Volume 8
• Proactive defense against cyber-attacks and insider abuse
• Hands-free threat remediation through built-in,
automated responses
• Threat intelligence feed to help identify malicious activity
• File Integrity Monitoring delivers broader compliance support and deeper security intelligence
• Fast and powerful forensics via cutting-edge
search and visual data exploration
• Out-of-the-box compliance reporting with predefined, customizable templates, including for
DISA STIGS, FISMA, HIPAA, PCI DSS, SOX,
ISO, FERPA, NERC CIP, GLBA, GPG13, and
more
With SolarWinds LEM, organizations get
what they need to stay ahead of security
threats, compliance violations, and operational issues – all in one package.
It gives users the ability to capture and analyze log
data in real-time from multiple sources around specific incidents, which is instrumental in quickly identifying and responding to threats, uncovering policy
violations, and resolving vital network issues.
Oct/Nov 2016 Edition
dresses, killing unexpected processes, and disabling user accounts.
Event normalization makes reporting and identifying security incidents across different types of log
sources simple.
Additionally, SolarWinds LEM provides advanced
search functionality and easy-to-use data visualization tools to quickly explore log data, perform event
forensics, and identify the root-cause of a security
incident or network problem – fast.
SolarWinds LEM goes well beyond traditional SIEM solutions with key innovations like in-memory correlation, automated Active Responses, USB Defender
technology, and a groundbreaking approach to IT search.
SolarWinds LEM’s latest release added threat intelligence feed integration to its already strong feature
set, helping the system stay up-to-date on known
threats.
Most importantly, SolarWinds listens to the IT security community to continually improve and update
solutions based on user feedback and real-world
needs.
SolarWinds’ user community, thwack, features a
forum in which IT pros can request and vote on
new features and thus directly influence product
updates. Check out the SolarWinds LEM feature
request forum to see this process in action.
(See in Action - SolarWinds Log & Event Manager’s key security features, and see how quickly LEM can help you keep
your network secure. Courtesy of Solar Winds and YouTube)
SolarWinds LEM surpasses other solutions by providing built-in Active Responses, event normalization, and a
drag-and-drop UI to create custom dashboards easily.
Active Responses enable users to take automatic
actions for hands-free threat mitigation, including
shutting down breached systems, blocking IP ad-
(SolarWInds Log & Event Manager offers fast and easy compliance reporting for HIPAA, PCI DSS, SOX, ISO, FISMA,
FERPA, NERC CIP, GLBA, GPG13, and more! Courtesy of
Solar Winds and YouTube)
SolarWinds LEM alleviates the complexity associated with compliance reporting by providing over
hundreds of built-in, “audit-proven” report tem-
55