SolarWinds Log & Event Manager Integrates Log Collection with Threat Intelligence Feeds
AUSTIN, TX: SolarWinds, provider of hybrid IT infrastructure management software, has enhanced SolarWinds Log & Event Manager- a powerful security information and event management (SIEM) product, by adding a threat intelligence feed to it.
Designed for resource-constrained IT organizations, SolarWinds Log & Event Manager offers threat intelligence data and automatically tags events to ensure that suspicious activity can be identified by simply running a report or search. IT security pros are there to identify known, proven threats and limit the impact of cyber-attacks by analyzing and comparing activity against a list of known malicious threats but now with a new security reality, even IT pros have to assume the worst.
“A breach has already occurred- it is imperative to have constant visibility into known threats in order to quickly detect security issues and limit the loss associated with a data breach. With added threat intelligence, SolarWinds Log & Event Manager now enables IT security pros to take immediate action if a threat is detected and proactively monitor for additional vulnerabilities in their environment,” says Nikki Jennings, Group Vice President, Product Strategy, SolarWinds.
Enhanced SolarWinds Log & Event Manager features out-of-the-box filters and correlation rules that can be customized to alert on specific threats; enables immediate action on any threat detected by disabling network connections; and automatically updates log normalization templates to allow SolarWinds Log & Event Manager to support the most current vendors and devices.
Also, with the threat intelligence, latest Log & Event Manager integrates data from various threat feeds to quickly identify suspicious activity and pinpoint security issues, which comprises malware infections targeting internal hosts; phishing attempts, where internal hosts click on an unsuspecting email and “phone home” to a malicious command and control server; and external attacks from hosts that might be infected themselves.
By Nancy S. Wolk, CIO, Alcoa - Global Business Services
By John Kamin, EVP and CIO, Old National Bancorp
By Gregg T. Martin, VP & CIO, Arnot Health
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
By Bryson Koehler, EVP & CIO, The Weather Company, an IBM...
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Lowell Gilvin, Chief Process Officer, Jabil
By Dennis Hodges, CIO, Inteva Products
By Gerri Martin-Flickinger, CIO, Adobe Systems
By Walter Carvalho, VP& Corporate CIO, Carnival Corporation
By Mary Alice Annecharico, SVP & CIO, Henry Ford Health System
By Bernd Schlotter, President of Services, Unify
By Bob Fecteau, CIO, SAIC
By Kushagra Vaid, GM, Server Engineering, Microsoft
By Steve Beason, Enterprise CTO, Scientific Games
By Steve Bein, VP-GIS, Michael Baker International
By Jason Alan Snyder, CTO, Momentum Worldwide
By Jim Whitehurst, CEO, Red Hat
By Alberto Ruocco, CIO, American Electric Power