010-68421378
sales@cogitosoft.com
Categories
AddFlow  AmCharts JavaScript Stock Chart AmCharts 4: Charts Aspose.Total for Java Altova SchemaAgent Altova DatabaseSpy Altova MobileTogether Altova UModel  Altova MapForce Altova MapForce Server Altova Authentic Aspose.Total for .NET Altova RaptorXML Server ComponentOne Ultimate Chart FX for SharePoint Chart FX CodeCharge Studio ComponentOne Enterprise combit Report Server Combit List & Label 22 Controls for Visual C++ MFC Chart Pro for Visual C ++ MFC DbVisualizer version 12.1 DemoCharge DXperience Subscription .NET DevExpress Universal Subscription Essential Studio for ASP.NET MVC FusionCharts Suite XT FusionCharts for Flex  FusionExport V2.0 GrapeCity TX Text Control .NET for WPF GrapeCity Spread Studio Highcharts Gantt Highcharts 10.0 版 HelpNDoc Infragistics Ultimate  ImageKit9 ActiveX ImageKit.NET JetBrains--Fleet JetBrains-DataSpell JetBrains--DataGrip jQuery EasyUI jChart FX Plus OPC DA .NET Server Toolkit  OSS ASN.1/C Oxygen XML Author  OSS 4G NAS/C, C++ Encoder Decoder Library OSS ASN.1 Tools for C with 4G S1/X2 OSS ASN.1/C# OSS ASN.1/JAVA OSS ASN.1/C++ OPC HDA .NET Server Toolkit OPC DA .Net Client Development Component PowerBuilder redgate NET Developer Bundle Report Control for Visual C++ MFC  Sencha Test SPC Control Chart Tools for .Net Stimulsoft Reports.PHP Stimulsoft Reports.JS Stimulsoft Reports.Java Stimulsoft Reports. Ultimate Stimulsoft Reports.Wpf Stimulsoft Reports.Silverlight SlickEdit Source Insight Software Verify .Net Coverage Validator Toolkit Pro for VisualC++MFC TeeChart .NET Telerik DevCraft Complete Altova XMLSpy Zend Server

SolarWinds SIEM Log & Event Manager

SolarWinds SIEM: Log & Event Manager

A SIEM that makes it easy to use logs for security, compliance, and troubleshooting

Eliminate threats faster with instantaneous detection of suspicious activity and automated responses for mitigation and compliance

Easy to deploy SIEM virtual appliance provides real-time, in-memory event correlation, active responses, file integrity monitoring, threat intelligence, and USB device monitoring.

0Fast and easy compliance reporting for HIPAA, PCI DSS, SOX, ISO, FISMA, FERPA, NERC CIP, GLBA, GPG13, and more

Get out-of-the-box compliance reports/rules, pre-configured filters, and file integrity monitoring to detect file and registry changes. Rapidly identify compliance policy violations.

Key Features

Fast and easy compliance reporting

Get out-of-the-box compliance for HIPAA, PCI, SOX, ISO, NCUA, FISMA, FERPA, GLBA, NERC, GPG13 and more.

Real-time event correlations

Receive instant notification and remediation by processing log data in-memory.

Active response

Mitigate threats instantly with automated actions that block IPs, stop services, disable users, and more.

Intelligent automation

See value instantly with out-of-the box defaults, correlation rules, reports, and active responses.

File integrity monitoring

Meet compliance requirements and protect data by tracking files and Windows® registry changes.

USB device monitoring

Gain valuable insight into USB device and file activity while enforcing USB policies.

Affordable pricing

Enjoy simple, all-inclusive, per-node pricing with a low-priced Workstation Edition option.

Easy to use and maintain

Access an intuitive UI, online training, a deep knowledge base, and a 130K-strong user community.

Quick to deploy

Deploy the virtual appliance and configure it in about an hour. No consultants needed.

More Features

Supports 1,200+ systems, applications, and network devices

Collect log data from the systems, applications, and network devices that you care about using syslog, SNMP traps, or agents. Supported log sources

Out-of-the-box threat intelligence data

Receive alerts about suspicious security events via a threat intelligence feed that inspects for matches against known bad hosts. Watch the Video

Advanced search for event forensic analysis

Discover issues easily with an advanced ad hoc IT search capability that uses a drag-and-drop interface that tracks events instantly.

Log data compression and retention

Store more data with +95% compression and schedule archives to meet long-term compliance and reporting needs.

HIPAA, PCI, SOX, ISO, FISMA, NCUA, and many more

Generate compliance reports easily using hundreds of audit-proven templates and a console that lets you customize reports.

User activity monitoring

Monitor user logon/logoff, misuse of privileged user accounts, installation of unauthorized software, and unauthorized data transfers.

All-inclusive pricing

Enjoy a license cost that includes all SIEM components, agents, connectors, file integrity monitoring, USB Defender, and SQL auditing.

Insider threat detection

Deliver broad compliance support and deep security intelligence for insider threats with embedded file integrity monitoring.

Log file analysis

Simplify troubleshooting and resolve issues faster by centralizing logs from network devices, servers, and databases in one location.

Malicious event tracking

Correlate event data from thousands of sources in real-time using built-in SIEM event rules to remediate threats in less time.

Single Sign-On/Smart Card Integration

Easy single sign-on via user ID and password, smart card, one-time password or biometric device.

Workstation Edition licensing

Add Windows® workstations more cost effectively with Workstation Edition licensing.

What Our Customers Are Saying

Hamlin Bank and Trust Company Prevents Data Theft With Log & Event manager

"Certain employees attempted to pass off sensitive financial informatuion via USB to cell phone. The USB rule disconnected the device and fired an email to administrators"

Brian Bailey

IT/Systems Administrator, Hamlin Bank and Trust Company

Source: TechValidate. TVID: 2FB-250-DJE

VXI Global Solutions Tracks Anomalies in Real-Time With Log & Event Manager.

“Log & Event Manager has allowed me to track anomalies within my network environment. Log & Event Manager is able to provide an accurate depiction of the network environment and the learning curve isn’t too steep.”

Simon Wu

Network Administrator, VXI Global Solutions CO Switch Communications

Source: TechValidate. TVID: 5A1-BE7-680

After installing SolarWinds Log & Event Manager, the City of Kennewick demonstrates and meets HIPAA regulatory compliance.

“With Log & Event Manager I was able to track down the source of a ransomware infection.”

John Reed

Senior Network Engineer, City of Kennewick

Source: TechValidate. TVID: 6C2-15A-1A9

Screenshots

Security dashboard

Centralized view of all security events

Compliance reporting

Out-of-the box compliance reporting

Active response

In-console and automated remediation

Intelligent search

Organized results for better analysis

Built-in correlation

Cross-platform log correlation to improve security event detection

Real-time dashboard

Visibility into real-time events

Log normalization

Simple, easy-to-read logs

File integrity monitoring

Monitor file and registry activity

Endpoint coverage

Detect insider abuse

USB defense

Detect and block USB devices

System Requirements

Hard Drive

250GB

Memory

8GB

CPU

Dual Core, 2GHz

Virtual Environments

VMware® ESX®/ESXi 4.0+ and Hyper-V® server 2008 R2/2012/2012 R2

Case Studies

Financial Services

Credit Union likes its ease of use

“LEM helped us detect a major malware problem on one of our company PCs. We were able to quickly act on it, thanks to the features in LEM.”

Government

City government improves detection

“Our LEM is an invaluable tool for monitoring our network and servers. Other departments within the city ask me for recommendations, and I steer them toward Log & Event Manager.”

Healthcare

Hospital cuts downtime 60-80%

“It has helped us by preventing unknown USB devices [from] being connected and introducing malware [in]to our systems.”

Software/Technology

Company complies with HIPAA & SOX

“LEM contains the most features and best support options that other providers simply can’t match.”

Quick Navigation;

© Copyright 2000-2023  COGITO SOFTWARE CO.,LTD. All rights reserved