Manage Learn to apply best practices and optimize your operations.

Beyond the Page: Next-generation SIEM

In this edition of Beyond the Page, Anton Chuvakin offers Information Security magazine readers a multimedia presentation that discusses strategies that you can use to take advantage of next-generation SIEM for internal and external threat management.

This article can also be found in the Premium Editorial Download: Information Security magazine: Security Readers' Choice Awards 2014:

Anton Chuvakin evaluates SIEM tools and services, and discusses strategies that you can use to take advantage of next-generation SIEM for internal and external threat management.

Organizations have invested in security information event management to monitor and analyze events and user activities, largely by aggregating log data. Many companies have faced numerous challenges taking advantage of their SIEM investments and, if anything, the technology is growing more complex. Vendors are integrating SIEM with proprietary threat intelligence, endpoint security products and operations software, and even offering co-managed SIEM and monitoring services. Chuvakin explains how to evaluate these tools and services, and explores the strategies that some organizations have used to take advantage of next-generation SIEM for internal and external threat management.

In this edition of Beyond the Page, Anton Chuvakin offers Information Security magazine readers a multimedia presentation that discusses strategies that you can use to take advantage of next-generation SIEM for internal and external threat management.

Video

SIEM missteps? Tips to help you move forward
In this video, Anton Chuvakin describes how to avoid common pitfalls and find value in SIEM deployments at different maturity levels.

View the video

Feature

Stuck in a SIEM Rut?
Even the best SIEM deployments need to sometimes come unglued to reach higher levels of success.
Continue reading

Tech Tip

Using threat intelligence with SIEM products
Threat intelligence is not hard to integrate with most SIEM products. Here's how to take advantage of your vendor's threat data and other intelligence sources.
Continue reading

About the author

Anton Chuvakin, Ph.D., is a research vice president at Gartner for the Technical Professionals' Security and Risk Management group. As a recognized expert in log management and PCI compliance, Dr. Chuvakin has published dozens of papers on log management, SIEM, correlation, security data analysis, PCI DSS and security management. He is an author of "Security Warrior" and "PCI Compliance." For more, check out his Gartner blog, personal blog or follow him on Twitter @anton_chuvakin.

 

This was last published in November 2014

Dig Deeper on SIEM, log management and big data security analytics

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close