What is Security Event Manager?

Log & Event Manager is a fully featured Security Management Software designed to serve Startups, Enterprises. Log & Event Manager provides end-to-end solutions designed for Web App. This online Security Management system offers Remediation, Event Logs, User Activity Monitoring, Compliance Reporting, Syslogs at one place.

Pricing

Security Event Manager Starting Price

$ 4665/Per Month

Awards
Security Event Manager Award

Our Awards and Recognition

More Awards
Need a Little Help?

Talk with a software expert for free. Get a list of software that's great for you in less than 10 minutes.

Key Features of Security Event Manager

Here are the powerful features that make Security Event Manager stand out from the competition. Packed with innovative tools and advanced functionalities, this software offers a range of benefits.

  • Access control
  • Activity Log
  • Activity Monitoring
  • Advanced Firewall
  • AI / Machine Learning
  • Anonymous Browsing
  • Anti Spam
  • Anti Virus
  • Application Access Control
  • Application Security
  • Archiving
  • Asset Discovery
  • Asset Tagging
  • Audit Trail
  • Audit Trails
  • Availability Testing
  • Backup Management
  • Bandwidth Monitoring
  • Baseline Manager
  • Basic Firewall
  • Behavioral Analytics
  • Billing & Invoicing
  • Biometric
  • Compliance Management
  • Compliance Reporting
  • Configuration Management
  • Connectivity Management
  • Consolidation
  • Content Routing
  • Credential Management
  • Customer Management
  • Dashboard
  • Data Export
  • Data Visualization
  • Database Security Audit
  • Defect Tracking
  • Deployment Management
  • Diagnostic Tools
  • DNS Leak Protection
  • Document Imaging
  • eDiscovery
  • Email Attachment Protection
  • Encryption
  • Endpoint Management
  • Event Logs
  • Event Tracking
  • Event-Based Notifications
  • File Access Control
  • File Integrity Monitoring
  • Financial Data Protection
  • Firewall
  • Forensic Analysis
  • FTP Monitoring
  • Full Transaction Diagnostics
  • Granular Access Controls
  • Health Monitoring
  • Incident Management
  • Internet Security
  • Internet Usage Monitoring
  • Intrusion Detection System
  • Inventory Management
  • IP Address Monitoring
  • IP Protection
  • Job Costing
  • Kill Switch
  • Lead management
  • Least Privilege
  • Log Management
  • Maintenance Scheduling
  • Mobile Access
  • Mobile Authentication
  • Multi-Language
  • Multi-Protocol
  • Multifactor Authentication
  • Network Diagnosis
  • Network Logs
  • Network Monitoring
  • Network Scanning
  • Password Management
  • Password Protection
  • Patch Management
  • PCI Assessment
  • Peer-to-Peer
  • Performance Control
  • Performance Metrics
  • Policy Management
  • Predefined Protocols
  • Prioritization
  • Quarantine
  • Quotes / Estimates
  • Real Time Monitoring
  • Real-Time Reporting & Dashboards
  • Real-time Scheduling
  • Redundancy Checking
  • Release Management
  • Remediation
  • Remote Access
  • Reporting/Analytics
  • Reverse Proxy
  • Risk Assessment
  • Risk Management
  • Role based management
  • Root-Cause Diagnosis
  • Schedulers
  • Scheduling
  • Security Event Log
  • Sensitive Data Identification
  • Server Performance
  • Signature Matching
  • Single Sign On
  • SLA Monitoring
  • Spyware Removal
  • SSL Offload
  • Subscriber Management
  • Syslogs
  • Threat Intelligence
  • Threat Protection
  • Thresholds
  • Trace individual transactions
  • Transaction Monitoring
  • Two-Factor Authentication
  • Uptime Reporting
  • User Activity Monitoring
  • User Friendly Webportal
  • User Management
  • Version Control
  • Virtual Machine Monitoring
  • Virus Definition Update
  • Vulnerability Assessment
  • Vulnerability Management
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Inspection
  • Web Logs
  • Web Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Whitelisting / Blacklisting
  • Work Order Management
Show More
  • Address Book
  • AI / Machine Learning
  • Application Security
  • Archive Messages
  • Archiving
  • Audit Trails
  • Automatic Backup
  • Automatic Message Forwarding
  • Availability Testing
  • Behavioral Analytics
  • Call Follow Up
  • Call History
  • Caller Autocomplete
  • Color-Coded Messages
  • Compliance Reporting
  • Connect Remotely
  • Consolidation
  • CPU Monitoring
  • Data Analysis
  • Data Capture
  • Data Encryption
  • Data Integration
  • Data Quality Control
  • Data Visualization
  • Database Servers
  • Document Management
  • Email Monitoring
  • Endpoint Management
  • Event Logs
  • Event Tracking
  • Event-Based Notifications
  • Export Contacts
  • File Integrity Monitoring
  • Folders Management
  • Forensic Analysis
  • Forward and Reply
  • Groups
  • History Tracking
  • Import Contacts
  • Inbox Filtering
  • Inbox Management
  • Incident Management
  • Internet Usage Monitoring
  • Intrusion Detection System
  • IP Protection
  • Log Management
  • Log Phone Calls
  • Login Options
  • Mail Server Monitoring
  • Match & Merge
  • Message Notifications
  • Message Printing
  • Message Receipts
  • Message Statistics
  • Multiple Inbox Access
  • Multiple Recipients
  • Network Logs
  • Network Monitoring
  • Online Training
  • Open Multiple Messages
  • Performance Metrics
  • Real Time Monitoring
  • Remediation
  • Reminders
  • Reports
  • Sensitive Data Identification
  • Status Icons
  • Syslogs
  • Threat Intelligence
  • Thresholds
  • Transaction Monitoring
  • Undelete Messages
  • Uptime Reporting
  • User Activity Monitoring
  • Virtual Machine Monitoring
  • Vulnerability Scanning
  • Web Logs
  • Web Threat Management
  • Web Traffic Reporting
Show More
  • Activity Log
  • AI / Machine Learning
  • AI Security
  • Anti Virus
  • Anti-Spyware
  • Antivirus
  • Application Security
  • Asset Discovery
  • Asset Tagging
  • Audit Trail
  • Behavioral Analytics
  • Biometric
  • Blue Team Tools
  • Compliance Management
  • Compliance Reporting
  • Content Caching
  • Content Disarm & Reconstruction (CDR)
  • Content Routing
  • Credential Management
  • Cyber Insurance
  • Cyber Risk Management
  • Cybersecurity
  • Dark Web Monitoring
  • Data Classification
  • Data Compression
  • Data Discovery
  • Data Governance
  • Data Security
  • Data Security Posture Management (DSPM)
  • Database Security Audit
  • Device management
  • Employee Identity Theft Protection
  • Encryption
  • Endpoint Management
  • Endpoint protection
  • Event Logs
  • Event-Based Notifications
  • Extended Detection and Response (XDR)
  • File Access Control
  • Financial Data Protection
  • Forensic Analysis
  • Health Monitoring
  • Incident Management
  • Incident Response
  • Insider Threat Management
  • Intrusion detection and prevention
  • Intrusion Detection System
  • IOC Verification
  • IoT Security
  • Log Management
  • Malware Analysis
  • Mobile Authentication
  • Mobile Data Security
  • Multifactor Authentication
  • Network Detection and Response (NDR)
  • Network Scanning
  • Network security
  • Network Traffic Analysis (NTA)
  • Out-of-Band Authentication
  • Password Management
  • Patch Management
  • Policy Management
  • Prioritization
  • Real Time Monitoring
  • Redundancy Checking
  • Reverse Proxy
  • Risk Management
  • Security Event Log
  • Security Orchestration
  • Automation and Response (SOAR)
  • Self Service Portal
  • Sensitive Data Identification
  • SIEM
  • Signature Matching
  • Threat Intelligence
  • Threat Modeling
  • Tokenization
  • Transaction Monitoring
  • User Activity Monitoring
  • User and Entity Behavior Analytics (UEBA)
  • VPN
  • Vulnerability Assessment
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Scanning
  • Web Threat Management
  • Whitelisting / Blacklisting
Show More
  • Access control
  • PCI Assessment
  • Policy Management
  • Advanced persistent threat (APT) protection
  • Antivirus and malware protection
  • Application control and whitelisting
  • Data backup and recovery
  • Data encryption at rest and in transit
  • Data loss prevention (DLP)
  • Endpoint protection and device control
  • Firewall protection
  • Identity and access management (IAM)
  • Incident response and threat intelligence
  • Intrusion detection and prevention system (IDS/IPS)
  • Log management and auditing
  • Network anomaly detection
  • Network encryption (SSL/TLS)
  • Network forensics and packet analysis
  • Network load balancing and failover
  • Network segmentation and isolation
  • Network traffic monitoring and analysis
  • Secure email and messaging
  • Secure file transfer protocols (SFTP)
  • Secure remote access
  • Security assessment and compliance
  • Security incident response automation
  • Security information and event management (SIEM)
  • Security policy management
  • Two-factor authentication (2FA)
  • User behavior analytics (UBA)
  • Virtual private network (VPN) support
  • Vulnerability scanning and assessment
  • Web filtering and content control
  • Wireless network security
Show More

Security Event Manager Screenshots

Security Event Manager Pricing

Here are the pricing plans for Security Event Manager. Choose the plan that best fits your requirements and budget. Get Detailed Security Event Manager pricing as per your requirements.

Standard
$ 4665
Per Month
  • Integrated compliance reporting tools
  • Event-time correlation of security events
  • Automated threat remediation
  • Advanced search and forensic analysis
  • File integrity monitoring
  • USB device monitoring
Pricing

Security Event Manager Specifications

Get a closer look at the technical specifications and system requirements for Security Event Manager. Find out if it's compatible with your operating system and other software.

Deployment :
On Premises
Subscription Plan :
Monthly, Yearly
Accessibility :
API
Customization
Mobile Support
Desktop Platforms :
Web app
Windows
Language Support :
English
Business :
StartUps
SMBs
Agencies
Enterprises
Available Support :
Email
Company Details :
Company Name : SolarWinds Worldwide LLC.
Headquarter : Austin, Texas
Website : Visit Website
SolarWinds Worldwide LLC. logo
Do you work for SolarWinds Worldwide LLC.?
Claim This Profile

Security Event Manager Videos

Security Event Manager Reviews (0)

Ask a question

No reviews yet. Rate this app or be the first to review.

Write a Review

Alternatives of Security Event Manager

Explore alternative software options that can fulfill similar requirements as Security Event Manager. Evaluate their features, pricing, and user feedback to find the perfect fit for your needs.

Security Event Manager FAQs

How much does Security Event Manager cost?

The starting price of Security Event Manager is ₹ 335880/Per Month. It has different pricing plans:

  1. Standard : ₹ 335880/Per Month

The details of Security Event Manager’s free trial have not been shared by the vendor.

What are the top 5 features for Security Event Manager?

The top 5 features for Security Event Manager are:

  • Real Time Monitoring
  • Event Logs
  • User Activity Monitoring
  • Data Visualization
  • Intrusion Detection System

What type of customer support is available from Security Event Manager?

The available support which Security Event Manager provides is:

  • Email
Free Demo Get Pricing
Free Demo