The Federal Energy Regulatory Commission (FERC) and the North American Electric Reliability Corporation (NERC) require energy companies to comply with the Critical Infrastructure Protection (CIP) mandate. SolarWinds Log & Event Manager (LEM) uncovers FERC / NERC CIP policy violations with real-time log analysis and powerful cross-device event correlation covering your entire infrastructure.
SolarWinds Log & Event Manager (LEM) provides two methods to find potential FERC / NERC CIP compliance violations: for interactive, ad-hoc searches, use the context-aware console, or for finding events of interest automatically, use the rule-based, real-time event correlation engine. Eliminate hours of work with over 700 out-of-the-box event correlation rules, many of which are specific to FERC / NERC CIP regulations.
LEM helps you ensure compliance with Critical Cyber Assets CIP protection requirements using Active Responses to address critical events and shut down security threats automatically and immediately. Automated actions are triggered in real-time using a rule-based event correlation engine executed in memory. Build and trigger Active Responses interactively using the console.
SolarWinds LEM can disable network access on a user’s PC after excessive attempts to access a secure network, or it can immediately eject USB devices when inserted into restricted PCs by using an extensive library of built-in actions. This saves hours wasted writing rules and shortens the deployment ramp.
Built-in Active Responses include:
LEM includes over 300 pre-built “audit-proven” reporting templates. Customize them for internal requirements using the reporting console or use them out of the box to generate reports complying with FERC / NERC CIP regulations.
Achieving auditable compliance across industry-specific IT regulatory frameworks is no easy task.
A lag in the ability to detect and respond to a security threats can be costly for businesses of all sizes.
The effectiveness of your security initiatives is largely dependent on your ability to quickly respond to security threats.