SolarWinds Threat Monitor Pricing, Features, Reviews & Comparison of Alternatives

SolarWinds Threat Monitor

Automated threat monitoring - IT Ops edition

4.33/5 (3 reviews)

SolarWinds Threat Monitor overview

What is SolarWinds Threat Monitor?

SolarWinds Threat Monitor is a cloud-based platform built to empower security-minded MSPs (managed service providers) and MSSPs (managed security service providers) with a scalable, unified tool to monitor managed networks for a variety of threats and analyze logs against global threat intelligence data. The solution helps to quickly remediate threats, as well as prepare the information required to demonstrate compliance and meet standards. Capabilities include automated incident response, SIEM, log correlation, an alarm engine, and reporting.

SolarWinds Threat Monitor enables organizations to monitor, respond to, and report on security threats on managed networks in near real time from any location. The SEIM (security information and event manager) provides a centralized view into important event-time log alerts across the network. Users can collect log file data from disparate sources, and focus on the most critical threats by assessing intent and severity. Log correlation tools enable users to normalize logs from the ecosystem against various sources of threat intelligence. SolarWinds archives a full year of normalized and raw log data, providing users with the ability to compare previous incidents with recent events.

SolarWinds’ network and host intrusion detection tool enables the qualification and quantification security threats across hosted and on-premise data centers, including public cloud environments such as Azure or AWS. Users can analyze the volume and types of attacks automatically, and apply the near real-time data to construct and implement incident responses. High-speed log search capabilities allow users to normalize, explore, and analyze logs to better understand security vulnerability, threats, and attacks.

Pricing

Starting from
€3665/month
Pricing options
Subscription
Free trial
Value for money
View Pricing Plans

Devices

Business size

S
M
L

Markets

United States, Canada, Australia, Germany, Brazil, Mexico

Supported languages

English
SolarWinds Threat Monitor screenshot: Receive updated threat intelligence from multiple sources, including IP and Domain Reputation databases, to monitor for known and unknown security threatsSolarWinds Threat Monitor OverviewSolarWinds Threat Monitor screenshot: Automatically analyze the amount and types of attacks, and use this near real-time data to create and implement actionable incident responsesSolarWinds Threat Monitor screenshot: Collect log file information from disparate sources, and hone in on the most critical threats by rapidly assessing intent and severitySolarWinds Threat Monitor screenshot: Multi-conditional, cross-correlated alarms work in tandem with the active response engine to help identify and summarize important eventsSolarWinds Threat Monitor screenshot: Normalize logs from the ecosystem, and analyze them against multiple sources of threat intelligenceSolarWinds Threat Monitor screenshot: One year of normalized and raw log archive is included, giving users the ability to recall and compare past incidents with recent eventsSolarWinds Threat Monitor screenshot: Quickly normalize, search, and analyze thousands of logs to understand the nature of ecosystem vulnerability, threats, and attacks

SolarWinds Threat Monitor reviews

Excellent
2

Very good
0
Average
1

Poor
0
Terrible
0
Value for money
Features
Ease of use
Customer support
  4.3
  4.3
  4.3
  5.0
Tim Porterfield

Easily customizable and keeps our network safe!

Used daily for 2+ years
Reviewed 2019-04-07
Review Source: Capterra

Pros
Easy to understand dashboard and stellar network protection. We're notified as soon as we have a threat or connectivity issue.

Cons
It's difficult to get it set up on a sharepoint page.

Rating breakdown

Value for money
Ease of use
Features
Customer support

Likelihood to recommend: 10/10

Minimize review

Anonymous

excellent product

Used daily for 1-2 years
Reviewed 2018-10-23
Review Source: Capterra

highly satisfied

Pros
Easy to implement and use. Great features

Cons
product has few limitation that solarwinds team is worting out

Rating breakdown

Value for money
Ease of use
Features
Customer support

Likelihood to recommend: 10/10

Minimize review

David Meyer

Has a ton of potential

Used daily for 6-12 months
Reviewed 2019-07-31
Review Source: Capterra

Positive. I know the backend work for this is a lot and the support team does a great job of taking care of us.

Pros
Ease of setup Support team is awesome Great Onboard Process

Cons
It's a little quirky, but this may be due to our lack of experience working the system. The documentation is limited There are no tutorial videos Would like to run virustotal, or external url checkers, time of day anomalies

Rating breakdown

Value for money
Ease of use
Features
Customer support

Likelihood to recommend: 6/10

Minimize review

SolarWinds Threat Monitor pricing

Starting from
€3665/month
Pricing options
Subscription
Free trial
View Pricing Plans

Pricing starts at €3,665

SolarWinds Threat Monitor features

Compliance Management
Monitoring
Reporting & Statistics

API (136 other apps)
Access Control (99 other apps)
Activity Dashboard (77 other apps)
Alerts / Escalation (52 other apps)
Audit Trail (48 other apps)
Auditing (70 other apps)
Authentication (59 other apps)
Password Management (53 other apps)
Policy Management (59 other apps)
Real Time Monitoring (61 other apps)
Risk Alerts (46 other apps)
SSL Security (53 other apps)
Secure Data Storage (58 other apps)
Single Sign On (50 other apps)
Third Party Integration (69 other apps)
Two-Factor Authentication (53 other apps)
User Management (53 other apps)

Security and privacy

Encryption

Encryption of sensitive data at rest
HTTPS for all pages

Access control

Multi-factor authentication options
This will ask you to sign in with LinkedIn

Videos and tutorials

Additional information for SolarWinds Threat Monitor

Key features of SolarWinds Threat Monitor

  • Financial data protection
  • Security event log
  • Intrusion detection system
  • Internet usage monitoring
  • AI / machine Learning
  • Behavioral analytics
  • Whitelisting / blacklisting
  • IP Protection
  • Continuously updated threat intelligence
  • Security information and event manager (SIEM)
  • Log correlation
  • Log event archive
  • Network and host intrusion detection system
  • Highly indexed log search capabilities
  • Active response
  • Alarm engine
  • Compliance reporting
  • Service provider edition
  • Monitor for potential threats
  • Intuitive cyber threat monitor
  • Updated threat intelligence from multiple sources
  • Collect log file information from disparate sources
  • Normalize logs from the ecosystem
  • Compare past incidents with recent events
  • Automatically analyze the amount and types of attacks
  • Real-time data
  • Create and implement actionable incident responses
  • High-speed log search
  • Post-incident forensic analysis
  • Automatic notifications
  • Multi-conditional, cross-correlated alarms
  • Report templates
  • Custom reports
  • Multi-tenant architecture
  • White-labeling capabilities
View All Features

Benefits

SolarWinds helps expand an organization's managed service offerings with tools for threat monitoring, incident response, and reporting capabilities and a multi-tenant architecture.

Monitor for potential threats, and respond and report from nearly anywhere, and anytime, with SolarWinds cloud-based deployment.

Continuously updated threat intelligence allows users to make informed decisions with the latest threat intelligence from around the globe.

Highly indexed log search capabilities for post-incident forensic analysis enable users to rapidly normalize, search, and analyze thousands of logs to understand the nature of ecosystem vulnerability, threats, and attacks.

SolarWinds' alarm engine sends out multi-conditional, cross-correlated notifications and alerts whenever a user-configured threshold is exceeded, and work in tandem to help users identify and summarize critical events.