# Security Event Manager Software Pricing, Alternatives & More 2026 | Capterra

> With the help of Capterra, learn about Security Event Manager Software - reviews, pricing plans, popular comparisons to other Risk Management products and more.

Source: https://www.capterra.com/p/182242/Log-Event-Manager

---

# 

 Security Event Manager Software Review 2026: Features, Reviews, Integrations, Pros & Cons

Last updated on March 13, 2026

Provider data verified by our Software Research team, and reviews moderated by our Reviews Verification team.

[Description](#description)[Use cases](#use-cases)[Alternatives](#alternatives)[Features](#features)[Pricing](#pricing)[Support](#support)[Reviews](#reviews)

Security Event Manager

## What is Security Event Manager?

Delivers comprehensive Security Information and Event Management (SIEM) capabilities in a highly affordable, easy-to-deploy virtual appliance. Security Event Manager automates and simplifies the complex task of security management, operational troubleshooting, and continuous compliance, enabling IT pros to immediately identify and re-mediate threats and vital network issues before critical systems and data can be exploited. SIEM software has never been easier to use or more affordable to own!

## What is Security Event Manager used for?

[Network Security](https://www.capterra.com/network-security-software/)[SIEM](https://www.capterra.com/siem-software/)[Log Analysis](https://www.capterra.com/log-analysis-software/)

Top alternative

Featured

Overall rating

Based on 9 user reviews

Reviews sentiment

Positive

\-

Neutral

\-

Negative

\-

Starting price

$5093

Per Feature, One Time

Free trial  
available

Capterra Shortlist charts the highest-rated and most popular products...

Our "Best of" badge program showcases products with the highest ratings...

Our "Best of" badge program showcases products with the highest ratings...

Do you work for Security Event Manager?[Manage this product listing](https://digitalmarkets.gartner.com/get-listed/claim-bx?url=http://www.solarwinds.com&name=Security Event Manager)

## Compare with a popular alternative

Capterra selects software alternatives based on relevant features, verified user reviews and user interactions. Placement may be influenced by client status.

### Security Event Manager

4.7 (9)

VS.

[4.5 (241)](https://www.capterra.com/p/172277/ManageEngine-Firewall-Analyzer/reviews/)

Starting Price

$5093

Per Feature, One Time

Starting Price

$395

Other, One Time

Free Trial

Free Version

Pricing Options

Free Trial

Free Version

Ease Of Use

3.9 (9)

Ease Of Use

4.5 (259)

Value For Money

4.4 (8)

Value For Money

4.6 (190)

Customer Service

4.4 (9)

Customer Service

4.7 (194)

## Security Event Manager alternatives

[4.7 (26)](https://www.capterra.com/p/175185/Log360/reviews/)

Starting price

Contact vendor for pricing

Highest Rated

[5.0 (1)](https://www.capterra.com/p/212808/CloudJacketX/#reviews)

Starting price

$10.00

Per User, Per Month

[4.8 (5)](https://www.capterra.com/p/175558/EventLog-Analyzer/#reviews)

Starting price

$595.00

Per User, Per Month

[4.5 (212)](https://www.capterra.com/p/164872/Netwrix-Auditor/reviews/)

Starting price

Contact vendor for pricing

## Features

Features with the highest number of reviews are displayed first. Those that have no reviews appear next, sorted alphabetically.

Alerts/Notifications

5.0 (1)

100.00% of 1 reviewers that rated this feature as important or highly important

Alerts or notifications of various types such as pop-up messages, sounds, banners, or badges

Event Logs

5.0 (1)

100.00% of 1 reviewers that rated this feature as important or highly important

A chronological record of actions or occurrences within a network, software, or process

Real-Time Monitoring

5.0 (1)

0.00% of 1 reviewers that rated this feature as important or highly important

Active monitoring of systems, applications, or networks

Real-Time Notifications

5.0 (1)

100.00% of 1 reviewers that rated this feature as important or highly important

Notifications that are delivered to users as soon as an event occurs

Reporting/Analytics

5.0 (1)

100.00% of 1 reviewers that rated this feature as important or highly important

View and track pertinent metrics to find patterns and gain insights from data

Search/Filter

5.0 (1)

100.00% of 1 reviewers that rated this feature as important or highly important

Search and filter data across systems to locate required information by entering keywords or certain criteria

Security Event Manager 50 features

Define levels of authorization for access to specific files or systems

Dashboard to view the status of ongoing processes, identify current incidents and track past activities

Track and report on everything that happens within the system or network

Track and document all activities across devices, networks, and other systems

Alerts or notifications of various types such as pop-up messages, sounds, banners, or badges

Application programming interface that allows for integration with other systems/databases

Identify and respond to security threats to developed applications

Moving and separately storing data that is not actively used or continuous storage of data for compliance purposes

A record of all activities within the system, including user access, changes made, etc.

Track and manage adherence to policies for any service, product, process, or supplier

Track and report regulatory data to either internal management or external stakeholders

Assembly of graphs and charts for visualizing and tracking statistics/metrics

Import and export data to and from software applications

Graphical representation of data

Protect users working remotely and provide secure environments for personal devices to access company programs

A chronological record of actions or occurrences within a network, software, or process

Validating the integrity of an operating system, application, and files by monitoring for probable changes, tempering, or fraud.

Monitor and control network/web traffic based on predetermined rules, protecting against unauthorized access and threats

Compliant with HIPAA, which sets standards for sensitive patient data protection

Identify and alert about security breaches by third parties

Control or restrict network traffic based on the source and destination of IP addresses, protocols and ports.

Manage incidents related to outages or breaches in functionality of IT systems

Tracking KPIs over a certain period to assess helpdesk issues, ticket status & resolution, costs and revenue stats, assets usage & more

Analyzing computer-generated records called logs to identify the root cause of errors, bugs, security threats, or other risks

Collects and aggregates data from various systems within the IT environment

Collects and aggregates data from various systems within the IT environment

Observe and track the demand, usage, progress or quality of a system, product, or user

Tracks and makes accessible data on the health of servers and other network components.

Set up and configure network resources to make them accessible for authorized users, devices and servers

Conducting audits to ensure compliance with the Payment Card Industry Data Security Standard (PCI DSS).

Store, process, and transmit cardholder data in compliance with the Payment Card Industry Data Security Standard (PCI DSS)

Arrange tasks based on the level of priority or urgency

Active monitoring of systems, applications, or networks

Notifications that are delivered to users as soon as an event occurs

Identify and orchestrate execution of actions needed to restore systems to optimal conditions

View and track pertinent metrics to find patterns and gain insights from data

Planning and managing of resources and procedures to mitigate the impact of events and incidents

Notifying as a warning or reminder of a potential or imminent hazard

Initiate collection and analysis of known risks

Reporting of risks associated with specific actions, events, or entities

Search and filter data across systems to locate required information by entering keywords or certain criteria

At least a username and password is required to access the system

Log files automatically created for all activities performed by servers, such as a history of web page requests

Allow users to access multiple services after entering their login credentials once

Information to prevent, understand and identify cyber threats

Identifying, analyzing, and mitigating security issues and taking appropriate action to protect systems and data from potential harm

Alerts for when traffic utilization or network performance deviates from pre-defined threshold settings

Manage user accounts, profiles, roles, permissions, and other details across applications, devices or networks

Detect (and block) vulnerabilities and threats in your applications based on vulnerability information

Monitor the IP addresses of the incoming traffic

Get Advice

We can help you find the software with the features you need.

Features

4.3 (9)

4.3

Based on 9 reviews

## Pricing

Value for money

4.4 (8)

Free Trial

Basic

$5,093

Per Feature,One Time

Value for money

4.4 (8)

4.4

Based on 8 reviews

Connect with a Capterra advisor for a free 15-minute consultation

Get a personalized software list aligned to your business needs with guidance from our expert advisors. Our team has helped 1 million+ businesses like yours find options that fit their needs.

## Support, customer service and training options

Customer Service

4.4 (9)

Support

-   Email/Help Desk
-   FAQs/Forum
-   Knowledge Base
-   Phone Support
-   24/7 (Live rep)
-   Chat

Training

-   In Person
-   Live Online
-   Webinars
-   Documentation
-   Videos

Deployment

-   Web
-   Android
-   iPhone/iPad

Typical users

-   Freelancers
-   Small businesses
-   Mid size businesses
-   Enterprises

Customer Service

4.4 (9)

4.4

Based on 9 reviews

## User reviews

Overall rating

4.7

Based on 9 reviews

Filter by rating

5(6)

4(3)

3(0)

2(0)

1(0)

Mentioned topic

Sorted by most recent

RE

Reda E.

CTO

Outsourcing/Offshoring

### "VERY COMPLETE ET EFFICIENT SIEM"

5.0

Overall Rating

5.0

5.0

Ease of Use

5.0

5.0

Features

5.0

5.0

Customer Service

5.0

5.0

Likelihood to Recommend

8/10

January 30, 2024

Pros

Easy to set up devices Easy to set up features Lots of security rules templates that are used in different standards (PCI DSS, SOX, Best practices...)

Cons

The price is a little high The licence is for 30 devices minimum, so, you can have to pay for something that you don't use

Switched from

[ManageEngine EventLog Analyzer](https://www.capterra.com/p/175558/EventLog-Analyzer/)

Some features doesn't work as they should

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

AU

Anonymous User

System Engineer

Banking

### "This is a great tool that allow for very robust access to all syslog data in your environment. "

4.0

Overall Rating

4.0

4.0

Ease of Use

2.0

2.0

Features

5.0

5.0

Customer Service

4.0

4.0

Likelihood to Recommend

7/10

May 14, 2018

This software allowed us to pass an audit requirement for logging and retrieval of data. We also have been able to use it to notify us of penetration tests and various other events that need immediate attention.

Pros

This is a single point for all of your logging needs. The agents make collecting non-syslog data easy and very manageable. There are a lot of alerts, searches, and such that are included out of the box. The platform scales well and allows for a lot of data to be logged and searched. There are multiple users and each can configure their own alerts and notifications. Being able to customize the notifications is a very big plus.

Cons

Log and Event Manager can be very unwieldy and grow too large very quickly. The search building is not that intuitive and the logic sometimes fails in the queries when building them. If you have to search through a large number of events, it can be quite slow and take 30+ minuted to return results.

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

ZR

Zachary R.

IT Technician

### "Very good experience. The company did a walk through so we could use it to its fullest."

5.0

Overall Rating

5.0

5.0

Ease of Use

4.0

4.0

Features

4.0

4.0

Customer Service

5.0

5.0

Likelihood to Recommend

0/10

April 2, 2018

Pros

It can alert those who need to be, to USB devices, and any log alert that you could want. It captures pretty much every log you want, and you can stop it from capturing those you don't want.

Cons

It has a bit of a learning curve on a few features, but with the walk through they did with us, that wasn't really a problem.

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

AU

Anonymous User

Senior Technical Support

Financial Services

### "Good product that windows already does but does better."

4.0

Overall Rating

4.0

4.0

Ease of Use

3.0

3.0

Features

3.0

3.0

Customer Service

3.0

3.0

Likelihood to Recommend

0/10

March 20, 2018

Pros

Lets your set filters on the log and display certain type of logs based on the filter you have set. Depends on what you want to view, they allow you to show the more important logs

Cons

The selection of what you want is tricky. Requires more research or help. A lot of logs you can view or have sent to emails.

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

MG

Matthew G.

IT Manager

### "When it works its great, when it does not then it can be problematic."

4.0

Overall Rating

4.0

4.0

Ease of Use

4.0

4.0

Features

3.0

3.0

Customer Service

5.0

5.0

Likelihood to Recommend

8/10

March 13, 2018

Pros

It is easy to setup and use. I use this for auditing on systems and all of the data collects on a Syslog Server also from SolarWinds. It provides me with all of the data I need and is very reliable for the most part.

Cons

When it stops working it is almost impossible to get it to work again. I have had a handful of systems where the client stopped working and no matter how many times I uninstall and reinstall it does not work again. Also in the selection menu to pick what you want to log it tends to take forever and locks up a lot.

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

GL

Gavin L.

Systems Engineer

Information Technology and Services

### "Use to analyze logs for PCI and other SSAE 16 compliance. "

5.0

Overall Rating

5.0

5.0

Ease of Use

3.0

3.0

Features

5.0

5.0

Customer Service

4.0

4.0

Likelihood to Recommend

7/10

February 8, 2018

Helpful display and insight of your application and systems logs.

Pros

Allow to setup triggers, alerts, and email base on any keyword or filters that you want to setup to filer out the logs. Agent base installation make it itself, no configuration required on systems side.

Cons

Difficult to configure the settings / filters for different OS type. Default disk storage on allow support up to 3TB, you will have to find an alternative solution to ship the logs to another disk / location if your logs are over 3TB.

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

JM

Jeremy M.

IT Director

Mining & Metals

### "LEM for everyone needing SIEM products"

5.0

Overall Rating

5.0

5.0

Ease of Use

5.0

5.0

Features

5.0

5.0

Customer Service

5.0

5.0

Likelihood to Recommend

0/10

February 1, 2018

Pros

There is not enough room in this windows to tell you everything good about LEM. The log monitoring across the enterprise, compliance, and KPI monitoring. It has a good dashboard.

Cons

I wish they had taken the time to plan out the development in to SolarWinds Orion suite so it was all one product rather than a running appliance in my virtual cluster

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

MG

Michael G.

Network Engineer

Transportation/Trucking/Railroad

### "Twackers Ahoy!"

5.0

Overall Rating

5.0

5.0

Ease of Use

5.0

5.0

Features

4.0

4.0

Customer Service

5.0

5.0

Likelihood to Recommend

9/10

September 8, 2017

Logs on the fly - which can be essential to my job. There isn't much to really complain about this program. If you do run in to any issues, you can always ask support or just make a post on the forums and the THWACK community will help.

Pros

Ease of use has always been Symantec's forte, but the real winner here is the legendary THWACK community that supports Solarwinds. The app itself does that it needs to, logs and manages events.

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

JM

Jeremy M.

IT Director

Mining & Metals

### "It is simply put a great program. Delivers detail to the nth degree"

5.0

Overall Rating

5.0

5.0

Ease of Use

4.0

4.0

Features

5.0

5.0

Customer Service

4.0

4.0

Likelihood to Recommend

10/10

June 7, 2017

Node Health, compliance, and i like to call that Audit protection. We have a series of audits we go through annually. The addition of LEM has enabled us to quickly generate reports and show how good or how bad we are doing but also reduces the amount of time spent with the Auditors as they can see we are addressing it and work with us to find resolutions vs picking us apart for what we don't do. Being able to Zero in on issues like never before has opened my eyes and now keeps me awake at night to the reality of the threats and issues facing me and my limited team each day. Automatic notifications and help ticket generation has also been something that assists us knowing we are reducing guess work to fact check.

Pros

Compliance, IT Operations, and dashboards. These tools are essential for knowing and preventing security issues before they are major issues. The Dashboard is your guide. The ability to create custom monitors on the fly and all the builtin logic behind LEM is simply amazing. I had no idea what i did not know. The only trouble i have now is having enough time to spend using it properly in my Small IT shop.

Cons

SolarWinds has a great suite of software, and LEM is one of the jewels. however they as of yet have failed to fully integrate it in to the Orion package. you have to have it on a separate browser tab, and although the Dashboard is fantastic, not being able to put it in Orion prevents the NOC from building a Dashboard with LEM data on it with other data from other applications in Orion.

Review source

Incentivized review: software users are invited to submit an honest review and offered a nominal incentive for their time and effort. All incentivized reviews are subject to our verification process prior to publication.

Independent research methodology

Capterra's researchers use a mix of verified reviews, independent research and objective methodologies to bring you selection and ranking information you can trust. While we may earn a referral fee when you visit a provider through our links or speak to an advisor, this has no influence on our research or methodology.

[Learn more](https://www.capterra.com/resources/proprietary-data-research/)

How Capterra verifies reviews

Capterra carefully verified over 2.5 million+ reviews to bring you authentic software experiences from real users. Our human moderators verify that reviewers are real people and that reviews are authentic. They use leading tech to analyze text quality and to detect plagiarism and generative AI.

[Learn more](https://www.capterra.com/resources/how-we-verify-reviews/)

How Capterra ensures transparency

Capterra lists all providers across its website—not just those that pay us—so that users can make informed purchase decisions. Capterra is free for users. Software providers pay us for sponsored profiles to receive web traffic and sales opportunities. Sponsored profiles include a link-out icon that takes users to the provider's website.

[Learn more](https://www.capterra.com/resources/how-we-ensure-transparency/)