Consultant at a computer software company with 11-50 employees
Real User
Top 20
2020-02-24T06:02:00Z
Feb 24, 2020
Our primary use case is analyzing log files from any kind of source which is IT related. We use the product in our company on a daily basis and also integrate it for others. There are four people in our company using this software, and it's part of their daily routine to check everything. We are consultans and a reseller of the solution.
Senior Technical Engineer at a tech vendor with 51-200 employees
Real User
2020-01-30T07:55:37Z
Jan 30, 2020
We work with and resell all of the SolarWinds products, and SolarWinds LEM is one of the solutions that I have experience with. This solution is used in conjunction with others to find the root cause of problems when a user is not able to access an application.
Director, Technical Architect at Archer Information Technology
Real User
2019-12-23T07:05:00Z
Dec 23, 2019
Our installation is on-premises at the moment. We are a consultant group so we implement multiple solutions for different customers using a variety of different products. Some clients are in the Cloud, some on a WAN network and some are on-premises. SolarWinds LEM is one of the products we use for certain purposes and often recommend. I'm very technical. I work as a network and security technical architect. At the same time, I also own the company, so I'm the director. I still remain very technically involved with the solutions and the architecture for solutions, based on networks and security. SolarWinds is one of the products that I use, amongst many others to fit the needs of our customers which includes their budget, size, and industry.
Learn what your peers think about SolarWinds Security Event Manager. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
IT Consultant at a consultancy with 5,001-10,000 employees
Real User
2019-08-12T05:55:00Z
Aug 12, 2019
We are using this solution for the purpose of security monitoring. It performs network behavior monitoring, log monitoring, and disaster recovery monitoring.
When TriGeo was acquired by SolarWinds, TriGeo SIM became known as SolarWinds Log & Event Manager. This product is a leading Security Information and Event Management (SIEM) product and log management solution, which provides log collection, analysis, and real-time correlation.
Our primary use case is analyzing log files from any kind of source which is IT related. We use the product in our company on a daily basis and also integrate it for others. There are four people in our company using this software, and it's part of their daily routine to check everything. We are consultans and a reseller of the solution.
We work with and resell all of the SolarWinds products, and SolarWinds LEM is one of the solutions that I have experience with. This solution is used in conjunction with others to find the root cause of problems when a user is not able to access an application.
We are using this solution for our internal log event monitoring, as well as for file integrity monitoring.
Our installation is on-premises at the moment. We are a consultant group so we implement multiple solutions for different customers using a variety of different products. Some clients are in the Cloud, some on a WAN network and some are on-premises. SolarWinds LEM is one of the products we use for certain purposes and often recommend. I'm very technical. I work as a network and security technical architect. At the same time, I also own the company, so I'm the director. I still remain very technically involved with the solutions and the architecture for solutions, based on networks and security. SolarWinds is one of the products that I use, amongst many others to fit the needs of our customers which includes their budget, size, and industry.
I use this solution to examine our logs and the logs of our customers We have experience with on-premises deployments.
We primarily use the solution for monitoring the network.
We are using this solution for the purpose of security monitoring. It performs network behavior monitoring, log monitoring, and disaster recovery monitoring.
We have a hyper requirement to maintain logs of access and changes, so this solution logs everything.