit and at rest, SSO/smart card integration, and more.
  • Integrated compliance reporting tools

    Achieving auditable compliance across industry-specific IT regulatory frameworks is no easy task.

    Helps demonstrate compliance with out-of-the-box reporting for HIPAA, PCI DSS, SOX, ISO, NCUA, FISMA, FERPA, GLBA, NERC CIP, GPG13, DISA STIG, and more included in LEM’s SIEM software.

  • Event-time correlation of security events

    A lag in the ability to detect and respond to a security threat can be costly for businesses of all sizes.

    Our SIEM solution provides in-memory, cross-platform event processing for event-time notification and remediation without waiting on data queries.

  • Automated threat remediation

    The effectiveness of your security initiatives is largely dependent on your ability to quickly respond to security threats.

    Simplify the threat remediation process with automated responses that can block IPs, change privileges, disable accounts, block USB devices, kill applications, and more.

    fn_vidyard_cSVUQtVrWKXHfJQa88Sa8i();
    https://play.vidyard.com/cSVUQtVrWKXHfJQa88Sa8i.jpg
  • Advanced search and forensic analysis

    Your ability to prove the limited impact of a security incident could save your business from potential fines, penalties, and even legal action.

    Dig deep into security data with SIEM capabilities provided by LEM to investigate incidents for remediation or audit reporting purposes.

  • File integrity monitoring

    File modifications, deletions, and permission changes could be the sign of something worse.

    Monitor and be alerted to registry, file, and folder activity to detect suspicious and malicious behavior using LEM’s SIEM capabilities.

  • USB device monitoring

    USB flash drives pose an ongoing risk to IT security—whether it's aiding data leaks or introducing threats to your network.

    Gain valuable insight into USB device and file activity while enforcing USB policies with USB Analyzer.

  • Log forwarding

    Get help expanding your security tool integration with log forwarding capabilities

    Designed to easily forward entire correlated and normalized logs or specific log data to an external source for further analysis.

Next Feature:
See More Features +
See Less Features -

Key Features

Features Overview Improve security and compliance with an easy-to-use, affordable SIEM tool.
Integrated compliance reporting tools

Achieving auditable compliance across industry-specific IT regulatory frameworks is no easy task.

Helps demonstrate compliance with out-of-the-box reporting for HIPAA, PCI DSS, SOX, ISO, NCUA, FISMA, FERPA, GLBA, NERC CIP, GPG13, DISA STIG, and more included in LEM’s SIEM software.
Close Feature
Event-time correlation of security events

A lag in the ability to detect and respond to a security threat can be costly for businesses of all sizes.

Our SIEM solution provides in-memory, cross-platform event processing for event-time notification and remediation without waiting on data queries.
Close Feature
Automated threat remediation

The effectiveness of your security initiatives is largely dependent on your ability to quickly respond to security threats.

Simplify the threat remediation process with automated responses that can block IPs, change privileges, disable accounts, block USB devices, kill applications, and more. https://play.vidyard.com/cSVUQtVrWKXHfJQa88Sa8i.jpg
Close Feature
Advanced search and forensic analysis

Your ability to prove the limited impact of a security incident could save your business from potential fines, penalties, and even legal action.

Dig deep into security data with SIEM capabilities provided by LEM to investigate incidents for remediation or audit reporting purposes.
Close Feature
File integrity monitoring

File modifications, deletions, and permission changes could be the sign of something worse.

Monitor and be alerted to registry, file, and folder activity to detect suspicious and malicious behavior using LEM’s SIEM capabilities.
Close Feature
USB device monitoring

USB flash drives pose an ongoing risk to IT security—whether it's aiding data leaks or introducing threats to your network.

Gain valuable insight into USB device and file activity while enforcing USB policies with USB Analyzer.
Close Feature
Log forwarding

Get help expanding your security tool integration with log forwarding capabilities

Designed to easily forward entire correlated and normalized logs or specific log data to an external source for further analysis.

Close Feature

Our SIEM tool is an industry favorite. Hands down.

Breaking rules. Nabbing accolades.
See More See Less

Get started with our SIEM software

DOWNLOAD FREE TRIAL Fully functional for 30 days
Let’s talk it over.
Contact our team. Anytime.
+1-866-530-8100
SolarWinds is trusted by 275,000+ loyal customers worldwide
What is SIEM?
definition
Security Information & Event Management (SIEM) security involves using SIEM tools to collect, normalize, analyze, and correlate data from a variety of log sources to provide actionable IT security intelligence to help stop cybersecurity threats.
Improved detection of security breaches and incidents
The Security Information and Event Management (SIEM) tool provided by Log & Event Manager includes integrated threat detection capabilities, allowing you to do more than just observe the log entries that these cyberattacks generate. Using Log & Event Manager to correlate and normalize all the event log data from across the network gives IT professionals the ability to detect security threats that they may not have been able to detect by other means, especially multi-vector attacks that can be carried by multiple network assets.
Enhanced handling of security breaches and incidents
Additionally, the SIEM tool capabilities in LEM can be used to enhance how IT professionals encounter and handle security breaches and incidents. Log & Event Manager equips IT professionals with a single, unified view—a one-stop shop—for all event logs generated across the network infrastructure, which can increase productivity as you no longer need to hunt down where every event log resides. Responding to security threats can be enhanced using the SIEM tool capabilities of Log & Event Manager as well. IT professionals can use LEM to provide automated responses to security threats that are detected if a user-configured alarm is triggered, increasing response consistency.
Efficient reporting of security breaches and incidents
Furthermore, the SIEM software can assist in demonstrating regulatory compliance with a set of reporting tools. Since all network infrastructure event logs are passed to Log & Event Manager, IT professionals can simply create one report that encompasses every security incident that has been logged.
Select a license

SEM30

SolarWinds Security Event Manager (formerly LEM)-SEM30 - License with 1st Year Maintenance

$4,665

SEM50

SolarWinds Security Event Manager (formerly LEM)-SEM50 - License with 1st Year Maintenance

$7,795

SEM100

SolarWinds Security Event Manager (formerly LEM)-SEM100 - License with 1st Year Maintenance

$13,545

SEM250

SolarWinds Security Event Manager (formerly LEM)-SEM250 - License with 1st Year Maintenance

$29,395

SEM500

SolarWinds Security Event Manager (formerly LEM)-SEM500 - License with 1st Year Maintenance

$41,895

SEM650

SolarWinds Security Event Manager (formerly LEM)-SEM650 - License with 1st Year Maintenance

$50,195

SEM800

SolarWinds Security Event Manager (formerly LEM)-SEM800 - License with 1st Year Maintenance

$57,395

SEM1000

SolarWinds Security Event Manager (formerly LEM)-SEM1000 - License with 1st Year Maintenance

$67,895

SEM1500

SolarWinds Security Event Manager (formerly LEM)-SEM1500 - License with 1st Year Maintenance

$81,615

SEM2500

SolarWinds Security Event Manager (formerly LEM)-SEM2500 - License with 1st Year Maintenance

$105,195

{{STATIC CONTENT}}
{{CAPTION_TITLE}}

{{CAPTION_CONTENT}}

{{TITLE}}