The Cybersecurity Directory

Back to search results

SolarWinds is a leading provider of simple, powerful, and secure IT management software. Its solutions give organisations worldwide—regardless of type, size, or complexity—the power to accelerate business transformation in today’s hybrid IT environments.

SolarWinds continuously engages with technology professionals—IT service and operations professionals, DevOps and SecOps professionals, and database administrators (DBAs)—to understand the challenges they face in maintaining high-performing and highly available IT infrastructures, applications, and environments. The insights it gains from them allows the company to address customers’ needs now, and in the future. SolarWinds’ focus on the user and commitment to excellence in end-to-end hybrid IT management has established it as a worldwide leader in solutions for observability, IT service management, application performance, and database management.

Learn more today at

Main office address

1 St. Katharine's Way

Telephone number

+44 800 028 6782


Key Products / Services / Sectors (USPs)

IT Security – reduce attack surface, manage access, and improve compliance with IT security solutions designed for accelerated time-to-value ranging from security event management, access rights management, identity monitoring, server configuration monitoring and patching, and secure gateway and file transfer.

SolarWinds Hybrid Cloud Observability – a comprehensive, integrated, and cost-effective full-stack solution. Optimises performance, helps ensure availability, and reduces remediation time across on-premises and multi-cloud environments by increasing visibility, intelligence, and productivity.

Network Management – from configuration and traffic intelligence to performance monitoring and topology mapping, tools to readily see, understand, and resolve issues. Easy to use, extend, and scale to keep distributed networks optimised.

Systems Management – simple, interoperable, and customisable server and application management from systems, IPs, and VMs to containers and services. Optimise resource usage and reduce MTTR with powerful monitoring, discovery, dependency mapping, alerting, reporting, and capacity planning.

Database Management – monitor, analyse, diagnose, and optimise database performance and data ops that drive business-critical applications. Unify on-premises and cloud database visibility, control, and management with streamlined monitoring, mapping, data lineage, data integration, and tuning across multiple vendors.

IT Service Management – cloud-based platform intelligent ticketing, service management, configuration management, asset management, knowledge base and portal, as well secure remote support. An intuitive, integrated, and automated ITIL-ready IT service management (ITSM) solution that optimises productivity.

Application Management – unified performance monitoring, tracing, and metrics across applications, clouds, and SaaS. Robust solutions offering rich visualisation, synthetic and real user monitoring (RUM), and extensive log management, alerting, and analytics to expedite troubleshooting and reporting.


Backup and disaster recovery

Backup solutions

Incident response

Disaster recovery solutions

Disaster Recovery as a Service (DRaaS)

Penetration testing

Vulnerability scanning

Automated test tools

Web app PEN tests

Mobile app/IoT PEN tests

Social engineering PEN tests

Red Teams

Cybersecurity awareness training programs

On-site training programs

Online training

Interactive training videos


Automated phishing simulations

Cybersecurity consultancy

Compliance assistance

Security assessment, policy help, strategic advise

Information risk assessment

Privacy Impact Assessment services

Security architecture

Digital forensics and investigation services

Security and data protection audit

Network security

Data Loss Prevention (DLP)

Distributed denial of service (DDoS) prevention

Email security

Firewalls and web access firewalls (WAF)

Network segmentation

Security information and event management (SIEM)

Other intrusion detection (Machine Learning / AI based)

Endpoint security solutions

Mobile security


IoT security

Endpoint Detection and Response (EDR)

Network infrastructure controls, e.g. Firewalls, switches, security policy enforcement


URL filters

Security email gateway


Print management and security

Threat intelligence monitoring and detection

Consultancy and advice

User and Entity Behavior Analytics (UEBA)

Security information and event management (SIEM)

Network Traffic Analysis Framework

Web Proxy

Cybersecurity Platform

Phishing detection

Fraud detection

Rogue or Fake Mobile App Detection

Surface, “Deep” and “Dark” Web Monitoring

Social media monitoring

Brand Monitoring

Managed security services (MSSP)

Protective monitoring

Incident response

Vulnerability management

Threat management

Telco security

Security help desk and support

Staff training

Identity and access management

Identity provisioning (IDP)

Data verification

Data orchestration services

Identity hub

Authentication (credential) of citizens

Authentication (credential) of employees and other internal persons

Anti-fraud services, e.g. behavioural monitoring

Attribute provisioning and verification

Identity networks

Identity apps

Privacy and consent management

Privileged access management (PAM)

Main point of contact

Name: Charles Damerell


Phone: +353 21 5002900