Access your Pro+ Content below.
Mature SIMs do more than log aggregation and correlation
This article is part of the June 2009 issue of Information Security magazine
IT'S BEEN ALMOST a decade since security information management (SIM) systems were introduced. During that time, SIM products have evolved from relatively immature log aggregation products that were too expensive for all but the largest enterprises, to mature aggregation and management solutions that provide network and security insight to organizations of all sizes. But SIM solutions aren't done evolving. As SIM use increases, enterprises are asking vendors for additional functionality, including deeper compliance intelligence and reporting, better visualization, improved incident response and integration of identity awareness. Many companies are leveraging SIMs to increase efficiency and cost savings in their security programs. And some businesses are going beyond security awareness and exploring how the comprehensive view of network and user activity that is collected and parsed by the SIM can be used for proactive risk management and business intelligence. A CONFUSING BEGINNING Early on, the SIM space suffered from a number ...
Features in this issue
One security professional describes a homegrown risk methodology currently being used by a large university and a private corporation.
If your organization is serious about managing risk and total asset protection, then physical-logical convergence is a necessary step.
Vendors loosely using the term cloud computing are causing confusion for users in the market for buying and securing these services.
They've come a long way from the early days of log aggregation and correlation; enterprises now glean value from SIMs for compliance, visualization, and even overall business intelligence.
Columns in this issue
Cloud computing carries risks that enterprises need to weigh before they forge ahead.
The economy is forcing organizations to be more resourceful and bury the hatchet. And that's a good thing.