IT Security Software
Powerful, affordable, and easy to use solutions to make everything in IT more secure.
SIEM: LOG & EVENT MANAGER
A SIEM that makes it easy to use logs for security, compliance, and troubleshooting
What is SIEM security?
SIEM security involves using a security information and event management tool to collect, normalize, analyze, and correlate data from a variety of log sources to provide actionable IT security intelligence to help stop cybersecurity threats.
Detect suspicious activityEliminate threats faster with instantaneous detection of suspicious activity and automated responses.
Mitigate security threatsConduct security event investigations and forensics for mitigation and compliance.
Achieve auditable complianceDemonstrate compliance with audit-proven reporting for HIPAA, PCI DSS, SOX, and more.
Maintain continuous securityLEM is deployed as a hardened virtual appliance with encryption of data in transit and at rest, SSO/smart card integration, and more.
Intuitive patch management software for quickly addressing software vulnerabilities
What is software patching?
Software patching involves the acquisition, testing, and installing of code - known as a patch - into an executable program to provide an update, fix, or improved version of the program or its supporting data. Although software patching is critical for IT security, IT administrators that manage this process can spend an exorbitant amount of time manually applying and tracking patches across an entire IT infrastructure. Many choose, instead, to leverage patch management software to automate this process, not only for software patching, but to patch servers and workstations as well.
Simplified Patch ManagementAutomate patching and reporting and save time by simplifying patch management on servers and workstations.
Expand on WSUSDecrease security risks and limit service interruptions by helping to ensure that patches get applied, and controlling what gets patched and when.
Use SCCM with EaseKeep your desktops, laptops, servers, and VMs patched and secure with the latest patches for 3rd-party applications.
Demonstrate Patch ComplianceStay on top of vulnerabilities and produce summary reports to show patching status.
NETWORK CONFIGURATION MANAGER
Automated network configuration and compliance management
What is network configuration and change management?
Network configuration management software manages network changes and simplifies security and compliance for routers, switches and other network devices. It automates many management tasks to save time, improve reliability and lower risk.
Save time.Reduce the time required to manage critical changes and repetitive tasks across complex, multi-vendor networks.
Improve availability.Resolve operational issues faster by easily identifying, troubleshooting, and fixing problems.
Lower risk.Reduce downtime by helping ensure that the network is compliant and secure.
Improve control.Promote best practices, consistency, and priorities by seeing the big picture and the most critical details.
Affordable and easy to use.Solve big problems quickly and at a fraction of the cost with SolarWinds integrated IT monitoring and management software.
USER DEVICE TRACKER
Locate users and devices on your network with User Device Tracker
What is device tracking software?
Device tracker software identifies where endpoints are connected, and offers the ability to search, based on user names, host names, and IP or MAC addresses.
Quickly locate network devicesLocate connected devices with ease by searching IP or MAC address, user, host, node, port, or vendor.
Map and monitor switch portsMonitor wireless access points, switches and ports for errors, performance, and capacity usage.
Manage switch and switch port capacityAlways know how switches and ports are being used, and which switches are nearing capacity.
Detect rogue devices and usersTrace unauthorized users and rogue devices on the LAN or wireless network with watch lists.
Administer remote portsRemotely turn switch ports on and off to improve security, or resolve issues such as IP Conflicts.
SERV-U MANAGED FILE TRANSFER SERVER
Enhance security and control over file transfers in and outside your organization
What is managed file transfer?
Organizations adopt Managed File Transfer (MFT) to meet broader IT use cases and business requirements. Using FTP as its foundation, MFT offers additional features and functionality to make it a comprehensive file transfer solution. MFT often uses a wider variety of secure protocols and encryption to help ensure the safe transfer of sensitive data of all types. Whether it’s business-to-business file transfer, or peer-to-peer file sharing, MFT facilitates fast and secure file transfer for businesses big and small.
Enhance securityGo beyond Serv-U™ FTP Server to enable file transfers supported by FTP, FTPS, SFTP and HTTP/S over IPv4 and IPv6 networks
Enable ad hoc file sharingAllow peer-to-peer file transfers from web and mobile devices
Help ensure complianceMaintain compliance with PCI DSS, HIPAA, FISMA, SOX, and other standards involving securing data in transit
ScalableIntegrate with NAS/SAN and external database servers for easy storage access and HA clustered deployments
SERV-U FILE TRANSFER PROTOCOL SERVER
Simple, affordable, easy-to-use FTP server software
What is an FTP server?
File Transfer Protocol (FTP) is a standard network protocol for distributing files between client and server on a network. An FTP server continuously listens for FTP requests from remote clients. When a request is received, it manages the login and sets up the connection. For the duration of the session, it executes any of the commands sent by the FTP client.