This article can also be found in the Premium Editorial Download "Information Security magazine: Security Readers' Choice Awards 2013."
Download it now to read this article plus other related content.
Beyond the Page is a monthly online Information Security magazine supplement, offering an in-depth, multimedia-centric look at a topic featured in a given month's issue. It's an opportunity to provide you with even more expertise from a selection of our best Information Security magazine contributors.
In addition to the contributor's magazine feature, Beyond the Page also offers an exclusive webcast presentation to help security practitioners and decision makers alike understand an issue from all angles, as well as an exclusive technical article that offers practical advice on implementation, management or troubleshooting.
Security magazine cover story: SIEM analytics
The success or failure of your SIEM deployment rests on your security monitoring capabilities.
SIEM architecture and operational processes
In this webcast, Anton Chuvakin describes why the success of your SIEM deployment is determined more by operational processes than by its architecture or by a specific tool.
tip: Use SIEM to identify unauthorized access attempts
Learn how to use SIEM technology to identify unauthorized access attempts to prevent data theft.
About the contributor:
Anton Chuvakin, Ph.D., is a research director at Gartner in the Gartner for Technical Professionals’ Security and Risk Management Strategies group. He is an author of books Security Warrior, Log Management and PCI Compliance. Follow him on Twitter @anton_chuvakin.
This was first published in October 2013