Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Beyond the Page: Security information and event management

In this special report, Gartner's Anton Chuvakin uses SIEM processes to show how security monitoring can make or break a SIEM implementation.

This article can also be found in the Premium Editorial Download: Information Security magazine: Security Readers' Choice Awards 2013:

Beyond the Page is a monthly online Information Security magazine supplement, offering an in-depth, multimedia-centric look at a topic featured in a given month's issue. It's an opportunity to provide you with even more expertise from a selection of our best Information Security magazine contributors.

In addition to the contributor's magazine feature, Beyond the Page also offers an exclusive webcast presentation to help security practitioners and decision makers alike understand an issue from all angles, as well as an exclusive technical article that offers practical advice on implementation, management or troubleshooting.

Our October 2013 Information Security magazine Beyond the Page supplement covers SIEM technology. See the content below.

Information Security magazine cover story: SIEM analytics
The success or failure of your SIEM deployment rests on your security monitoring capabilities.

Video: SIEM architecture and operational processes
In this webcast, Anton Chuvakin describes why the success of your SIEM deployment is determined more by operational processes than by its architecture or by a specific tool. 

Technical tip: Use SIEM to identify unauthorized access attempts
Learn how to use SIEM technology to identify unauthorized access attempts to prevent data theft.

About the contributor:
Anton Chuvakin, Ph.D., is a research director at Gartner in the Gartner for Technical Professionals’ Security and Risk Management Strategies group. He is an author of books Security Warrior, Log Management and PCI Compliance. Follow him on Twitter @anton_chuvakin.

This was last published in October 2013

Dig Deeper on SIEM, log management and big data security analytics



Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.








  • CIO Trends #6: Nordics

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to ...

  • CIO Trends #6: Middle East

    In this e-guide we look at the role of information technology as the Arabian Gulf commits billions of dollars to building more ...

  • CIO Trends #6: Benelux

    In this e-guide, read about the Netherlands' coalition government's four year plan which includes the term 'cyber' no fewer than ...