SolarWinds Security Event Manager Features

Email Link To TrialFully functional for 30 days
1-62 of 62 features

Advanced pfSense Firewall Log Analyzer

Help improve security, monitoring, and troubleshooting with insightful pfSense reporting and analysis.

APT Security Software for Advanced Persistent Threat Defense

Easy-to-use APT software detects threats across environments for defense-in-depth security.

NEW

Audit Logon Events

Keep track of logon and logoff events with a centralized logon audit events monitor.

NEW

Automate Compliance Risk Management

Get improved compliance risk management with active compliance verification and continuous risk monitoring.

Azure AD Log Analytics and Monitoring

Audit logs on Azure AD to optimize security efforts.

NEW

Botnet Detection Tool Designed to Help Monitor for Bot Attacks and Threats

Strengthen real-time situational awareness and advanced botnet detection capabilities.

Centralized Log Management

Choose centralized log management to achieve streamlined, in-depth control.

NEW

Compliance Reporting Software

Collect and correlate log data to satisfy compliance requirements.

Cross Site Scripting Prevention

Counter cross site scripting (XSS) attacks using in-memory, multi-event correlation capabilities.

Cyberthreat Analysis Tool

Use cyberthreat analysis to protect your network.

NEW

Data Security Protection (DSP) Compliance

Learn about DSP Toolkit compliance, including what it is, who needs to complete an assessment, and more.

NEW

Database Log Audit Tool

Use database auditing functions to enhance security and demonstrate compliance.

NEW

DDoS Prevention and Mitigation Tool

Monitor event logs from a wide range of sources to detect and prevent DDoS activities.

Detect SQL Injection Attacks

Proactively protect your database server from SQL injection attacks.

DISA STIG Compliance Tools

Help automate the regulatory process with streamlined DISA STIG compliance tools.

Easy-to-Use Healthcare Security Solutions Software

Security Event Manger automatically detects intrusions, empowering healthcare IT teams.

NEW

Event Correlation Software for Log Analysis

Event correlation software can help correlate log events to identify threat patterns.

NEW

Event Log Analyzer

Improve threat awareness with a real-time log file analyzer.

File Integrity Monitoring Software

Monitor file activities to protect sensitive information from theft, loss, and malware.

Firewall Log Analyzer and Management Software

Analyze firewall logs, automate threat remediation, and secure your network against cyberattacks.

Firewall Security Audit Tool

Make firewalls audit-ready to stay compliant and improve security.

Get an Advanced Apache Log Viewer and Analyzer

Aggregate, analyze, and troubleshoot your Apache server logs with higher agility and simplicity.

HIPAA Compliance Software for IT

Schedule and create reports to demonstrate your compliance with HIPAA regulations.

Hospital Future Act (KHZG)

Understand what KHZG is and the importance of improving IT security in hospitals.

NEW

Identify Spear Phishing Attacks with Security Threat Prevention Tool

Prevent spear phishing by better monitoring user accounts, logs, and system changes.

Implement Advanced Endpoint DLP to Protect Sensitive Data

Enhance endpoint DLP with unified monitoring, real-time alerts, and automated threat remediation.

Improve Ransomware Detection Capabilities

Leverage advanced SIEM tools to implement security best practices and improve r ansomware detection

Incident Response Software

Simplify the incident-response process with security incident management software.

NEW

Information Security Risk Management

Strengthen your information security risk management capabilities with an advanced SIEM tool.

Insider Threat Management

Monitor security threats, detect suspicious activity, and act to prevent and resolve insider threats.

NEW

Intrusion Detection Software

Intrusion detection software can help guard against suspicious network threats.

NEW

IT Compliance Management Software

Simplify IT compliance management with automated monitoring and reporting policy violations

NEW

IT Security Threat Management Software

Powerful yet intuitive threat monitoring tools deploy quickly and start detecting threats fast.

NEW

Juniper Log Analyzer

Improve security on Juniper network devices, automate threat intelligence, and secure your network.

Linux Ubuntu Log Analyzer

Automate Ubuntu log analysis, remediate system threats, and improve IT operations.

Log Monitoring Tool That Includes Cyber Threat Intelligence Feeds

A cyber threat intelligence framework is critical for identifying and responding to security threats.

Log Parser Tool for Log File Analysis

Adopt a proactive security approach and get the most out of your event log parser with real-time event correlation.

Microsoft Exchange Event Log Monitor, Viewer, and Analyzer

Identify security threats and manage users for Microsoft Exchange

NEW

Microsoft IIS Log Analysis Tool for Web Servers

Collect IIS web server logs and identify threats with log parsing and real-time event correlation.

Network Firewall Security Management Software

Strengthen your network security with world-class firewall security management.

Network Security Monitoring Software

Scalable network security monitoring software detects cyberthreats and simplify compliance.

NEW

Network Security Tool

Add agility to your security operations by unifying threat intelligence across your network security tool.

Optimize Cyberthreat Prevention

Preempt security threats and vulnerabilities with an intelligent threat prevention solution.

NEW

PCI Compliance Software

Protect cardholder data with PCI compliance software for log analysis and flexible reporting.

Privileged Account Management (PAM) Tool

Configure privileged account security with the SolarWinds PAM tool in Security Event Manager.

Security Audit Log Software for Applications and Servers

Security audit logs help protect sensitive data across applications and servers.

Security Information Management (SIM)

Leverage security information management tools for powerful monitoring and detailed analysis.

NEW

Security Log Management

Conduct security log management with greater ease and efficiency—anytime, anywhere.

NEW

Security Orchestration and Automation

Optimize the threat mitigation process with security orchestration and automation.

NEW

Server Log Management

Reliable and efficient server log management software

SIEM Monitoring Tool

Get real-time actionable insights from unified and correlated SIEM logs to detect and handle security risks.

SIEM Tools Guide

Learn why SIEM tools are important, how they work, and how to choose the best SIEM solution.

NEW

Simplify NERC CIP Compliance

Monitor your IT environment with an advanced SIEM tool that simplifies NERC CIP compliance management and reporting.

Snort Log Analyzer and Intrusion Detection Tool

Real-time collection, correlation, and analysis of Snort intrusion detection and prevention system log.

Software for SOX IT Compliance

Quickly discover SOX violations with built-in, customizable reports to meet specific business requirements.

SolarWinds Log & Event Manager (LEM) Has Been Rebranded

SolarWinds Security Event Manager (SEM) is the new name for Log & Event Manager.

SonicWALL Log Analyzer

Monitor and analyze Dell SonicWALL firewall logs and secure your network.

SQL Server Audit Log Tool for Database Security

SolarWinds Security Event Manager provides database security by monitoring SQL server audit logs in real-time.

Squid Log Analyzer

Perform real-time aggregation and correlation of log data from Squid proxy software.

Threat Detection

Perform automated, in-depth threat detection across your network infrastructure.

NEW

USB Security Analyzer Detects and Responds to Potential Threats

Use USB security software with real-time alerts to help automatically protect business data.

User Activity Monitoring and Access Logging Tool

User activity monitoring can stop malicious activities before employees compromise security.

Server and database configuration monitoring made easy

Security Event Manager

  • Collecting logs from different sources can feel like herding cats without the right tool.
  • Cutting through the noise to quickly get to the logs you need doesn’t have to be difficult.
  • Identifying suspicious behavior faster, with less manual effort and less security expertise, is possible.

Starts at

Subscription and Perpetual Licensing options available

Let’s talk it over.
Contact our team. Anytime.