SolarWinds Threat Monitor

Offer advanced cybersecurity – and leave the heavy lifting to us

DETECT. RESPOND. REPORT. All in near real time.

A cloud-based security information and event management (SIEM) tool designed to help MSPs detect threats in their managed networks, and the opportunity to resell SOC services by partnering with a SolarWinds approved Threat Monitoring Service Provider.

Contact A Solutions Specialist

Threat Monitor Hero Image - Drone overlooking satellite map
Threat Monitor Dashboard

Streamline Your Security Operations

SolarWinds® Threat Monitor is a cloud-based security information and event management (SIEM) tool designed to help MSPs and MSSPs detect, respond to, and report on threats on managed networks. You get an all-in-one platform for your security operations center (SOC) that is unified, scalable, and affordable. What’s more, if you aren’t ready to build your own SOC, The SolarWinds Threat Monitoring Service Provider program is a unique opportunity to offer advanced security services without having to invest in a costly security operations center. 

  • Threat Intelligence
  • SIEM (Security and Monitoring)
  • Advanced Log Search
  • Network and Host Intrusion Detection Systems
  • Log Correlation and Analysis
  • Streamlined Security Monitoring
  • Alarm Engine
  • Log-Event Archive
  • Robust Reporting
  • Custom Branding

Key Features

Threat Intelligence

Make smart decisions using the most recent threat intelligence.

Our threat intelligence is continuously updated from multiple sources, designed to help you find and respond to threats across your on-premises and hosted data centers—and public cloud environments like Azure® or AWS®

Contact SalesRequest A Quote

SIEM Security and Monitoring

Get a centralized view into near real-time log notifications from your customers’ networks.

Threat Monitor collects log-file information from disparate sources and helps you hone in on the most critical threats by rapidly assessing intent and severity.

Contact SalesLearn More

Request A Quote

Log Correlation and Analysis

Threat Monitor is designed to help discover threats for you, enabling you to focus on real threats, not sifting through logs.

Threat Monitor correlates logs in real-time from your customers’ systems and analyzes them against multiple sources of continuously updated threat intelligence.

Contact Sales Learn More

Request A Quote

Network and Host Intrusion Detection Systems

Designed to pinpoint unwanted traffic and software across your managed networks and systems.

Get alerted to unusual traffic patterns on the network and malicious software on systems. Threat Monitor spots anomalies and is designed to sound the alarm only when needed.

Contact SalesLearn More

Request A Quote

Advanced Log Search

High-speed log search for post-incident forensic analysis.

Rapidly normalize, search, and analyze thousands of logs to help understand the nature of threats and attacks.

Contact SalesRequest A Quote

Streamlined Security Monitoring 

Threat Monitor is designed with streamlined security monitoring tools to help service providers increase threat detection capabilities and reduce time spent on repetitive, error-prone security tasks that are usually performed manually. 

Contact SalesLearn MoreRequest A Quote

Alarm Engine

Set rules to help make sure you receive only relevant alarms.

Threat Monitor was designed to alert you to only relevant threats, ignoring benign activity based on user-configured thresholds and rules. The system will help you identify and summarize important events.

Contact SalesRequest A Quote

Compliance Reporting

Simplify your compliance efforts with detailed reports.

Start with our existing report templates or customize your own to help your efforts in passing regulatory and compliance audits.

Contact SalesRequest A Quote

Custom Branding

Brand the interface and reports to keep your business top-of-mind.

The custom branding feature for both the interface and reports helps reinforce the value of your services.

Contact SalesRequest A Quote

Log-Event Archive

Archive log events for up to one year.

Easily view threats over time to help identify and troubleshoot short-term issues, spot patterns and longer-term trends so that you can begin forensic investigations after a breach.

Contact SalesRequest A Quote

How SolarWinds Threat Monitor Can Help Your Business

A Map with too many incident reports that Threat Monitor would filter.

As you’re likely aware, there’s simply no silver bullet in cybersecurity. Any security strategy worth its salt requires a multifaceted approach. Yet this can present a challenge—as the security tools you need to manage increase, so does your overhead. Threat Monitor was designed to give you a central command hub to help you monitor for threats, respond to them, and generate reports from anywhere at any time.

As a managed security service provider, your security solution must be able to handle multiple customers at multiple locations. Threat Monitor was built from the ground up with managed security service providers in mind, helping you seamlessly cover your customer base from a single, centralized dashboard. 

Username - Password data entry fields
A custom branded threat monitor dashboard

Your customers want you to keep them secure. Yet, one of the challenges with cybersecurity is that when you do your job well, customers don’t hear from you often. Threat Monitor was designed to help remind your customers of your value by enabling you to brand the interface and reports. 

You may have questions on how to get started with Threat Monitor. If you already have security expertise (or plan to hire it), building out your own security operations center (SOC) may make sense. If you aren’t ready for this step, we have you covered there. You can partner with one of our Threat Monitoring Service Providers (TMSPs), who will handle the back end of running Threat Monitor, while you own the client relationship. Learn more about the program here.

A man looking at his watch with Threat Monitor dashboard in the background.