The most recent content from our members.
Meeting Security and Compliance Customer Needs EasyStreet uses SolarWinds Log & Event Manager (LEM) to provide Security Information and Event Management (SIEM) to their private cloud customers. As a cloud services provider, EasyStreet offers a spectrum of services, with SIEM and Log Management as recent additions. I spoke…
Hello, After creating customized filtered report (SolarWinds Knowledge Base :: Creating a Custom Filtered Report), I would like to rename the Report title name in the GUI (Category - Custome reports). How can I rename the report ?? Regards, HA
Greetings, Does anyone know how to configure FireEye MPS and the LEM connector to talk? We configured FireEye by enabling rsyslog, checking all events, pointing to LEM IP, and enabling. We configured LEM FireEye connector with defaults (/var/log/syslog). Adding new node doesn't discover it and there's not a connectivity…
Like traditional kung fu, in Security Kung Fu, there are two schools of thought. On one side, there are those guided by the industry’s best practices for IT security. On the other side, there are those who use regulatory frameworks like PCI DSS, HIPAA, SOX, and more as the guiding principles for their IT security strategy.…
What date will LEM support snmp v3? My company uses DOD requirements for all network gear. Right now LEM is not compliant. As we are in the testing phase we also realized we cannot change the port for syslog. If this was possible this would be a band-aid fix until LEM did support snmp v3. Currently with snmp v2 my company…
I went through the connectors in LEM and did not see anything listed for the estreamer api. Is there any way to use LEM to evaluate the logs coming in from this device? Looking to create alerts and scheduled reports based on found activity. Thank you for any info.
When it comes to the technical aspects of PCI DSS, HIPAA, SOX, and other regulatory frameworks, the goals are often the same: to protect the privacy and security of sensitive data. But the motivators for businesses to comply with these regulatory schemes varies greatly. Penalties for Noncompliance Regulatory Compliance…
Last week we hosted a webcast entitled "Achieving and Maintaining Federal Compliance". For those of you that are new to this subject, compliance management or policy management is the process of ensuring that your IT department is complying to the rules and standards that have either been mandated to them by a governing…
Electronic Protected Health Information (ePHI) must flow from its source to many different recipients to efficiently support the mission of providing quality heath care. However, HIPAA’s data privacy and security standards limit the manner in which ePHI can be transmitted. With HIPAA now in full force - having expanded its…
It has been more than 20 years since HIPAA was enacted on August 21, 1996, and in those two decades it has seen quite a bit of change – especially with regards to its impact on IT professionals. First, with the HITECH Act which established the privacy, security, and breach notification rules in 2003, and then the issuance…
It looks like you're new here. Sign in or register to get started.