21.01.2016 Views

The GSN 2015 Digital Yearbook

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

SolarWinds<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

IT Security Products and Solutions<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Security Incident & Event Management (SIEM)<br />

Solution<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

SolarWinds Log & Event Manager<br />

Reason this entry deserves to win:<br />

–––––––––––––––––––––––––––––––––––––––– • Threat intelligence feed to help identify malicious<br />

SolarWinds Log & Event Manager (LEM) is a comprehensive<br />

security information and event management • File Integrity Monitoring delivers broader compliance<br />

activity<br />

(SIEM) solution that delivers powerful real-time event support and deeper security intelligence<br />

correlation and analysis for immediate, actionable threat • Fast and powerful forensics via cutting-edge search<br />

intelligence to thwart attacks, contain breaches, and and visual data exploration<br />

maintain continuous compliance in an ever-evolving • Out-of-the-box compliance reporting with predefined,<br />

threat landscape.<br />

customizable templates<br />

SolarWinds LEM Highlights:<br />

• Immediate threat detection via true real-time, inmemory<br />

event correlation<br />

• Proactive defense against cyber-attacks and insider<br />

abuse<br />

• Hands-free threat remediation through built-in, automated<br />

responses<br />

With SolarWinds LEM, organizations get what they need<br />

to stay ahead of security threats, compliance violations,<br />

and operational issues – all in one package. It<br />

gives users the ability to capture and analyze log data in<br />

real-time from multiple sources around specific incidents,<br />

which is instrumental in quickly identifying and<br />

responding to threats, uncovering policy violations, and<br />

84

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!