www.solarwinds.com
Open in
urlscan Pro
2600:141b:9000::b833:940a
Public Scan
URL:
https://www.solarwinds.com/security/security-statement
Submission: On May 01 via api from CA — Scanned from CA
Submission: On May 01 via api from CA — Scanned from CA
Form analysis
0 forms found in the DOMText Content
* Government * Customer Portal * Partners * Portal Login * Program Overview * Become a Partner * Events * Contact Us * English * Deutsch * Español * Français * 日本語 * 한국어 * Português * 中文 Toggle navigation English * Deutsch * Español * Français * 日本語 * 한국어 * Português * 中文 * PRODUCTS * OBSERVABILITY * Network Management * Systems Management * Database Management * IT Service Management * Application Management * IT Security * ALL PRODUCTS & FREE TRIALS The SolarWinds Platform is the industry’s only unified monitoring, observability, and service management platform. It’s the foundation for a new generation of SolarWinds observability solutions and provides the architecture on how we solve observability challenges for our customers. Explore the Platform Products * SolarWinds Observability * Hybrid Cloud Observability View All Observability Products SolarWinds Hybrid Cloud Observability. Value, integration, and productivity for all. Go from reactive to proactive. Learn More Network management tools, from configuration and traffic intelligence to performance monitoring and topology mapping, to readily see, understand, and resolve issues. An integrated, multi-vendor approach that’s easy to use, extend, and scale to keep distributed networks optimized. Products * Network Performance Monitor * NetFlow Traffic Analyzer * Network Configuration Manager * IP Address Manager * User Device Tracker * VoIP & Network Quality Manager * Network Automation Manager * Log Analyzer * Network Topology Mapper * Engineer's Toolset * Kiwi CatTools * Kiwi Syslog Server Bundles * Network Bandwidth Analyzer Pack * Log and Network Performance Pack * IP Control Bundle View All Network Management Products SolarWinds Hybrid Cloud Observability. Value, integration, and productivity for all. Go from reactive to proactive. Learn More Comprehensive server and application management that’s simple, interoperable, and customizable from systems, IPs, and VMs to containers and services. Optimize resource usage and reduce MTTR with powerful monitoring, discovery, dependency mapping, alerting, reporting, and capacity planning. Products * Server & Application Monitor * Virtualization Manager * Storage Resource Monitor * Serv-U Managed File Transfer * Serv-U Secured FTP * Server Configuration Monitor * Log Analyzer * Access Rights Manager * AppOptics * Web Performance Monitor Bundles * Systems Management Bundle * Server Performance & Configuration Bundle * Log and Systems Performance Pack * Application Performance Optimization Pack * IT Operations Manager * Web Application Monitoring & Performance Pack View All Systems Management Products SolarWinds Hybrid Cloud Observability. Value, integration, and productivity for all. Go from reactive to proactive. Learn More Monitor, analyze, diagnose, and optimize database performance and data ops that drive your business-critical applications. Unify on-premises and cloud database visibility, control, and management with streamlined monitoring, mapping, data lineage, data integration, and tuning across multiple vendors. Products * Database Performance Analyzer Monitoring and optimizing multiple DBMS platforms has never been simpler * SQL Sentry Monitor, diagnose, and optimize SQL Server and Azure SQL * Database Performance Monitor Database performance monitoring and optimization for traditional, open-source, and cloud-native databases * Task Factory Save time managing tedious data warehousing ELT/ETL tasks * Database Insights for SQL Server Have complete monitoring and tuning control over your Microsoft SQL Server environment View All Database Management Products Monitor your cloud-native Azure SQL databases with a cloud-native monitoring solution. Azure SQL performance monitoring simplified. Learn More Modernize your service desk with intelligent and automated ticketing, asset, configuration, and service-level agreement (SLA) management; a knowledge base; and a self-service portal with secure remote assistance. SolarWinds offers an easy-to-use IT service management (ITSM) platform designed to meet your service management needs to maximize productivity while adhering to ITIL best practices. Products * Service Desk Cloud-based and artificial intelligence (AI)-powered ITSM platform offering employee service management and IT asset management (ITAM) capabilities—including asset discovery and incident, problem, release, and change management—supported by a configuration management database (CMDB) and built to integrate with the SolarWinds® observability solutions. * Web Help Desk On-premises ITSM software designed to centralize and simplify IT help desk processes, from service request creation to resolution. Incorporates ITAM and asset discovery capabilities to streamline and automate ticket management. * Dameware Remote Everywhere Cloud-Based Remote Support Software with advanced encryption and MFA. Integrates with SolarWinds Service Desk * Dameware Remote Support On-Premises Remote Support Software with FIPS 140-2 encryption standards. Integrates with SolarWinds Web Help Desk * Dameware Mini Remote Control Basic On-Premises Remote Support software View All IT Service Management Products Ensure user experience with unified performance monitoring, tracing, and metrics across applications, clouds, and SaaS. Robust solutions offering rich visualization, synthetic and real user monitoring (RUM), and extensive log management, alerting, and analytics to expedite troubleshooting and reporting. Products * SolarWinds Observability Deliver unified and comprehensive visibility for cloud-native, custom web applications to help ensure optimal service levels and user satisfaction with key business services * AppOptics SaaS-based infrastructure and application performance monitoring, tracing, and custom metrics for hybrid and cloud-custom applications. * Server & Application Monitor Infrastructure and application performance monitoring for commercial off-the-shelf and SaaS applications; built on the SolarWinds® Orion® platform. * Loggly Fast and powerful hosted aggregation, analytics and visualization of terabytes of machine data across hybrid applications, cloud applications, and infrastructure. * Log Analyzer Monitoring and visualization of machine data from applications and infrastructure inside the firewall, extending the SolarWinds® Orion® platform. * Papertrail Real-time live tailing, searching, and troubleshooting for cloud applications and environments. * Pingdom Real user, and synthetic monitoring of web applications from outside the firewall. View All Application Management Products SolarWinds Observability. Comprehensive observability. Maximum flexibility. Easy to use. A unified platform offering with discrete capabilities so you can scale seamlessly as your needs grow. Learn More Reduce attack surface, manage access, and improve compliance with IT security solutions designed for accelerated time-to-value ranging from security event management, access rights management, identity monitoring, server configuration monitoring and patching, and secure gateway and file transfer. Products * Access Rights Manager * Security Event Manager * Server Configuration Monitor * Patch Manager * Identity Monitor * Serv-U Managed File Transfer * Serv-U Secured FTP * Serv-U Gateway View All IT Security Products Help Reduce Insider Threat Risks with SolarWinds® Access Rights Manager Manage and Audit Access Rights across your Infrastructure. Learn More * Solutions * BY NEED * BY INDUSTRY * BY TECHNOLOGY Use Case * Hybrid Cloud Observability * SolarWinds Observability * Database Management * Application Performance Management * SolarWinds Orion Platform * Network Management * IT Asset Management * IT Security * IT Operations Management * IT Help Desk * Remote Monitoring * Infrastructure * IT Service Management * IT Automation * Compliance * Remote Infrastructure Management * Hybrid Systems Monitoring * Secure Remote Access View All Solutions SolarWinds Hybrid Cloud Observability. Value, integration, and productivity for all. Go from reactive to proactive. Learn More Industry * Small Business * Enterprise * Education * Public Sector View All Solutions Be the first to know when your public or private applications are down, slow, or unresponsive. End user monitoring, hybrid, and simplified. Learn More Technology * Azure * Active Directory * Cisco * Office 365 * MySQL * SQL Diagnostic View All Solutions * Support Renew Maintenance Renew to download the latest product features, get 24/7 tech support, and access to instructor-led training. * Renew Maintenance * Learn about Auto-Renewal Access the Success Center Find product guides, documentation, training, onboarding information, and support articles. * Access the Success Center * Onboarding/Deployment Services * Premium Support Offerings Technical Support Submit a ticket for technical and product assistance, or get customer service help. * Americas: +1-512-682-9300 * EMEA: +353 21 5002900 * APAC: +65 6593 7600 * Submit a Ticket * Supported Versions * End of Life Policy * End of Life Policy for SaaS Products Training & Certification Learn through self-study, instructor-led, and on-demand classes with the SolarWinds Academy. * SolarWinds Academy * SolarWinds Certified Professional Customer Portal Download the latest product versions and hotfixes. Manage your portal account and all your products. * Access the Customer Portal * Community THWACK Connect with more than 180,000+ community members. Get help, be heard by us and do your job better using our products. * View THWACK Orange Matter Get practical advice on managing IT infrastructure from up-and-coming industry voices and well-known tech leaders. * View Orange Matter LogicalRead Blog Into databases? Find articles, code and a community of database experts. * View LogicalRead Blog Secure by Design Resource Center Get the latest SolarWinds investigation updates, advice from leading cybersecurity experts we’re working with, and learn about our Secure by Design journey. * View Resources * FREE TRIALS * Contact Sales * Online Quote * * PRODUCTS * OBSERVABILITY * SolarWinds Observability * Hybrid Cloud Observability * Network Management * Network Performance Monitor * NetFlow Traffic Analyzer * Network Configuration Manager * IP Address Manager * User Device Tracker * VoIP & Network Quality Manager * Network Automation Manager * Log Analyzer * Network Topology Mapper * Engineer's Toolset * Kiwi CatTools * Kiwi Syslog Server * Network Bandwidth Analyzer Pack * Log and Network Performance Pack * IP Control Bundle * Systems Management * Server & Application Monitor * Virtualization Manager * Storage Resource Monitor * Serv-U Managed File Transfer * Serv-U Secured FTP * Server Configuration Monitor * Log Analyzer * Access Rights Manager * AppOptics * Web Performance Monitor * Systems Management Bundle * Server Performance & Configuration Bundle * Log and Systems Performance Pack * Application Performance Optimization Pack * IT Operations Manager * Web Application Monitoring & Performance Pack * Database Management * Database Performance Analyzer * SQL Sentry * Database Performance Monitor * Task Factory * Database Insights for SQL Server * IT Service Management * Service Desk * Web Help Desk * Dameware Remote Everywhere * Dameware Remote Support * Dameware Mini Remote Control * Application Management * SolarWinds Observability * AppOptics * Server & Application Monitor * Loggly * Log Analyzer * Papertrail * Pingdom * IT Security * Access Rights Manager * Security Event Manager * Server Configuration Monitor * Patch Manager * Identity Monitor * Serv-U Managed File Transfer * Serv-U Secured FTP * Serv-U Gateway * Solutions * BY NEED * Hybrid Cloud Observability * SolarWinds Observability * Database Management * Application Performance Management * SolarWinds Orion Platform * Network Management * IT Asset Management * IT Security * IT Operations Management * IT Help Desk * Remote Monitoring * Infrastructure * IT Service Management * IT Automation * Compliance * Remote Infrastructure Management * Hybrid Systems Monitoring * Secure Remote Access * BY INDUSTRY * Small Business * Enterprise * Education * Public Sector * BY TECHNOLOGY * Azure * Active Directory * Cisco * Office 365 * MySQL * SQL Diagnostic * Support * Renew Maintenance * Renew Maintenance * Learn about Auto-Renewal * Access the Success Center * Access the Success Center * Onboarding/Deployment Services * Premium Support Offerings * Technical Support * Americas: +1-512-682-9300 * EMEA: +353 21 5002900 * APAC: +65 6593 7600 * Submit a Ticket * Supported Versions * End of Life Policy * End of Life Policy for SaaS Products * Training & Certification * SolarWinds Academy * SolarWinds Certified Professional * Customer Portal * Access the Customer Portal * Community * THWACK * View THWACK * Orange Matter * View Orange Matter * LogicalRead Blog * View LogicalRead Blog * Secure by Design Resource Center * View Resources * FREE TRIALS * Contact Sales * Online Quote * View All Products View Free Tools SOLARWINDS SECURITY STATEMENT This Security Statement is aimed at providing you with more information about our security infrastructure and practices. Our privacy policy contains more information on how we handle data that we collect. Information Security Policy SolarWinds maintains a written Information Security policy that defines employee’s responsibilities and acceptable use of information system resources. The organization receives signed acknowledgement from users indicating that they have read, understand, and agree to abide by the rules of behavior, before providing authorized access to SolarWinds information systems. This policy is periodically reviewed and updated as necessary. Our security policies cover a wide array of security related topics ranging from general standards with which every employee must comply, such as account, data, and physical security, to more specialized security standards covering internal applications and information systems. Organizational Security Information security roles and responsibilities are defined within the organization. The security team focuses on information security, global security auditing and compliance, as well as defining the security controls for protection of SolarWinds’ hardware infrastructure. The security team receives information system security notifications on a regular basis and distributes security alert and advisory information to the organization on a routine basis after assessing the risk and impact as appropriate. SolarWinds follows the NIST Cybersecurity Framework with layered security controls to help identify, prevent, detect, and respond to security incidents. The information security manager is also responsible for tracking incidents, vulnerability assessments, threat mitigation, and risk management. Asset Management SolarWinds’ data and information system assets are comprised of customer and end-user assets as well as corporate assets. These asset types are managed under our security policies and procedures. SolarWinds authorized personnel who handle these assets are required to comply with the procedures and guidelines defined by SolarWinds security policies. Personnel Security SolarWinds employees are required to conduct themselves in a manner consistent with the company’s guidelines, including those regarding confidentiality, business ethics, appropriate usage, and professional standards. All newly hired employees are required to sign confidentiality agreements and to acknowledge the SolarWinds code of conduct policy. The code outlines the company’s expectation that every employee will conduct business lawfully, ethically, with integrity, and with respect for each other and the company’s users, partners, and competitors. Processes and procedures are in place to address employees who are on-boarded and off-boarded from the company. Employees are provided with security training as part of new hire orientation. In addition, each SolarWinds employee is required to read, understand, and take a training course on the company’s code of conduct. Physical and Environmental Security SolarWinds has policies, procedures, and infrastructure to handle both physical security of its data centers as well as the environment from which the data centers operate. Our information systems and infrastructure are hosted in world-class data centers that are geographically dispersed to provide high availability and redundancy to SolarWinds and its customers. The standard physical security controls implemented at each data center include electronic card access control systems, fire alarm and suppression systems, interior and exterior cameras, and security guards. Physical access is centrally managed and strictly controlled by data center personnel. All visitors and contractors are required to present identification, are required to log in, and be escorted by authorized staff through the data center. Access to areas where systems, or system components, are installed or stored are segregated from general office and public areas. The cameras and alarms for each of these areas are centrally monitored 24x7 for suspicious activity, and the facilities are routinely patrolled by security guards. Servers have redundant internal and external power supplies. Data centers have backup power supplies, and can draw power from diesel generators and backup batteries. These data centers have completed a Service Organization Controls (SOC) 2 Type II audit and are SSAE16 accredited. Operational Security Change Management SolarWinds maintains a change management process to ensure that all changes made to the production environment are applied in a deliberate manner. Changes to information systems, network devices, and other system components, and physical and environment changes are monitored and controlled through a formal change control process. Changes are reviewed, approved, tested and monitored post-implementation to ensure that the expected changes are operating as intended. Supplier and Vendor Relationships SolarWinds likes to partner with suppliers and vendors that operate with the same or similar values around lawfulness, ethics, and integrity that SolarWinds does. As part of its review process, we screen our suppliers and vendors and bind them to appropriate confidentiality and security obligations, especially if they manage customer data. SolarWinds does not give our suppliers or vendors direct access to network/equipment management responsibility. Our procurement department may perform audits from time to time on SolarWinds suppliers and vendors in an effort to ensure the confidentiality, integrity, and availability of data that our third party suppliers or vendors may handle. Auditing and Logging We maintain audit logs on systems. These logs provide an account of which personnel have accessed which systems. Access to our auditing and logging tool is controlled by limiting access to authorized individuals. Security events are logged, monitored, and addressed by trained security team members. Network components, workstations, applications and any monitoring tools are enabled to monitor user activity. Organizational responsibilities for responding to events are defined. Security events that record critical system configuration changes and administrators are alerted at the time of change. Retention schedules for the various logs are defined in our security control guidelines. Antivirus and Malware Protection Antivirus and malicious code protection is centrally managed and configured to retrieve the updated signatures and definitions available. Malicious code protection policies automatically apply updates to these protection mechanisms. Anti-virus tools are configured to run scans, virus detection, real-time file write activity and signature file updates. Laptop and remote users are covered under virus protection. Procedures to detect and remove unauthorized or unsupported (e.g. freeware) applications are documented. System Backups SolarWinds has backup standards and guidelines and associated procedures for performing backup and restoration of data in a scheduled and timely manner. Controls are established to help safeguard backed up data (onsite and off-site). We also work to ensure that customer data is securely transferred or transported to and from backup locations. Periodic tests are conducted to test whether data can be safely recovered from backup devices. Network Security Our infrastructure servers reside behind high-availability firewalls and are monitored for the detection and prevention of various network security threats. Firewalls are utilized to help restrict access to systems from external networks and between systems internally. By default, all access is denied and only explicitly allowed ports and protocols are allowed based on business need. SolarWinds maintains separate development and production environments. Our next generation firewalls (NGFWs) provide adequate network segmentation through the establishment of security zones that control the flow of network traffic. These traffic flows are defined by strict firewall security policies. Automated tools are deployed within the network to support near-real-time analysis of events to support of detection of system-level attacks. Next generation firewalls deployed within the data center as well as remote office sites monitor outbound communications for unusual or unauthorized activities, which may be an indicator of the presence of malware (e.g., malicious code, spyware, adware). Data Protection SolarWinds continually works to develop products that support the latest recommended secure cipher suites and protocols to encrypt traffic while in transit. We monitor the changing cryptographic landscape closely and work to upgrade our products to respond to new cryptographic weaknesses as they are discovered and implement best practices as they evolve. For encryption in transit, we do this while also balancing the need for compatibility for older clients. Vulnerability Management Security assessments are done to identify vulnerabilities and to determine the effectiveness of the patch management program. Each vulnerability is reviewed to determine if it is applicable, ranked based on risk, and assigned to the appropriate team for remediation. Patch Management SolarWinds strives to apply the latest security patches and updates to operating systems, applications, and network infrastructure to mitigate exposure to vulnerabilities. Patch management processes are in place to implement security patch updates as they are released by vendors. Patches are tested prior to being deployed into production. Secure Network Connections HTTPS encryption is configured for customer web application access. This helps to ensure that user data in transit is safe, secure, and available only to intended recipients. The level of encryption is negotiated to either SSL or TLS encryption and is dependent on what the web browser can support. Access Controls Role Based Access Role based access controls are implemented for access to information systems. Processes and procedures are in place to address employees who are voluntarily or involuntarily terminated. Access controls to sensitive data in our databases, systems, and environments are set on a need-to-know / least privilege necessary basis. Access control lists define the behavior of any user within our information systems, and security policies limit them to authorized behaviors. Authentication and Authorization We require that authorized users be provisioned with unique account IDs. Our password policy covers all applicable information systems, applications, and databases. Our password best practices enforce the use of complex passwords that include both alpha and numeric characters, which are deployed to protect against unauthorized use of passwords. Passwords are individually salted and hashed. SolarWinds employees are granted a limited set of default permissions to access company resources, such as their email, and the corporate intranet. Employees are granted access to certain additional resources based on their specific job function. Requests for additional access follow a formal process that involves a request and an approval from a data or system owner, manager, or other executives, as defined by our security guidelines. Approvals are managed by workflow tools that maintain audit records of changes. Software Development Lifecycle We follow a defined methodology for developing secure software that is designed to increase the resiliency and trustworthiness of our products. Our products are deployed on an iterative, rapid release development lifecycle. Security and security testing are implemented throughout the entire software development methodology. Quality Assurance is involved at each phase of the lifecycle and security best practices are a mandated aspect of all development activities. Our secure development lifecycle follows standard security practices including vulnerability testing, regression testing, penetration testing, and product security assessments. The SolarWinds architecture teams review our development methodology regularly to incorporate evolving security awareness, industry practices and to measure its effectiveness. Incident Management SolarWinds has a formalized incident response plan (Incident Response Plan) and associated procedures in case of an information security incident. The Incident Response Plan defines the responsibilities of key personnel and identifies processes and procedures for notification. Incident response personnel are trained, and execution of the incident response plan is tested periodically. An incident response team is responsible for providing an incident handling capability for security incidents that includes preparation, detection and analysis, containment, eradication, and recovery. Business Continuity and Disaster Recovery To minimize service interruption due to hardware failure, natural disaster, or other catastrophe, we implement a disaster recovery program at all our data center locations. This program includes multiple components to minimize the risk of any single point of failure. Application data is replicated to multiple systems within the data center and, in some cases, replicated to secondary or backup data centers that are geographically dispersed to provide adequate redundancy and high availability. High-speed connections between our data centers help to support swift failover. Data Protection We apply a common set of personal data management principles to customer data that we may process, handle, and store. We protect personal data using appropriate physical, technical, and organizational security measures. We give additional attention and care to sensitive personal data and respect local laws and customs, where applicable. SolarWinds only processes personal information in a way that is compatible with and relevant for the purpose for which it was collected or authorized in accordance with our privacy policy. We take all reasonable steps to protect information we receive from our users from loss, misuse or unauthorized access, disclosure, alteration and/or destruction. We’re Geekbuilt.® Developed by network and systems engineers who know what it takes to manage today's dynamic IT environments, SolarWinds has a deep connection to the IT community. The result? IT management products that are effective, accessible, and easy to use. * * * * Company Investors Career Center Secure By Design IT Glossary Resource Center Preference Center For Customers For Government GDPR Resource Center Legal Documents Privacy California Privacy Rights Security Information Documentation & Uninstall Information Trust Center Disclosure Policy © 2023 SolarWinds Worldwide, LLC. All rights reserved. Close {{STATIC CONTENT}} {{CAPTION_TITLE}} {{CAPTION_CONTENT}} {{TITLE}} SolarWinds uses cookies to enhance site navigation, analyze site usage and assist with our marketing efforts. By clicking "Accept All Cookies", you agree to our use of cookies on your device in accordance with our Cookie Policy. For more information on how we process your data, refer to ourSolarWinds Privacy Notice Cookie Settings Accept All Cookies SOLARWINDS PRIVACY PREFERENCE CENTER * YOUR PRIVACY * STRICTLY NECESSARY COOKIES * FUNCTIONAL COOKIES * PERFORMANCE COOKIES * TARGETING COOKIES YOUR PRIVACY When you visit any SolarWinds website, we may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. For more information on cookies, see our Cookie Policy STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Back Button BACK Filter Button Consent Leg.Interest checkbox label label checkbox label label checkbox label label Clear checkbox label label Apply Cancel Confirm My Choices Allow All