Access "Unlocking the opportunity of SIEM technology"
This article is part of the March 2012 issue of Exploring the benefits of enhanced SIEM products
Ensuring the ongoing integrity of an enterprise information technology environment is a formidable task, and one that requires every advantage a delivery management team can harness. Security information and event management, or SIEM, can create a significant advantage in providing enterprises with a comprehensive, coordinated view of the security status of their environment. The challenge in security is always to remain one step ahead of those who may try to compromise the integrity in some way. Implemented properly, SIEM technology can be a powerful technique for obtaining advantage over individuals or technologies with malicious intent. The opportunity of SIEM is to establish a centralized, coordinated view of security-related information and events. The underlying principle is that such inputs are produced in multiple locations, but without seeing “the big picture,” it may not be obvious that trends or patterns are occurring. By establishing a collector network, the security-related events from end-user devices, servers, network equipment -- and even ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Unlocking the opportunity of SIEM technology
by Andrew Hutchison
Learn about SIEM technology and how to unlock the opportunity for SIEM technology to be a powerful technique in the fight against cybercrime.
-
NGFW: Getting clarity on next-gen firewall features
by Diana Kelley
There’s a lot of hype about next-generation firewalls. Here’s what you need to know.
-
Unlocking the opportunity of SIEM technology
by Andrew Hutchison
-
-
The RSA breach: One year later
by Marcia Savage, Michael S. Mimoso and Robert Westervelt
The attack on RSA shook the security industry to its core: A look at the breach’s far reaching impact.
-
Symantec breach highlights remote management holes
by Robert Westervelt, News Director
Poorly configured remote administration tools are a common attack vector, security experts say.
-
The RSA breach: One year later
by Marcia Savage, Michael S. Mimoso and Robert Westervelt
-
Columns
-
A framework for big data security
by John Kindervag, Contributor
Organizations are entranced with big data but need to acknowledge the security risks and plan accordingly.
-
Lessons learned from VeriSign, Symantec breaches
by Marcia Savage, Editor
After a string of breaches at major security vendors, whom can we trust?
-
A framework for big data security
by John Kindervag, Contributor
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO