{"id":4492,"date":"2023-02-07T00:00:00","date_gmt":"2023-02-07T00:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2018\/11\/05\/solarwinds-log-event-manager-siem-product-overview-and-insight\/"},"modified":"2023-11-13T14:25:58","modified_gmt":"2023-11-13T14:25:58","slug":"solarwinds-log-event-manager","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/","title":{"rendered":"SolarWinds Security Event Manager &#8211; SIEM Product Overview and Insight"},"content":{"rendered":"<div id=\"article-content\">\n<p>SolarWinds lacks the full security suite presence of some competitors, but is well-integrated across a variety of bonus IT operation capabilities such as threat intelligence platform capabilities, privileged access management, USB security, and botnet detection.<\/p>\n<p>These additional capabilities make\u00a0 the SolarWinds SEM a good fit for SMEs who may lack their own internal security teams \u2014 and particularly those looking for integrated IT management capabilities too. The company targets tightly resourced, budget-conscious security teams, in organizations with up to 10,000 employees, and often cites compliance as a driver.<\/p>\n<\/div>\n\n\n<div class=\"wp-block-buttons alignwide is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50 has-custom-font-size is-style-outline td_btn_large has-large-font-size is-style-outline--de0c0cfc352d80d328521583722f56f2\"><a class=\"wp-block-button__link has-white-color has-luminous-vivid-orange-background-color has-text-color has-background wp-element-button\" href=\"https:\/\/link.technologyadvice.com\/r\/solarwinds-esp-solarwinds-log-event-manager\" style=\"border-radius:38px\" target=\"_blank\" rel=\"noopener nofollow sponsored\">Visit SolarWinds<\/a><\/div>\n<\/div>\n\n\n<\/p>\n<p><em>For a comparison with other products, see:\u00a0<\/em><\/p>\n<ul>\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/siem-tools\/\" target=\"_blank\" rel=\"noopener\">Top 10 SIEM Products<\/a><\/li>\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/threat-intelligence-platforms\/\" target=\"_blank\" rel=\"noopener\">Top Threat Intelligence Companies<\/a><\/li>\n<\/ul>\n<h2>Company Description<\/h2>\n<p>Since 1999, SolarWinds has been providing management and monitoring software for security, <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security\/\">networks<\/a>, servers, applications, storage, databases, virtualization and the cloud. It trades on the NYSE under the symbol SWI.<\/p>\n<h2>Product Description<\/h2>\n<p>SolarWinds Security Event Manager (SEM) is composed of several key elements:<\/p>\n<ul>\n<li>Manager for central management, log and event management, and storage<\/li>\n<li>Console and user interface<\/li>\n<li>SEM Agents for real-time event collection from endpoints, encryption and compression of data<\/li>\n<\/ul>\n<p>Network traffic, application, and virtualized platform monitoring can be tied into SEM through the SolarWinds Virtualization Manager, the Network Performance Monitor, and the Server &amp; Application Monitor. SolarWinds Security Event Manager (SEM) 2022.4 supports log forwarding to other applications, as well as SolarWinds SEM deployments on Azure.<\/p>\n<h2>SolarWinds SIEM Features Rated<\/h2>\n<p><strong>Threats Blocked: <\/strong>Good. SEM ships with hundreds of predefined correlation rules, including authentication, change management, network attacks, and more. SolarWinds SEM also integrates with online threat feeds and can notify and respond to inbound\/outbound traffic and authentication attempts with known bad IP addresses for threats such as ransomware, malware, spam, phishing, and more.<\/p>\n<p><strong>Breadth of Sources:<\/strong> Very good. SolarWinds SEM includes seven hundred log parsers. There is a process in place for users to request new connectors or updates to existing connectors. SolarWinds SEM supports a variety of event sources, including nonevent data sources that can be integrated into its analytics and correlation rules.<\/p>\n<p><strong>Throughput:<\/strong> Good. While SolarWinds SEM can support several thousand nodes, it rarely sees users exceed 2,000 EPS. Most customers store between 2 to 8 TB of data, but users have the option of scaling beyond 8 TB.<\/p>\n<p><strong>Value:<\/strong> Good. SolarWinds provides good value in overall cost and time to implement.<\/p>\n<p><strong>Implementation:<\/strong> Best. Users praise the product\u2019s ease of implementation. SolarWinds SEM is deployed as a self-contained virtual appliance, which includes the SolarWinds SEM database, correlation engine, and all other components required. It can be deployed typically within minutes. Analysts have complimented SolarWinds on its simple architecture, easy licensing, and robust out-of-the-box content and features.<\/p>\n<p><strong>Management:<\/strong> Good. Ease of use is an area of frequent praise, but there are some limitations in its ability to integrate with third-party advanced threat detection, threat intelligence feeds and User Behavior Analytics (UBA) tools.<\/p>\n<p><strong>Support:<\/strong> Very good. SolarWinds has been recognized for its technical support and customer success programs globally. An assisted onboarding program provides access to implementation experts who work with users to understand their goals, assist in installing and configuring the product, and help optimize their environments based on business needs.<\/p>\n<p><strong>Scalability:<\/strong> Good. SEM\u2019s architecture scales horizontally to support thousands of nodes, but may not scale as well vertically.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/solarwinds-log-event-manager-siem-product-overview-and-insight_5facbf13c36b4.jpeg\" alt=\"SolarWinds SIEM\" width=\"846\" height=\"252\" \/><\/p>\n<h2>Intelligence<\/h2>\n<p><a href=\"https:\/\/link.technologyadvice.com\/r\/solarwinds-esp-solarwinds-log-event-manager\" target=\"_blank\" rel=\"noopener nofollow sponsored\">SolarWinds<\/a> Security Event Manager customers leverage pre-defined correlation rules targeted at user and system change monitoring. These rules include direct change auditing (user permission, metadata, group memberships, etc.) and system change auditing (policies, files, etc.). Thresholds for behavior can be applied to differentiate normal from abnormal behavior.<\/p>\n<h2>Delivery<\/h2>\n<p>Virtual appliance for VMware and Hyper-V platforms, plus a deployment option for Azure.<\/p>\n<h2>Agents<\/h2>\n<p>The SolarWinds SIEM platform employs agents.<\/p>\n<h2>Pricing<\/h2>\n<p><a href=\"https:\/\/link.technologyadvice.com\/r\/solarwinds-esp-solarwinds-log-event-manager\" target=\"_blank\" rel=\"noopener nofollow sponsored\">SolarWinds<\/a> SEM does not explicitly list pricing on their website, however, they allow potential customers to browse products and <a href=\"https:\/\/www.solarwinds.com\/onlinequotes\/#\/addProduct\" target=\"_blank\" rel=\"noopener\">generate a quote<\/a>. Subscription licenses for one to five years start at $2,877; perpetual licenses start at $5,607 for the software and one year of support with options to purchase yearly ongoing maintenance and support.<\/p>\n<p>The SolarWinds license is based upon the number of nodes (server, network device, desktop, laptop, etc.) sending log and event information and tiered pricing is available for bulk-use discounts or multiple-software license discounts. License costs include log management, agents, connectors, file integrity monitoring, USB Defender, external threat feeds, and all SIEM components.<\/p>\n<p>A Workstation Edition license enables SolarWinds SEM customers to extend deployments to Windows workstations. Consulting and professional services are typically not required.<\/p>\n\n\n<div class=\"wp-block-buttons alignwide is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-2 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50 has-custom-font-size is-style-outline td_btn_large has-large-font-size is-style-outline--de0c0cfc352d80d328521583722f56f2\"><a class=\"wp-block-button__link has-white-color has-luminous-vivid-orange-background-color has-text-color has-background wp-element-button\" href=\"https:\/\/link.technologyadvice.com\/r\/solarwinds-esp-solarwinds-log-event-manager\" style=\"border-radius:38px\" target=\"_blank\" rel=\"noopener nofollow sponsored\">Visit SolarWinds<\/a><\/div>\n<\/div>\n\n\n<p><em>For more analysis of SolarWinds Security Event Manager, see <\/em><a href=\"https:\/\/www.esecurityplanet.com\/products\/solarwinds-vs-splunk\/\" target=\"_blank\" rel=\"noopener\"><strong><em>SolarWinds vs Splunk: Top SIEM Solutions Compared<\/em><\/strong><\/a>.<\/p>\n<p><em>This article was originally written by <\/em><a href=\"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/\" target=\"_blank\" rel=\"noopener\"><em>Drew Robb<\/em><\/a><em> on November 5, 2018, and updated by <\/em><a href=\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\" target=\"_blank\" rel=\"noopener\"><em>Chad Kime<\/em><\/a><em> on February 7, 2023.<\/em><\/p>\n<\/div>\n\n<div id=\"ta-campaign-widget-66d6d42ecf793-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d42ecf793\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d42ecf793\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d42ecf793\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d42ecf793\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d42ecf793\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d42ecf793\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>SolarWinds lacks the full security suite presence of some competitors, but is well-integrated across a variety of bonus IT operation capabilities such as threat intelligence platform capabilities, privileged access management, USB security, and botnet detection. These additional capabilities make\u00a0 the SolarWinds SEM a good fit for SMEs who may lack their own internal security teams [&hellip;]<\/p>\n","protected":false},"author":213,"featured_media":26190,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[17],"tags":[3483,11623,7575],"b2b_audience":[34],"b2b_industry":[],"b2b_product":[395,375],"class_list":["post-4492","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","tag-siem","tag-solarwinds","tag-threat-intelligence","b2b_audience-evaluation-and-selection","b2b_product-firewalls-and-intrusion-prevention-and-detection","b2b_product-security-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SolarWinds Security Event Manager - SIEM Product Analysis<\/title>\n<meta name=\"description\" content=\"We review SolarWinds Security Event Manager, an easy to use, lower-cost SIEM with automated incident response and threat intelligence.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SolarWinds Security Event Manager - SIEM Product Analysis\" \/>\n<meta property=\"og:description\" content=\"We review SolarWinds Security Event Manager, an easy to use, lower-cost SIEM with automated incident response and threat intelligence.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-07T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-13T14:25:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/01\/solarwinds_ncm-dashboard.png\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Drew Robb\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Drew Robb\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/\"},\"author\":{\"name\":\"Drew Robb\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\"},\"headline\":\"SolarWinds Security Event Manager &#8211; SIEM Product Overview and Insight\",\"datePublished\":\"2023-02-07T00:00:00+00:00\",\"dateModified\":\"2023-11-13T14:25:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/\"},\"wordCount\":773,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/01\/solarwinds_ncm-dashboard.png\",\"keywords\":[\"SIEM\",\"Solarwinds\",\"Threat Intelligence\"],\"articleSection\":[\"Products\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/\",\"name\":\"SolarWinds Security Event Manager - SIEM Product Analysis\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/01\/solarwinds_ncm-dashboard.png\",\"datePublished\":\"2023-02-07T00:00:00+00:00\",\"dateModified\":\"2023-11-13T14:25:58+00:00\",\"description\":\"We review SolarWinds Security Event Manager, an easy to use, lower-cost SIEM with automated incident response and threat intelligence.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/01\/solarwinds_ncm-dashboard.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/01\/solarwinds_ncm-dashboard.png\",\"width\":960,\"height\":540,\"caption\":\"Solarwinds Network Configuration Manager dashboard\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SolarWinds Security Event Manager &#8211; SIEM Product Overview and Insight\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\",\"name\":\"Drew Robb\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"caption\":\"Drew Robb\"},\"description\":\"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SolarWinds Security Event Manager - SIEM Product Analysis","description":"We review SolarWinds Security Event Manager, an easy to use, lower-cost SIEM with automated incident response and threat intelligence.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/","og_locale":"en_US","og_type":"article","og_title":"SolarWinds Security Event Manager - SIEM Product Analysis","og_description":"We review SolarWinds Security Event Manager, an easy to use, lower-cost SIEM with automated incident response and threat intelligence.","og_url":"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/","og_site_name":"eSecurity Planet","article_published_time":"2023-02-07T00:00:00+00:00","article_modified_time":"2023-11-13T14:25:58+00:00","og_image":[{"width":960,"height":540,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/01\/solarwinds_ncm-dashboard.png","type":"image\/png"}],"author":"Drew Robb","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Drew Robb","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/"},"author":{"name":"Drew Robb","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2"},"headline":"SolarWinds Security Event Manager &#8211; SIEM Product Overview and Insight","datePublished":"2023-02-07T00:00:00+00:00","dateModified":"2023-11-13T14:25:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/"},"wordCount":773,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/01\/solarwinds_ncm-dashboard.png","keywords":["SIEM","Solarwinds","Threat Intelligence"],"articleSection":["Products"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/","url":"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/","name":"SolarWinds Security Event Manager - SIEM Product Analysis","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/01\/solarwinds_ncm-dashboard.png","datePublished":"2023-02-07T00:00:00+00:00","dateModified":"2023-11-13T14:25:58+00:00","description":"We review SolarWinds Security Event Manager, an easy to use, lower-cost SIEM with automated incident response and threat intelligence.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/01\/solarwinds_ncm-dashboard.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/01\/solarwinds_ncm-dashboard.png","width":960,"height":540,"caption":"Solarwinds Network Configuration Manager dashboard"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/products\/solarwinds-log-event-manager\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"SolarWinds Security Event Manager &#8211; SIEM Product Overview and Insight"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2","name":"Drew Robb","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","caption":"Drew Robb"},"description":"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.","url":"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/4492"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/213"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=4492"}],"version-history":[{"count":6,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/4492\/revisions"}],"predecessor-version":[{"id":32800,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/4492\/revisions\/32800"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/26190"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=4492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=4492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=4492"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=4492"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=4492"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=4492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}