|By Marketwired .||
|June 11, 2014 07:30 AM EDT||
AUSTIN, TX -- (Marketwired) -- 06/11/14 -- SolarWinds (NYSE: SWI), a leading provider of powerful and affordable IT management software, today announced the availability of SolarWinds Log & Event Manager 6.0, the only all-in-one Security Information and Event Management (SIEM) designed specifically for the resource-constrained security and IT Pro. With this latest release, SolarWinds provides advanced security insight through real-time File Integrity Monitoring (FIM), which helps to actively detect advanced persistent threats, insider abuse and helps comply with numerous regulations such as PCI DSS, Sarbanes-Oxley and HIPAA.
When it comes to IT security, organizations can't stop what they can't see. The availability of "DIY" malware kits, improvement in automated hacking tools, combined with advanced social engineering techniques are making attacks harder to detect from logs alone. By adding FIM, fully embedded into Log & Event Manager's event stream, at no extra cost -- SolarWinds is offering the only affordable SIEM that provides the essential combination of advanced intelligence and in-depth remediation in an easy to use, easy to manage virtual appliance.
"The growing prevalence of advanced hacking tools, organized cyber-crime rings and sophisticated attack techniques coupled with the pressure to meet regulatory compliance are creating demand for stronger security practices across all organizations. Unfortunately, most SIEM solutions are designed with only the large enterprise security teams in mind," said Suaad Sait, executive vice president, products and markets, SolarWinds. "SolarWinds' focus is serving organizations that have resource-constrained -- yet highly important -- security and IT Pros to deliver the automation, deep inspection, active blocking and broad compliance management they so desperately need at a cost and manageability level they can realize. We call it 'SIEM for One, SIEM for All' and believe that it is a long overdue solution for the broader IT market."
Three Real Threats IT Teams Can Overcome with SolarWinds Log & Event Manager 6.0
According to the 2014 Verizon® Data Breach Investigations Report, breaches caused by malware, external hacking and social engineering techniques are skyrocketing and insider espionage targeting internal data and trade secrets is on the rise. SolarWinds Log & Event Manager can help detect advanced attacks and stop them in their tracks through active response, including:
- Zero-day malware -- Log & Event Manager can detect changes to key system files and executable writes, providing deeper insight into zero day malware. Log & Event Manager's remediation capabilities can halt this attack by automatically stopping the running malware process.
- Insider Abuse -- By auditing files directly, Log & Event Manager can more accurately identify insider abuse through intelligent correlation rules. Active integration with active directory settings can disable accounts, change user groups and rights.
- Advanced Persistent Threats -- Advanced threats are stealthy and very hard to detect. By inserting a granular, file-based auditing into the existing event stream -- Log & Event Manager can help resource-constrained security pros pinpoint these attacks faster and help them block them in progress.
SolarWinds Log & Event Manager delivers comprehensive SIEM capabilities in a highly affordable, easy-to-deploy virtual appliance. Log & Event Manager automates and simplifies the complex task of security management, root cause analysis, incident response and continuous compliance, enabling IT Pros to immediately identify and remediate threats and vital network issues--before critical systems and data can be exploited.
In a recent group SIEM product review conducted by SC Magazine, SolarWinds Log & Event Manager 5.7 received a five-star review and rating, stating:
"SolarWinds has put together another outstanding product. The SolarWinds Log & Event Manager (LEM) offers a quality set of log management, event correlation, search and reporting facilities. This gives organizations the ability to collect large volumes of data from virtually any device on a network in real time and then correlate the data into actionable information. The company does this by paying attention to the need for real-time incident response and effective forensics, as well as security and IT troubleshooting issues. Another winning set of features are the quality regulatory compliance management and ready-made reporting functions."
Pricing and Availability
SolarWinds Log & Event Manager pricing starts at $4,495 and includes the first year of maintenance. For more information, including a downloadable, free 30-day evaluation, visit the SolarWinds website or call 866.530.8100.
SolarWinds (NYSE: SWI) provides powerful and affordable IT management software to customers worldwide from Fortune 500 enterprises to small businesses. In all of our market areas, our approach is consistent. We focus exclusively on IT Pros and strive to eliminate the complexity that they have been forced to accept from traditional enterprise software vendors. SolarWinds delivers on this commitment with unexpected simplicity through products that are easy to find, buy, use and maintain while providing the power to address any IT management problem on any scale. Our solutions are rooted in our deep connection to our user base, which interacts in our thwack® online community to solve problems, share technology and best practices, and directly participate in our product development process. Learn more today at http://www.solarwinds.com/.
SolarWinds, SolarWinds & Design and thwack are the exclusive property of SolarWinds Worldwide, LLC or its affiliates. All other company and product names mentioned are used only for identification purposes and may be or are intellectual property of their respective companies.
© 2014 SolarWinds Worldwide, LLC. All rights reserved.
Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2614677
Embedded Video Available: http://www2.marketwire.com/mw/frame_mw?attachid=2614688
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
May. 5, 2016 11:30 PM EDT Reads: 1,316
Artificial Intelligence has the potential to massively disrupt IoT. In his session at 18th Cloud Expo, AJ Abdallat, CEO of Beyond AI, will discuss what the five main drivers are in Artificial Intelligence that could shape the future of the Internet of Things. AJ Abdallat is CEO of Beyond AI. He has over 20 years of management experience in the fields of artificial intelligence, sensors, instruments, devices and software for telecommunications, life sciences, environmental monitoring, process...
May. 5, 2016 07:45 PM EDT Reads: 1,502
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
May. 5, 2016 07:00 PM EDT Reads: 1,474
In his session at 18th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., will focus on real world deployments of DDoS mitigation strategies in every layer of the network. He will give an overview of methods to prevent these attacks and best practices on how to provide protection in complex cloud platforms. He will also outline what we have found in our experience managing and running thousands of Linux and Unix managed service platforms and what specifically c...
May. 5, 2016 07:00 PM EDT Reads: 1,379
We’ve worked with dozens of early adopters across numerous industries and will debunk common misperceptions, which starts with understanding that many of the connected products we’ll use over the next 5 years are already products, they’re just not yet connected. With an IoT product, time-in-market provides much more essential feedback than ever before. Innovation comes from what you do with the data that the connected product provides in order to enhance the customer experience and optimize busi...
May. 5, 2016 06:00 PM EDT Reads: 1,373
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...
May. 5, 2016 06:00 PM EDT Reads: 1,044
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises.
May. 5, 2016 05:00 PM EDT Reads: 1,282
Many private cloud projects were built to deliver self-service access to development and test resources. While those clouds delivered faster access to resources, they lacked visibility, control and security needed for production deployments. In their session at 18th Cloud Expo, Steve Anderson, Product Manager at BMC Software, and Rick Lefort, Principal Technical Marketing Consultant at BMC Software, will discuss how a cloud designed for production operations not only helps accelerate developer...
May. 5, 2016 05:00 PM EDT Reads: 1,375
A critical component of any IoT project is the back-end systems that capture data from remote IoT devices and structure it in a way to answer useful questions. Traditional data warehouse and analytical systems are mature technologies that can be used to handle large data sets, but they are not well suited to many IoT-scale products and the need for real-time insights. At Fuze, we have developed a backend platform as part of our mobility-oriented cloud service that uses Big Data-based approache...
May. 5, 2016 04:00 PM EDT Reads: 780
Peak 10, Inc., has announced the implementation of IT service management, a business process alignment initiative based on the widely adopted Information Technology Infrastructure Library (ITIL) framework. The implementation of IT service management enhances Peak 10’s current service-minded approach to IT delivery by propelling the company to deliver higher levels of personalized and prompt service. The majority of Peak 10’s operations employees have been trained and certified in the ITIL frame...
May. 5, 2016 04:00 PM EDT Reads: 1,197
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
May. 5, 2016 03:45 PM EDT Reads: 740
As the rapid adoption of containers continues, companies are finding that they lack the operational tools to understand the behavior of applications deployed in these containers, and how to identify issues in their application infrastructure. For example, how are multiple containers within an application impacting each other’s performance? If an application’s service is degraded, which container is to blame? In the case of an application outage, what was the root cause of the outage?
May. 5, 2016 03:00 PM EDT Reads: 1,184
Digital payments using wearable devices such as smart watches, fitness trackers, and payment wristbands are an increasing area of focus for industry participants, and consumer acceptance from early trials and deployments has encouraged some of the biggest names in technology and banking to continue their push to drive growth in this nascent market. Wearable payment systems may utilize near field communication (NFC), radio frequency identification (RFID), or quick response (QR) codes and barcodes...
May. 5, 2016 02:45 PM EDT Reads: 1,069
SYS-CON Events announced today that CollabNet (www.collabnet.com) a global leader in enterprise software development and delivery solutions that help customers create high-quality applications at speed, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. The CEO of CollabNet Flint Brenton will also present about DevOps challenges in today’s global, open, and heterogeneous world of software development.
May. 5, 2016 02:39 PM EDT Reads: 342
SYS-CON Events announced today that Peak 10, Inc., a national IT infrastructure and cloud services provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Peak 10 provides reliable, tailored data center and network services, cloud and managed services. Its solutions are designed to scale and adapt to customers’ changing business needs, enabling them to lower costs, improve performance and focus inter...
May. 5, 2016 02:30 PM EDT Reads: 1,491