Challenges
- Purchased SolarWinds LEM to address the following challenges:
- Report that they are meeting their compliance requirements to auditors
- Meet compliance requirement, for example, by storing log data for a required retention period
- Determine whether a security incident has occurred and what happened
- Troubleshoot application and network problems
- Collect and store log data from all devices in a single place
Use Case
- Collects log and event data from between 101 and 500 nodes.
- Collect logs and events from the following devices:
- Servers
- Switches
- Routers
- Firewalls
- Storage Devices
- Virtualization infrastructure
- Intrusion Detection / Prevention Systems
- Collect log and events from the following applications:
- Operating System Events
- Infrastructure applications; e.g., DHCP, DNS, Active Directory, etc.
- E-mail servers
- Web servers and applications
- Antivirus software
- Databases
- Vulnerability Assessment products
- Identity and authentication management applications
- Evaluated the following vendors before purchasing SolarWinds LEM:
- ManageEngine
Results
- Realized the following benefits with SolarWinds LEM:
- Easily provide the reports and data they need to prove they are meeting their compliance requirements
- Satisfy specific compliance requirements where they had gaps
- Find if a security incident had occurred and what happened
- Troubleshoot application and network problems
- Aggregate their log data in a single place
- Enable endpoint protection for file and registry changes
- Purchased SolarWinds over competitive vendors for the following reasons:
- Cost
- Ease of use
- SolarWinds’ features
- Being an existing SolarWinds customer or purchasing with other SolarWinds’ products
- SolarWinds’ reputation