sb-as logo
Story image

SolarWinds launches new SIEM offering

27 May 2019

IT management software provider SolarWinds has today announced the launch of SolarWinds Security Event Manager (SEM). 

The SIEM solution is designed to help IT and security professionals strengthen their security posture by providing increased visibility into cybersecurity activity.

SEM, which replaces SolarWinds Log & Event Manager, can be used to collect and normalise event logs generated across on-premises networks and systems into a central location, detect and protect against advanced cyber threats, respond to cyber incidents with unique user-defined actions, and help demonstrate regulatory and industry compliance.

The solution automates many SIEM activities to help IT and security professionals accelerate threat detection, response, and reporting—pulling from an integrated threat intelligence feed that identifies known bad actors in event log data.

“In today’s rapidly evolving threat landscape, IT and security professionals are faced with many challenges, including threats that keep pace with network growth and complexities, a continual security skills gap, and growing compliance pressures,” says SolarWinds security product strategy vice president Brandon Shopp.

“We’ve launched SolarWinds SEM to help mitigate these challenges, further delivering on our promise of making IT, and IT security, look easy.

“While security itself is complex, a SIEM tool does not have to be complicated to be effective. SEM aims to deliver comprehensive, centralised threat detection without the requirement of additional resources, while automating security processes for scale.”

Key new features include:

  • Events Console, the new HTML5 interface that provides real-time and historical viewing, searching, and filtering of log data for the intuitive identification of potentially malicious activity
  • Rules Console, to build and manage correlation rules in order to identify, alert on, and automatically respond to potential security weaknesses or cyberattacks
  • Node & Connector Management Console, to easily add new log sources and manage existing sources
  • File Integrity Monitoring Filter Exclusions, to help reduce noise associated with file integrity monitoring and improve threat detection accuracy
  • Amazon AWS Deployment, for easy cloud deployment, if desired

SolarWinds products allow organisations worldwide, regardless of type, size or IT infrastructure complexity, to monitor and manage the performance of their IT environments, whether on-premises, in the cloud, or in hybrid models.

SolarWinds engages with all types of technology professionals—IT operations professionals, DevOps professionals, and managed service providers (MSPs)—to understand the challenges they face maintaining high-performing and highly available IT infrastructures.

The insights gained from engaging with them, in places like the THWACK online community, helps it build products that solve IT management challenges in ways that technology professionals want them solved.

Story image
Interview: How cyber hygiene supports security culture - ThreatQuotient
We spoke with ThreatQuotient’s APJC regional director Anthony Stitt to dig deeper into cyber hygiene, security culture, threat intelligence, and the tools that support them.More
Story image
Financial institutions in APAC region to invest millions in fraud prevention
"The pandemic is creating a lot of uncertainty, but the majority of FIs in APAC recognise that an end to end fraud management platform is strategic to differentiating themselves from the highly disruptive landscape they are playing in."More
Story image
The rising threat of human-controlled ransomware
Until recently, most ransomware attacks have been automated affairs. But things are changing, writes Attivo Networks regional director for A/NZ Jim Cook.More
Story image
Insider threat report reveals deception in the workforce
Insider threats come from people inside an enterprise, whether they divulge proprietary information with nefarious intentions, or are just careless employees that unwittingly share sensitive data, writes Bitglass product marketing manager Juan Lugo.More
Story image
CrowdStrike targets Zero Trust blind spot with new offering
CrowdStrike has officially launched CrowdStrike Falcon Zero Trust Assessment (ZTA), designed to aid in overall security posture by delivering continuous real-time assessments across all endpoints in an organisation regardless of the location, network or user. More
Story image
Creating private data regulations for employees
Whether employees are hired on a part-time or full-time basis, everyone must know about data privacy regulations. Everyone needs to be responsible for keeping the organisation’s data secure. More