Skip to main content

Tivoli Security Information and Event Manager

Tivoli software

Business benefits


Features, advantages and benefits
Features Advantages Benefits
Automated log aggregation Operational efficiency through platform integration Centralize security operations across discrete organizations, technologies and processes
Automated log management and analysis with an intuitive log management dashboard Generate numerous reports directly from the log data, as well as a log continuity report, which allows you to demonstrate to auditors and regulators the completeness and continuity of your log management program. Reduce costs involved in managing and demonstrating compliance
Web based management console with support for thousands of event sources per server Single integrated SIEM platform and seamless management of multiple servers from one desktop Reduce complexity associated with management and configuration
Streamlined incident tracking and handling Support for audit and compliance Align security activities with the business' top priorities
Automated audit reporting through a compliance dashboard and flexible report distribution. Centralizes the compliance monitoring process from the collection point on, providing concise and understandable information through the dashboard and reporting. Gain an understanding of your compliance posture to help ease the demands of preparing and responding to the increasing numbers of security audits and helping to improve your security stature.
64 bit platform support Provides better scalability Reduce your total cost of ownership
Privileged user monitoring and audit (PUMA) on databases, applications, servers and mainframes and alert in near real time with insider threat analytics. Unobtrusively monitors and reports on privileged user activities, allowing your administrators to perform their jobs and supporting strong controls over user access. Provides a cost-effective, automated way to monitor, report and investigate privileged user behaviors to both protect key corporate applications and information assets and provide assurance to auditors and management that effective controls are in place.
Translates captured native log data into easily understood language. Patent-pending W7 methodology translates all events into a single language that states Who, did What, When, Where, Where from, Where to and on What, understandable by security personnel, auditors and management. Reduces reliance on over-burdened and costly platform-subject matter experts by delivering easily understood reporting to support auditors’ evidence requests and security managers’ investigatory needs.
Integration with IBM Tivoli Identity Manager, Tivoli Access Manager, and Tivoli Security Operations Manager. Integration with IBM’s identity management solutions simplifies efforts to implement identity auditing as part a strong controls environment, and automates the comparison of user to security policies and best practice frameworks. Integration with Tivoli Security Operations Manager automates the process of notifying security operations personnel about policy violations that can threaten security or compliance measures. Reduce the risks of access to sensitive systems and non-compliance with security policies and requirements. Improve incident response and policy compliance by allowing security personnel to investigate exceptions and take immediate action.
Advanced report definition engine allow New custom reporting tool provides offers easy-to-use interface for creating Helps you to quickly and easily meet your organization’s
users to create custom compliance modules and reports. custom reports, including summary and detail reports, Top-N and threshold reporting. Reports can use filtering selection criteria and be presented in text or chart form. specific reporting requirements, new compliance initiatives and ad-hoc report requests through an intuitive user interface.
Efficiently collect, store, investigate and retrieve logs through automated log management capability. A scalable log collector helps ensure the reliable and verifiable collection of native logs from virtually any platform, including syslog and Simple Network Management Protocol (SNMP) logs, and almost any security log type, including operating systems, databases and security devices. Automating and centralizing the collection of logs files can help make the process more efficient, saving time and money.
Enhance RACF auditing capabilities Leverage the optional mainframe plugins with enhanced capabilities for RACF auditing and analyze and report on mainframe events reducing the cost and skill needed to maintain a secure environment for your business-critical asset


Tivoli Security Information and Event Manager provides visibility into your security posture, controls the cost of demonstrating compliance; and reduces the complexity of managing a heterogeneous IT infrastructure.

Contact IBM

live-assistance

Considering a purchase?


Or call us at:
877-426-3774
Priority code:
109HJ03W

More offers