What is SolarWinds Threat Monitor?

It is an MSP management software and an MSP monitoring software that provides services for different agencies if forums like data protection, compliance reporting, IP protection and activity monitoring on the same platform.

Pricing

SolarWinds Threat Monitor Starting Price

Awards
SolarWinds Threat Monitor Award

Our Awards and Recognition

More Awards
Need a Little Help?

Talk with a software expert for free. Get a list of software that's great for you in less than 10 minutes.

Key Features of SolarWinds Threat Monitor

Here are the powerful features that make SolarWinds Threat Monitor stand out from the competition. Packed with innovative tools and advanced functionalities, this software offers a range of benefits.

  • Access control
  • Activity Log
  • Activity Monitoring
  • Advanced Firewall
  • AI / Machine Learning
  • Anonymous Browsing
  • Anti Spam
  • Anti Virus
  • Application Access Control
  • Application Security
  • Archiving
  • Asset Discovery
  • Asset Tagging
  • Audit Trail
  • Audit Trails
  • Availability Testing
  • Backup Management
  • Bandwidth Monitoring
  • Baseline Manager
  • Basic Firewall
  • Behavioral Analytics
  • Billing & Invoicing
  • Biometric
  • Compliance Management
  • Compliance Reporting
  • Configuration Management
  • Connectivity Management
  • Consolidation
  • Content Routing
  • Credential Management
  • Customer Management
  • Dashboard
  • Data Export
  • Data Visualization
  • Database Security Audit
  • Defect Tracking
  • Deployment Management
  • Diagnostic Tools
  • DNS Leak Protection
  • Document Imaging
  • eDiscovery
  • Email Attachment Protection
  • Encryption
  • Endpoint Management
  • Event Logs
  • Event Tracking
  • Event-Based Notifications
  • File Access Control
  • File Integrity Monitoring
  • Financial Data Protection
  • Firewall
  • Forensic Analysis
  • FTP Monitoring
  • Full Transaction Diagnostics
  • Granular Access Controls
  • Health Monitoring
  • Incident Management
  • Internet Security
  • Internet Usage Monitoring
  • Intrusion Detection System
  • Inventory Management
  • IP Address Monitoring
  • IP Protection
  • Job Costing
  • Kill Switch
  • Lead management
  • Least Privilege
  • Log Management
  • Maintenance Scheduling
  • Mobile Access
  • Mobile Authentication
  • Multi-Language
  • Multi-Protocol
  • Multifactor Authentication
  • Network Diagnosis
  • Network Logs
  • Network Monitoring
  • Network Scanning
  • Password Management
  • Password Protection
  • Patch Management
  • PCI Assessment
  • Peer-to-Peer
  • Performance Control
  • Performance Metrics
  • Policy Management
  • Predefined Protocols
  • Prioritization
  • Quarantine
  • Quotes / Estimates
  • Real Time Monitoring
  • Real-Time Reporting & Dashboards
  • Real-time Scheduling
  • Redundancy Checking
  • Release Management
  • Remediation
  • Remote Access
  • Reporting/Analytics
  • Reverse Proxy
  • Risk Assessment
  • Risk Management
  • Role based management
  • Root-Cause Diagnosis
  • Schedulers
  • Scheduling
  • Security Event Log
  • Sensitive Data Identification
  • Server Performance
  • Signature Matching
  • Single Sign On
  • SLA Monitoring
  • Spyware Removal
  • SSL Offload
  • Subscriber Management
  • Syslogs
  • Threat Intelligence
  • Threat Protection
  • Thresholds
  • Trace individual transactions
  • Transaction Monitoring
  • Two-Factor Authentication
  • Uptime Reporting
  • User Activity Monitoring
  • User Friendly Webportal
  • User Management
  • Version Control
  • Virtual Machine Monitoring
  • Virus Definition Update
  • Vulnerability Assessment
  • Vulnerability Management
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Inspection
  • Web Logs
  • Web Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Whitelisting / Blacklisting
  • Work Order Management
Show More
  • Address Book
  • AI / Machine Learning
  • Application Security
  • Archive Messages
  • Archiving
  • Audit Trails
  • Automatic Backup
  • Automatic Message Forwarding
  • Availability Testing
  • Behavioral Analytics
  • Call Follow Up
  • Call History
  • Caller Autocomplete
  • Color-Coded Messages
  • Compliance Reporting
  • Connect Remotely
  • Consolidation
  • CPU Monitoring
  • Data Analysis
  • Data Capture
  • Data Encryption
  • Data Integration
  • Data Quality Control
  • Data Visualization
  • Database Servers
  • Document Management
  • Email Monitoring
  • Endpoint Management
  • Event Logs
  • Event Tracking
  • Event-Based Notifications
  • Export Contacts
  • File Integrity Monitoring
  • Folders Management
  • Forensic Analysis
  • Forward and Reply
  • Groups
  • History Tracking
  • Import Contacts
  • Inbox Filtering
  • Inbox Management
  • Incident Management
  • Internet Usage Monitoring
  • Intrusion Detection System
  • IP Protection
  • Log Management
  • Log Phone Calls
  • Login Options
  • Mail Server Monitoring
  • Match & Merge
  • Message Notifications
  • Message Printing
  • Message Receipts
  • Message Statistics
  • Multiple Inbox Access
  • Multiple Recipients
  • Network Logs
  • Network Monitoring
  • Online Training
  • Open Multiple Messages
  • Performance Metrics
  • Real Time Monitoring
  • Remediation
  • Reminders
  • Reports
  • Sensitive Data Identification
  • Status Icons
  • Syslogs
  • Threat Intelligence
  • Thresholds
  • Transaction Monitoring
  • Undelete Messages
  • Uptime Reporting
  • User Activity Monitoring
  • Virtual Machine Monitoring
  • Vulnerability Scanning
  • Web Logs
  • Web Threat Management
  • Web Traffic Reporting
Show More
  • Asset Tracking
  • Availability Management
  • Backup Management
  • Billing & Invoicing
  • Change Management
  • Client Portal
  • Configuration Management
  • Contract/License Management
  • CRM
  • Dashboard
  • Help Desk
  • Incident Management
  • Issue Management
  • Patch Management
  • Portfolio Management
  • Problem Management
  • Project Management
  • Proposal Generation
  • Release & Deployment Management
  • Remote Access
  • Remote Systems Monitoring
  • Scheduling
  • Self Service Portal
Show More
  • Device & Port Control
  • Device Access Control
  • Device Application Management
  • Device Authorization and Authentication
  • Device Battery and Power Management
  • Device Compliance Auditing and Reporting
  • Device Compliance Monitoring
  • Device Configuration Management
  • Device Content Filtering and Web Filtering
  • Device Data Backup and Restoration
  • Device Data Encryption
  • Device Firmware Management
  • Device Geofencing and Location-Based Policies
  • Device Grouping and Segmentation
  • Device Integration with Endpoint Protection
  • Device Inventory Auditing
  • Device Inventory Management
  • Device Lockdown and Kiosk Mode
  • Device Locking and Unlocking
  • Device Monitoring
  • Device Performance Monitoring
  • Device Policy Customization
  • Device Policy Enforcement
  • Device Remote Access Management
  • Device Remote Control and Troubleshooting
  • Device Remote Restart and Shutdown
  • Device Remote Wiping
  • Device Security Patch Management
  • Device Software Updates
  • Device Tracking and Location Mapping
  • Device Usage Reporting
  • Device User Activity Logging
  • File Access Control
  • File Shadowing
  • File Tracing
  • File Transfer Control
  • Reports and Audits
  • Temporary Access
  • Trusted Device List
Show More
  • Account Takeover Protection
  • Advanced persistent threat (APT) protection
  • Behavioral Analytics
  • Cyber Risk Management
  • Cyber threat intelligence feeds
  • Dark Web Monitoring
  • Data leakage detection
  • Endpoint Detection and Response (EDR)
  • Extended Detection and Response (XDR)
  • Forensic Analysis
  • Guard against viruses and online threats
  • Incident Response
  • Incident response and threat intelligence
  • Indicator of Compromise (IOC) management
  • Intelligence Reporting
  • IT Security
  • Log Management
  • Malware Analysis
  • Managed Detection and Response (MDR)
  • Market Intelligent Survey
  • MSP
  • MSPĀ 
  • Network traffic analysis
  • Real-time threat monitoring
  • Risk-Based Authentication
  • Security alerts and notifications
  • Security analytics and visualization
  • Security event correlation
  • Security incident management
  • Security information and event management
  • Security Operations Center (SOC)
  • Security policy and rule management
  • Security policy compliance monitoring
  • Security policy enforcement
  • Security posture assessment
  • Security Risk Assessment
  • SIEM
  • Threat actor profiling
  • Threat analysis
  • Threat Anomaly Detection
  • Threat Data
  • Threat detection
  • Threat hunting
  • Threat Intelligence
  • Threat intelligence API integration
  • Threat Intelligence Platforms
  • Threat intelligence reporting
  • Threat intelligence sharing
  • Threat Protection
  • Threat research and analysis
  • Threat scoring and prioritization
  • User and Entity Behavior Analytics (UEBA)
  • Vulnerability Assessment
  • Vulnerability Management
  • Vulnerability Scanners
  • Web Threat Management
Show More

SolarWinds Threat Monitor Screenshots

SolarWinds Threat Monitor Specifications

Get a closer look at the technical specifications and system requirements for SolarWinds Threat Monitor. Find out if it's compatible with your operating system and other software.

Deployment :
Cloud Based
Subscription Plan :
Monthly, Yearly
Accessibility :
API
Customization
Mobile Support
Desktop Platforms :
Web app
Windows
Language Support :
English
Business :
StartUps
SMBs
Agencies
Enterprises
Available Support :
Email
SolarWinds Threat Monitor Categories on SoftwareSuggest :
Company Details :
Company Name : SolarWinds MSP
Website : Visit Website

SolarWinds Threat Monitor Reviews (0)

Ask a question

No reviews yet. Rate this app or be the first to review.

Write a Review

Alternatives of SolarWinds Threat Monitor

Explore alternative software options that can fulfill similar requirements as SolarWinds Threat Monitor. Evaluate their features, pricing, and user feedback to find the perfect fit for your needs.

SolarWinds Threat Monitor FAQs

What are the top 5 features for SolarWinds Threat Monitor?

The top 5 features for SolarWinds Threat Monitor are:

  • Audit Trail
  • Real Time Monitoring
  • Incident Management
  • Event Logs
  • User Activity Monitoring

What type of customer support is available from SolarWinds Threat Monitor?

The available support which SolarWinds Threat Monitor provides is:

  • Email
Free Demo Get Pricing
Free Demo