Premium Content

Access "SIEM analytics: Process matters more than products"

Published: 26 Sep 2013

Security information and event management (SIEM) projects—still in the early stages for some organizations—have a long and somewhat tortuous history. After two decades, many of the remaining challenges concern SIEM-related processes and practices rather than the tools themselves. Organizations can procure next-generation SIEM products from numerous vendors, but buying the security monitoring capability is impossible. Research indicates 75% of chief information security officers who experience publicly disclosed security breaches and lack documented, tested response plans will be fired. Gartner Research   SIEM tools collect, correlate and analyze a wide variety of security-related data. This information can include logs, alerts and flows as well as vulnerability, asset and user contexts. Security monitoring refers to the set of operational processes that are built around the tool. SIEM processes, which can apply to multiple security monitoring and data analysis technologies, depend on the usage of the product. Is it for security or compliance-driven ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
    • Security Readers' Choice Awards 2013 by SearchSecurity.com Staff

      We asked Information Security readers to pick the best security products in 19 categories. Find out which products earned top honors in our 2013 Readers' Choice Awards.

    • SIEM analytics: Process matters more than products by Anton Chuvakin

      Expect Microsoft Word to write the next great American novel? Success or failure with SIEM products rests on your security monitoring capabilities.

More Premium Content Accessible For Free

  • Threat intelligence and risk: Why cybersecurity hangs in the balance
    ISM_0614.png
    E-Zine

    As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...

  • How to respond to the latest distributed denial-of-service attacks
    DDOS_attacks.png
    E-Handbook

    All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...

  • Figuring out FIDO as the first products emerge
    ISM_0514.png
    E-Zine

    The Fast Identity Online (FIDO) standards reached the public draft stage in February, and the first deployments of FIDO-ready technologies followed ...