SolarWinds Log & Event Manager Integrates Log Collection with Threat Intelligence Feeds
AUSTIN, TX: SolarWinds, provider of hybrid IT infrastructure management software, has enhanced SolarWinds Log & Event Manager- a powerful security information and event management (SIEM) product, by adding a threat intelligence feed to it.
Designed for resource-constrained IT organizations, SolarWinds Log & Event Manager offers threat intelligence data and automatically tags events to ensure that suspicious activity can be identified by simply running a report or search. IT security pros are there to identify known, proven threats and limit the impact of cyber-attacks by analyzing and comparing activity against a list of known malicious threats but now with a new security reality, even IT pros have to assume the worst.
“A breach has already occurred- it is imperative to have constant visibility into known threats in order to quickly detect security issues and limit the loss associated with a data breach. With added threat intelligence, SolarWinds Log & Event Manager now enables IT security pros to take immediate action if a threat is detected and proactively monitor for additional vulnerabilities in their environment,” says Nikki Jennings, Group Vice President, Product Strategy, SolarWinds.
Enhanced SolarWinds Log & Event Manager features out-of-the-box filters and correlation rules that can be customized to alert on specific threats; enables immediate action on any threat detected by disabling network connections; and automatically updates log normalization templates to allow SolarWinds Log & Event Manager to support the most current vendors and devices.
Also, with the threat intelligence, latest Log & Event Manager integrates data from various threat feeds to quickly identify suspicious activity and pinpoint security issues, which comprises malware infections targeting internal hosts; phishing attempts, where internal hosts click on an unsuspecting email and “phone home” to a malicious command and control server; and external attacks from hosts that might be infected themselves.
By Phil Jarvis, VP, IT, Thirty-One Gifts
By Dr.Chris Ewell, CISO, Seattle Children
By Eloise Young, CIO, Philadelphia Gas Works
By Phil Stevens, CIO, The Exchange
By Herman Nell, SVP & CIO, Rent-A-Center
By John Honeycutt, CTO, Discovery Communications
By Mark Wead, Chief Enterprise Architect– North America...
By Federico Flórez, Chief Information & Innovation Officer,...
By David Berry, CIO, Daymon Worldwide
By Douglas Turk, Chief Marketing Officer, JLT Speciality
By Tekin Gulsen, CIO, Global IT & Corporate Planning...
By John Sprague, Deputy CTO, IT and the End User Architect,...
By Craig C Shrader, CIO Engagement Partner, Tatum, a...
By Bill Schimikowski, VP, Customer Experience, Fidelity...
By Tom Bressie, Vice President, Oracle Cloud
By Jeff Katz, CTO, Energy & Utilities, IBM [NYSE:IBM]
By Dr Dirk E Mahling, VP, Technology, Alliant Energy
By Steven John, CIO, AmeriPride Services
By Leon Ravenna, CISO, KAR Auction Services, Inc.