Security Event Manager logo

Security Event Manager Claim

Bring IT all together.

Security Event Manager Overview

Security Event Manager is a robust risk management software designed to help organizations identify, assess, and mitigate security threats effectively. It offers a comprehensive platform for monitoring security events, analyzing vulnerabilities, and managing risk assessments with precision and efficiency. Security Event Manager features real-time threat detection, automated incident response, and detailed reporting tools, enabling security teams to stay ahead of potential breaches and ensure compliance with industry standards. The software includes advanced analytics and visualization capabilities, providing insights into security trends, risk exposure, and mitigation effectiveness, facilitating informed decision-making and strategic planning. Additionally, Security Event Manager supports seamless integration with existing security infrastructure, including firewalls, intrusion detection systems, and SIEM solutions, enhancing overall security posture and operational coordination. With its user-friendly interface and powerful functionalities, Security Event Manager empowers organizations to enhance their risk management processes, protect critical assets, and achieve sustained operational integrity through effective security event management solutions.

Read More

Security Event Manager Screenshot & Video

Contact Details

  • Vendor Name SolarWinds
  • Founded 1999
  • Location United States
  • Employees 1000+

Support

  • 24x7 Support 24x7 Support
  • Email Email
  • Phone Phone
  • Chat Chat
  • Knowledge Base Knowledge Base
  • FAQs/Forum FAQs/Forum

Training

  • Live Online Live Online
  • Webinar Webinar
  • Documentation Documentation
  • Videos Videos

Licensing & Deployment

  • Proprietary Proprietary
  • Cloud Hosted Cloud Hosted
  • On-Premise On-Premise
  • Web-Based Web-Based
  • Windows Windows
  • Mac Mac
  • Linux Linux

Typical Customers

  • Self-Employed Self-Employed
  • Small-Business Small-Business
  • Midsize-Business Midsize-Business

Languages Supported

English


You May Also Like

AuditBoard

AuditBoard

Contact Vendor

Diligent One Platform

Diligent One Platform

Contact Vendor

Hyperproof

Hyperproof

Contact Vendor

LogicGate Risk Cloud

LogicGate Risk Cloud

Contact Vendor

Security Event Manager Features

  • Arrow Icon Whitelisting/Blacklisting
  • Arrow Icon Compliance Management
  • Arrow Icon Policy Management
  • Arrow Icon Audit Trail
  • Arrow Icon Real Time Reporting
  • Arrow Icon Single Sign On
  • Arrow Icon Secure Data Storage
  • Arrow Icon Behavior Tracking
  • Arrow Icon Incident Management
  • Arrow Icon Activity Tracking
  • Arrow Icon SSL Security
  • Arrow Icon Patch Management
  • Arrow Icon Endpoint Protection
  • Arrow Icon Risk Alerts
  • Arrow Icon Remote Monitoring & Management
  • Arrow Icon Security Auditing
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon Event Logs
  • Arrow Icon HIPAA Compliant
  • Arrow Icon Server Monitoring
  • Arrow Icon Anti Virus
  • Arrow Icon Authentication
  • Arrow Icon Access Controls/Permissions
  • Arrow Icon Two-Factor Authentication
  • Arrow Icon Threat Response
  • Arrow Icon Data Security
  • Arrow Icon Firewalls
  • Arrow Icon Real Time Monitoring
  • Arrow Icon Compliance Tracking
  • Arrow Icon Activity Dashboard
  • Arrow Icon Anomaly Detection
  • Arrow Icon Log Parsing
  • Arrow Icon Alerts/Escalation
  • Arrow Icon Event Logs
  • Arrow Icon Remediation Management
  • Arrow Icon Audit Trail
  • Arrow Icon Archiving & Retention
  • Arrow Icon Server Monitoring
  • Arrow Icon Data Visualization
  • Arrow Icon Server Logs
  • Arrow Icon Risk Alerts
  • Arrow Icon Log Rotation
  • Arrow Icon Reporting/Analytics
  • Arrow Icon Activity Tracking
  • Arrow Icon Threshold Alerts
  • Arrow Icon Incident Management
  • Arrow Icon HIPAA Compliant
  • Arrow Icon Log Collection
  • Arrow Icon Audit Management
  • Arrow Icon Event Tracking
  • Arrow Icon PCI Compliance
  • Arrow Icon Uptime Reporting
  • Arrow Icon Issue Management
  • Arrow Icon Role-Based Permissions
  • Arrow Icon Policy Management
  • Arrow Icon Secure Data Storage
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon Diagnostic Tools
  • Arrow Icon Application Security
  • Arrow Icon Alerts/Escalation
  • Arrow Icon Real Time Reporting
  • Arrow Icon Behavioral Analytics
  • Arrow Icon Incident Management
  • Arrow Icon Secure Data Storage
  • Arrow Icon Compliance Management
  • Arrow Icon Patch Management
  • Arrow Icon HIPAA Compliant
  • Arrow Icon Risk Analysis
  • Arrow Icon Policy Management
  • Arrow Icon User Management
  • Arrow Icon Encryption
  • Arrow Icon Access Controls/Permissions
  • Arrow Icon Server Monitoring
  • Arrow Icon Event Logs
  • Arrow Icon Remote Monitoring & Management
  • Arrow Icon Device Management
  • Arrow Icon Web Threat Management
  • Arrow Icon Security Auditing
  • Arrow Icon Monitoring
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon Anomaly/Malware Detection
  • Arrow Icon Threat Response
  • Arrow Icon Web Traffic Monitoring
  • Arrow Icon IT Incident Management
  • Arrow Icon Reporting/Analytics
  • Arrow Icon Alerts/Notifications
  • Arrow Icon Server Monitoring
  • Arrow Icon Threat Intelligence
  • Arrow Icon Dashboard
  • Arrow Icon Policy Management
  • Arrow Icon Third-Party Integrations
  • Arrow Icon Alerts/Notifications
  • Arrow Icon Network Monitoring
  • Arrow Icon Hardware Integration
  • Arrow Icon Intrusion Prevention System
  • Arrow Icon VPN
  • Arrow Icon Policy Management
  • Arrow Icon Log Access
  • Arrow Icon Access Management
  • Arrow Icon Next-Generation Firewall
  • Arrow Icon AI/Machine Learning
  • Arrow Icon Content Filtering
  • Arrow Icon Intrusion Detection System
  • Arrow Icon Data Visualization
  • Arrow Icon Activity Dashboard
  • Arrow Icon Log Analysis
  • Arrow Icon Reporting/Analytics
  • Arrow Icon Alerts/Notifications
  • Arrow Icon Search/Filter
  • Arrow Icon Log Collection
  • Arrow Icon Pattern Detection and Recognition
  • Arrow Icon Customizable Dashboard
  • Arrow Icon Data Analysis Tools
  • Arrow Icon Correlation Analysis
  • Arrow Icon Anomaly Detection
  • Arrow Icon Audit Management
  • Arrow Icon Visual Analytics
  • Arrow Icon Event Logs
  • Arrow Icon Event Tracking
  • Arrow Icon Reporting & Statistics
  • Arrow Icon Audit Trail
  • Arrow Icon Continuous Monitoring
  • Arrow Icon Analytics
  • Arrow Icon Real-Time Analytics
  • Arrow Icon Data Classification
  • Arrow Icon Tagging
  • Arrow Icon Dashboard
  • Arrow Icon Monitoring
  • Arrow Icon Policy Management
  • Arrow Icon Threat Response
  • Arrow Icon Event Logs
  • Arrow Icon VPN
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon Activity Monitoring
  • Arrow Icon Audit Trail
  • Arrow Icon Patch Management
  • Arrow Icon Compliance Management
  • Arrow Icon Firewalls
  • Arrow Icon Real-Time Monitoring
  • Arrow Icon Risk Alerts
  • Arrow Icon Access Controls/Permissions
  • Arrow Icon Intrusion Detection System
  • Arrow Icon Reporting/Analytics
  • Arrow Icon Anti Virus
  • Arrow Icon Policy Management
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon File Integrity Monitoring
  • Arrow Icon PCI Compliance
  • Arrow Icon PCI Assessment
  • Arrow Icon Risk Alerts
  • Arrow Icon Log Management
  • Arrow Icon Compliance Tracking
  • Arrow Icon Access Controls/Permissions
  • Arrow Icon Compliance Management
  • Arrow Icon Event Logs
  • Arrow Icon Exceptions Management
  • Arrow Icon Intrusion Detection System
  • Arrow Icon Audit Trail
  • Arrow Icon Activity Monitoring
  • Arrow Icon Risk Scoring
  • Arrow Icon Audit Management
  • Arrow Icon Predictive Analytics
  • Arrow Icon Exceptions Management
  • Arrow Icon Mobile Access
  • Arrow Icon Business Process Control
  • Arrow Icon Legal Risk Management
  • Arrow Icon Alerts/Notifications
  • Arrow Icon Operational Risk Management
  • Arrow Icon Compliance Management
  • Arrow Icon Corrective and Preventive Actions (CAPA)
  • Arrow Icon Internal Controls Management
  • Arrow Icon Risk Assessment
  • Arrow Icon IT Risk Management
  • Arrow Icon Reputational Risk Management
  • Arrow Icon Response Management
  • Arrow Icon Incident Management
  • Arrow Icon Audit Trail
  • Arrow Icon Risk Analysis
  • Arrow Icon Reporting/Analytics
  • Arrow Icon Document Management
  • Arrow Icon Document Storage
  • Arrow Icon Risk Alerts
  • Arrow Icon Endpoint Management
  • Arrow Icon Application Security
  • Arrow Icon Behavioral Analytics
  • Arrow Icon Real-Time Monitoring
  • Arrow Icon Network Monitoring
  • Arrow Icon Threat Intelligence
  • Arrow Icon Event Logs
  • Arrow Icon File Integrity Monitoring
  • Arrow Icon Compliance Tracking
  • Arrow Icon Log Management
  • Arrow Icon Alerts/Notifications
  • Arrow Icon Network Provisioning
  • Arrow Icon Threat Response
  • Arrow Icon Prioritization
  • Arrow Icon Reporting/Analytics
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon Network Monitoring
  • Arrow Icon Server Monitoring
  • Arrow Icon Activity Dashboard
  • Arrow Icon Web-Application Security
  • Arrow Icon Incident Reporting
  • Arrow Icon Alerts/Notifications
  • Arrow Icon Application Security
  • Arrow Icon Data Visualization
  • Arrow Icon Monitoring
  • Arrow Icon Real-Time Data

Security Event Manager Pricing

Pricing Type

  • Pricing Type Per Feature

Preferred Currency

  • USD ($) USD ($)

Free Trial

  • Free Trial Available

Free Version

  • NA

Payment Frequency

  • One-Time Payment One-Time Payment

Plans & Packages

Basic

$5093 Per Feature

Security Event Manager FAQs

Security Event Manager is a robust risk management software designed to help organizations identify, assess, and mitigate security threats effectively. It offers a comprehensive platform for monitoring security events, analyzing vulnerabilities, and managing risk assessments with precision and efficiency. Security Event Manager features real-time threat detection, automated incident response, and detailed reporting tools, enabling security teams to stay ahead of potential breaches and ensure compliance with industry standards. The software includes advanced analytics and visualization capabilities, providing insights into security trends, risk exposure, and mitigation effectiveness, facilitating informed decision-making and strategic planning. Additionally, Security Event Manager supports seamless integration with existing security infrastructure, including firewalls, intrusion detection systems, and SIEM solutions, enhancing overall security posture and operational coordination. With its user-friendly interface and powerful functionalities, Security Event Manager empowers organizations to enhance their risk management processes, protect critical assets, and achieve sustained operational integrity through effective security event management solutions.

  • No, Security Event Manager does not offer a free version.

  • Yes, Security Event Manager offers a free trial.

  • No, Credit Card details are not required for the Security Event Manager trial.

  • Security Event Manager offers the following pricing plans & packages:

    Basic

    $5093 Per Feature

  • Security Event Manager supports the following payment frequencies:

    • One-Time Payment

  • No, Security Event Manager does not offer an API.

  • Security Event Manager offers support with the following options:
    • 24x7 Support , Email , Phone , Chat , Knowledge Base , FAQs/Forum

  • Security Event Manager offers training with the following options:
    • Live Online , Webinar , Documentation , Videos

  • Security Event Manager supports the following languages:
    • English

  • Following are the typical users of the Security Event Manager:
    • Self-Employed , Small-Business , Midsize-Business

  • Security Event Manager supports the following deployment:
    • Cloud Hosted , On-Premise

  • Security Event Manager supports the following devices and operating systems:
    • Web-Based , Windows , Mac , Linux