Security Event Manager
Detect and respond to security threats using a powerful, affordable, easy-to-use SIEM tool

Starts at $4,665
fn_vidyard_VtVhHqGL5EQLnTSakKEzHN();
https://play.vidyard.com/VtVhHqGL5EQLnTSakKEzHN.jpg

Key Features

  • Features Overview
  • Integrated compliance reporting tools
  • Event-time correlation of security events
  • Automated incident response
  • Advanced search and forensic analysis
  • File integrity monitoring
  • USB device monitoring
  • Log forwarding
  • Features Overview

    Improve security and compliance with an easy-to-use, affordable SIEM tool.

    Detect suspicious activity
    Identify threats faster with event-time detection of suspicious activity.
    Mitigate security threats
    Conduct security event investigations and forensics for mitigation and compliance with SolarWinds SIEM software.
    Industry and regulatory compliance readiness
    Demonstrate compliance with audit-proven reporting for HIPAA, PCI DSS, SOX, and more.
    Maintain continuous security
    Improve security measures with SolarWinds® Security Event Manager (SEM) SIEM tool, a hardened virtual appliance with encryption capabilities for data in transit and at rest, SSO/smart card integration, and more.
  • Integrated compliance reporting tools

    Achieving auditable compliance across industry-specific IT regulatory frameworks is no easy task.

    Helps demonstrate compliance with out-of-the-box reporting for HIPAA, PCI DSS, SOX, ISO, NCUA, FISMA, FERPA, GLBA, NERC CIP, GPG13, DISA STIG, and more included in SEM’s SIEM software.

  • Event-time correlation of security events

    A lag in the ability to detect and respond to a security threat can be costly for businesses of all sizes.

    Our SIEM solution provides in-memory, cross-platform event processing for event-time notification and response without waiting on data queries.

    fn_vidyard_axL3RpqQx9ntv8mjhmzQxf();
    https://play.vidyard.com/axL3RpqQx9ntv8mjhmzQxf.jpg
  • Automated incident response

    The effectiveness of your security initiatives is largely dependent on your ability to quickly respond to security threats.

    Simplify the threat remediation process with automated responses that can block IPs, change privileges, disable accounts, block USB devices, kill applications, and more.

  • Advanced search and forensic analysis

    Your ability to prove the limited impact of a security incident could save your business from potential fines, penalties, and even legal action.

    Dig deep into security data with SIEM capabilities provided by SEM to investigate incidents for response or audit reporting purposes.

    fn_vidyard_Z73LHLGafX7qYDfJGxnm2v();
    https://play.vidyard.com/Z73LHLGafX7qYDfJGxnm2v.jpg
  • File integrity monitoring

    Modifications, deletions, and permission changes to files, folders, and registry settings could be the sign of something worse.

    Monitor and be alerted to registry, file, and folder activity to detect suspicious and malicious behavior using SEM’s File Integrity Monitoring (FIM) capabilities.

  • USB device monitoring

    Unmanaged USB flash drives pose an ongoing risk to IT security—whether it's aiding data leaks or introducing threats to your network.

    Gain valuable insight into USB device and file activity while enforcing USB policies with USB Analyzer.

  • Log forwarding

    Expand your security toolset integration with log forwarding capabilities

    Designed to easily forward raw event log data with syslog protocols (RFC3164 and RFC 5244) to an external applications for further analysis. 

Next Feature:
See More Features +
See Less Features -

Key Features

Features Overview Improve security and compliance with an easy-to-use, affordable SIEM tool.
Integrated compliance reporting tools

Achieving auditable compliance across industry-specific IT regulatory frameworks is no easy task.

Helps demonstrate compliance with out-of-the-box reporting for HIPAA, PCI DSS, SOX, ISO, NCUA, FISMA, FERPA, GLBA, NERC CIP, GPG13, DISA STIG, and more included in SEM’s SIEM software.
Close Feature
Event-time correlation of security events

A lag in the ability to detect and respond to a security threat can be costly for businesses of all sizes.

Our SIEM solution provides in-memory, cross-platform event processing for event-time notification and response without waiting on data queries. https://play.vidyard.com/axL3RpqQx9ntv8mjhmzQxf.jpg
Close Feature
Automated incident response

The effectiveness of your security initiatives is largely dependent on your ability to quickly respond to security threats.

Simplify the threat remediation process with automated responses that can block IPs, change privileges, disable accounts, block USB devices, kill applications, and more.
Close Feature
Advanced search and forensic analysis

Your ability to prove the limited impact of a security incident could save your business from potential fines, penalties, and even legal action.

Dig deep into security data with SIEM capabilities provided by SEM to investigate incidents for response or audit reporting purposes. https://play.vidyard.com/Z73LHLGafX7qYDfJGxnm2v.jpg
Close Feature
File integrity monitoring

Modifications, deletions, and permission changes to files, folders, and registry settings could be the sign of something worse.

Monitor and be alerted to registry, file, and folder activity to detect suspicious and malicious behavior using SEM’s File Integrity Monitoring (FIM) capabilities.
Close Feature
USB device monitoring

Unmanaged USB flash drives pose an ongoing risk to IT security—whether it's aiding data leaks or introducing threats to your network.

Gain valuable insight into USB device and file activity while enforcing USB policies with USB Analyzer.
Close Feature
Log forwarding

Expand your security toolset integration with log forwarding capabilities

Designed to easily forward raw event log data with syslog protocols (RFC3164 and RFC 5244) to an external applications for further analysis. 

Close Feature

SIEM capabilities that are an industry favorite. Hands down.

Breaking rules. Nabbing accolades.
See More See Less

Get started with our SIEM software

DOWNLOAD FREE TRIAL Fully functional for 30 days
Let’s talk it over.
Contact our team. Anytime.
+1-866-530-8100
SolarWinds is trusted by 300,000+ loyal customers worldwide
What is SIEM?
definition
Security Information & Event Management (SIEM) security involves using SIEM tools to collect, normalize, analyze, and correlate data from a variety of log sources to provide actionable IT security intelligence to help stop cybersecurity threats.
Improved detection of security breaches and incidents
The Security Information and Event Management (SIEM) tool provided by Security Event Manager includes integrated threat detection capabilities, allowing you to do more than just observe the log entries that these cyberattacks generate. Using Security Event Manager to correlate and normalize all the event log data from across the network gives IT professionals the ability to detect security threats that they may not have been able to detect by other means, especially multi-vector attacks that can be carried by multiple network assets.
Enhanced handling of security breaches and incidents
Additionally, the SIEM tool capabilities in SEM can be used to enhance how IT professionals encounter and handle security breaches and incidents. Security Event Manager equips IT professionals with a single, unified view—a one-stop shop—for all event logs generated across the network infrastructure, which can increase productivity as you no longer need to hunt down where every event log resides. Responding to security threats can be enhanced using the SIEM tool capabilities of Security Event Manager as well. IT professionals can use SEM to provide automated responses to security threats that are detected if a user-configured alarm is triggered, increasing response consistency.
Efficient reporting of security breaches and incidents
Furthermore, the SIEM software can assist in demonstrating regulatory compliance with a set of reporting tools. Since all network infrastructure event logs are passed to Security Event Manager, IT professionals can simply create one report that encompasses every security incident that has been logged.
Select a license

SEM30

SolarWinds Security Event Manager (formerly LEM)-SEM30 - License with 1st Year Maintenance

$4,665

SEM50

SolarWinds Security Event Manager (formerly LEM)-SEM50 - License with 1st Year Maintenance

$7,795

SEM100

SolarWinds Security Event Manager (formerly LEM)-SEM100 - License with 1st Year Maintenance

$13,545

SEM250

SolarWinds Security Event Manager (formerly LEM)-SEM250 - License with 1st Year Maintenance

$29,395

SEM500

SolarWinds Security Event Manager (formerly LEM)-SEM500 - License with 1st Year Maintenance

$41,895

SEM650

SolarWinds Security Event Manager (formerly LEM)-SEM650 - License with 1st Year Maintenance

$50,195

SEM800

SolarWinds Security Event Manager (formerly LEM)-SEM800 - License with 1st Year Maintenance

$57,395

SEM1000

SolarWinds Security Event Manager (formerly LEM)-SEM1000 - License with 1st Year Maintenance

$67,895

SEM1500

SolarWinds Security Event Manager (formerly LEM)-SEM1500 - License with 1st Year Maintenance

$81,615

SEM2500

SolarWinds Security Event Manager (formerly LEM)-SEM2500 - License with 1st Year Maintenance

$105,195

{{STATIC CONTENT}}
{{CAPTION_TITLE}}

{{CAPTION_CONTENT}}

{{TITLE}}