TechValidate Research on SolarWinds Security


Case Study: John Roberts Co.

“An all-in-one solution.”

“Intuitive, easy to use interface that pulls all of the network enterprise data into meaningful and understandable information.”

Challenges

  • Purchased SolarWinds LEM to address the following challenges:
    • Report that they are meeting their compliance requirements to auditors
    • Meet compliance requirement, for example, by storing log data for a required retention period
    • Determine whether a security incident has occurred and what happened
    • Troubleshoot application and network problems
    • Collect and store log data from all devices in a single place

Use Case

  • Collects log and event data from between 101 and 500 nodes.
  • Collect logs and events from the following devices:
    • Servers
    • Switches
    • Routers
    • Firewalls
    • Storage Devices
    • Virtualization infrastructure
    • Intrusion Detection / Prevention Systems
  • Collect log and events from the following applications:
    • Operating System Events
    • Infrastructure applications; e.g., DHCP, DNS, Active Directory, etc.
    • E-mail servers
    • Web servers and applications
    • Antivirus software
    • Databases
    • Vulnerability Assessment products
    • Identity and authentication management applications
  • Evaluated the following vendors before purchasing SolarWinds LEM:
    • ManageEngine

Results

  • Realized the following benefits with SolarWinds LEM:
    • Easily provide the reports and data they need to prove they are meeting their compliance requirements
    • Satisfy specific compliance requirements where they had gaps
    • Find if a security incident had occurred and what happened
    • Troubleshoot application and network problems
    • Aggregate their log data in a single place
    • Enable endpoint protection for file and registry changes
  • Purchased SolarWinds over competitive vendors for the following reasons:
    • Cost
    • Ease of use
    • SolarWinds’ features
    • Being an existing SolarWinds customer or purchasing with other SolarWinds’ products
    • SolarWinds’ reputation




About This Data

This data was sourced directly from verified users of SolarWinds Security by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.


More Research on SolarWinds Security