SW_LEM_Datasheet SW LEM Datasheet
User Manual:
Open the PDF directly: View PDF .
Page Count: 4
Download | |
Open PDF In Browser | View PDF |
DATASHEET SOLARWINDS LOG & EVENT MANAGER DEMONSTRATE COMPLIANCE AND IMPROVE SECURITY “Intuitive, easy to use interface that pulls all of the network enterprise data into meaningful and understandable information.” John Roberts Co. Over 3500 resource-constrained security pros rely on SolarWinds Log & Event Manager for user activity monitoring, USB detection & prevention, threat intelligence and active response in a virtual appliance that’s easy to deploy, manage, and use We’ve designed our SIEM to provide the functionality you need without the complexity and cost of other enterprise SIEM solutions. LOG & EVENT MANAGER AT A GLANCE » Collects, consolidates, and analyzes logs and events from firewalls, IDS/IPS devices and applications, switches, routers, servers, operating system logs, and other applications » Real-time correlation to identify attacks » Detect breaches with threat intelligence » Supports root cause analysis with built-in intelligence that applies to networks, applications, and security management » Blocks and quarantines malicious and suspicious activity, including inappropriate USB usage » Delivers deeper intelligence and broader compliance support through embedded File Integrity Monitoring (FIM) » Produces out-of-the-box compliance reports for HIPAA, PCI DSS, GPG 13, SOX, and more quickly and easily page 1 DATASHEET: SOLARWINDS LOG & EVENT MANAGER FEATURE HIGHLIGHTS Scalable and Easy Collection of Network Device, Machine, and Cloud Logs Log & Event Manager collects and catalogs log and event data in real-time from anywhere data is generated within your IT infrastructure. Explore the supported data sources Real-time, In-memory Event Correlation By processing log data before it is written to the database, Log & Event Manager delivers true real-time log and event correlation, enabling you to immediately troubleshoot and investigate security breaches and other critical issues. Threat Intelligence Feed Leverage an out-of-the-box feed of known bad IPs to identify malicious activity. The feed regularly updates from a collection of research sources and automatically tags events as they enter the appliance. From there, you can quickly run searches or reports to view the suspect activity or create rules to perform automatic actions. Advanced IT Search for Event Forensic Analysis Log & Event Manager’s advanced ad-hoc IT search capability makes it easy to discover issues using a drag-and-drop interface that tracks events instantly. You can even save common searches for easy future reference. Log Data Compression and Retention Log & Event Manager stores terabytes of log data at a high compression rate for compliance Embedded, Real-Time File Integrity Monitoring Embedded File Integrity Monitoring delivers broader compliance support and deeper security intelligence for insider threats, zero-day malware, and other advanced attacks. Built-in Active Responses Log & Event Manager enables you to immediately respond to security, operational, and policydriven events using built-in active responses that take actions such as quarantining infected machines, blocking IP addresses, killing processes, and adjusting Active Directory® settings. USB Detection and Prevention Log & Event Manager helps prevent endpoint data loss and protects sensitive data with real-time reporting to audit USB usage. User Activity Monitoring Improve situational awareness by gaining insight into critical user activities. Learn when privileged accounts are being used, how they are being used, and from where. Out-of-the-Box Security and Compliance Reporting Templates Log & Event Manager makes it easy to generate and schedule compliance reports quickly using over 300 audit-proven templates and a console that lets you customize reports for your page 2 DATASHEET: SOLARWINDS LOG & EVENT MANAGER Ease-of-Use and Deployment Log & Event Manager is quick and simple to deploy. You can be up and auditing logs in no time using our virtual appliance deployment model, Web-based console, and intuitive interface. WHO SHOULD USE LOG & EVENT MANAGER? Resource-constrained security pros challenged with: » » » Inability to prioritize, manage, and respond to security incidents » Slow incident response time » Inability to determine the root cause of suspicious activity » The need to monitor internal users for acceptable use and insider threats » The need to share log and activity data across security, network, applications, and systems » HOW LOG & EVENT MANAGER SUPPORTS YOUR SECURITY PROGRAM » Automation and embedded intelligence provide a Virtual Security Operations Center for 24x7 monitoring » Faster event detection and alerting on threat intelligence matches based on IPs » More intelligent and accurate detection of suspicious and malicious activity— including zeroday malware, insider, and advanced threats » Eliminates time-intensive manual reporting processes » Shortens time-to-respond duration through powerful forensics capabilities » Automatically blocks abuse and misuse through active response for network, system, and access policy violations » Monitors and blocks USB usage based on behavioral policy rules SYSTEM REQUIREMENTS Hardware Minimum Requirements CPU Dual Processor, 2.0 GHz Memory 8 GB RAM Hard Drive 250 GB Software Minimum Requirements OS/Virtual VMWare® ESX®/ESXi TM 4.0 and above Environments Hyper-V® Server 2008, 2008 R2, 2012, 2012 R2 Database Integrated with virtual appliance page 3 DATASHEET: SOLARWINDS LOG & EVENT MANAGER ABOUT SOLARWINDS® SolarWinds worldwide. Focused exclusively on IT Pros, we strive to eliminate the complexity in IT management software that many have been forced to accept from traditional enterprise software vendors. SolarWinds delivers on this commitment with unexpected simplicity through products that are problem on any scale. Our solutions are rooted in our deep connection to our user base, which interacts in our online community, thwack ®, to solve problems, share technology and best practices, and directly participate in our product development process. . LEARN MORE To find out more: Visit: www.DimensionSystems.com Guam Office 643 Chalan San Antonio STE 107 DFS Pacific Plaza, Tamuning, Guam 96913-3644 Phone: (671) 646-2007 | Fax: (671) 646-2006 Email us at: sales@DimensionSystems.com Philippine Office Suite 3004, 30/F Antel Global Corporate Center Julia Vargas Ave., Ortigas Center Pasig City, Philippines 1603 Phone: (632) 900-0198 Email us at: salesph@DimensionSystems.com © 2015 SolarWinds, Inc. All rights reserved. SolarWinds® and the SolarWinds logo are among the trademarks or registered trademarks of the company in the United States and/or other countries. All other trademarks are property of their respective owners.
Source Exif Data:
File Type : AI File Type Extension : ai MIME Type : application/vnd.adobe.illustrator PDF Version : 1.7 Linearized : No Create Date : 2015:10:13 10:41:16-04:00 Creator : Adobe InDesign CS6 (Macintosh) Modify Date : 2017:08:18 11:54:40+08:00 XMP Toolkit : Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27 Metadata Date : 2017:08:18 11:54:40+08:00 Creator Tool : Adobe InDesign CS6 (Macintosh) Thumbnail Width : 200 Thumbnail Height : 256 Thumbnail Format : JPEG Thumbnail Image : (Binary data 14779 bytes, use -b option to extract) Instance ID : uuid:f807ddac-381e-4a20-a326-128a4da0431e Original Document ID : xmp.did:e4c25ad2-cad4-45cb-8fc4-419ace6b8270 Document ID : xmp.id:715623091E206811822AFDB954FF1EDD Rendition Class : proof:pdf Derived From Instance ID : xmp.iid:705623091E206811822AFDB954FF1EDD Derived From Document ID : xmp.did:CC75D82325206811808391551F8E70DB Derived From Original Document ID: xmp.did:e4c25ad2-cad4-45cb-8fc4-419ace6b8270 Derived From Rendition Class : default History Action : converted History Parameters : from application/x-indesign to application/pdf History Software Agent : Adobe InDesign CS6 (Macintosh) History Changed : / History When : 2015:10:13 10:41:16-04:00 Format : application/pdf Producer : Adobe PDF Library 10.0.1 Trapped : False N Pages : 1 Has Visible Transparency : True Has Visible Overprint : True Max Page Size W : 612.000000 Max Page Size H : 792.000000 Max Page Size Unit : Points Font Name : MyriadPro-Regular, OpenSans, OpenSans-Semibold, OpenSans-Bold, OpenSans-Light Font Family : Myriad Pro, Open Sans, Open Sans, Open Sans, Open Sans Font Face : Regular, Regular, Semibold, Bold, Light Font Type : Open Type, Open Type, Open Type, Open Type, Open Type Font Version : Version 2.102;PS 2.000;hotconv 1.0.67;makeotf.lib2.5.33168, Version 1.10, Version 1.10, Version 1.10, Version 1.10 Font Composite : False, False, False, False, False Font File Name : MyriadPro-Regular.otf, OpenSans-Regular_0.ttf, OpenSans-Semibold_0.ttf, OpenSans-Bold_0.ttf, OpenSans-Light_0.ttf Plate Names : Cyan, Magenta, Yellow, Black Swatch Group Name : Default Swatch Group Swatch Group Type : 0 Page Count : 4 For : Pam Castilla, Title : SW_LEM_Datasheet.pdf Bounding Box : 0 0 612 792 Container Version : 11 Creator Version : 16 Image Height : 792 Image Width : 612 Image Size : 612x792 Megapixels : 0.485EXIF Metadata provided by EXIF.tools