New & Notable
Security Event Management News
August 28, 2014
Despite SIEM technology improvements, Gartner says many organizations still dive into SIEM deployments without adequate planning, often resulting in disaster.
February 26, 2014
At the 2014 RSA Conference, a trio of CISOs said that SIEM still has its uses, but when it comes to big data analytics, tools like Splunk are needed.
June 13, 2013
Cisco introduces pxGrid, a new framework for sharing contextual information between security technologies, beginning with Cisco ISE.
February 27, 2013
CISOs at RSA Conference 2013 say identifying attack campaigns means taking security big data to the next level. The hard part? Finding data analysts.
Security Event Management Get Started
Bring yourself up to speed with our introductory content
After deciding what your enterprise needs from a security information and event management system, it must find the SIEM platform that best suits these needs. Continue Reading
Purchasing a SIEM system isn't as easy as picking a product off of the shelf. Expert Adrian Lane explains how your enterprise can figure out exactly what it needs from a SIEM, making the evaluating process a lot simpler. Continue Reading
Take a look at the security information and event management market with this comprehensive list of SIEM vendors. Continue Reading
Evaluate Security Event Management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
To stay current in the security information and event management market, vendors must not only offer what customers need but also differentiate themselves from the rest of the pack. Learn how this is being done. Continue Reading
When evaluating security information and event management systems, it is critical to know what your enterprise needs from a SIEM and why. Adrian Lane explores the ins and outs of why an enterprise may need a new SIEM and the benefits to look for. Continue Reading
Get help evaluating security information and event management systems to ensure that you find the SIEM technology that best fits your organization's security needs. Continue Reading
Product ReviewsPowered by IT Central Station
Powered by IT Central Station
Valuable Features: <ul> <li>Correlation Engine simpleness</li> <li>Visual agent deployment</li> <li>Stream...Continue Reading
Support can retrieve salient logging data from massive distributed systems in seconds but deployment is not easy.Powered by IT Central Station
I've been using Splunk for over 3 years now. The most valuable feature for me is alerting. Using Splunk, production support teams can retrieve...Continue Reading
I've evaluated Splunk and IBM Q1 but LogLogic is the best choice for log management. SIEM funcionailty needs improvementPowered by IT Central Station
Valuable Features: You can collect almost any type of log from almost any platform or source. Documentation is extensive with excellent...Continue Reading
Manage Security Event Management
Learn to apply best practices and optimize your operations.
This Security School covers the latest in cloud security providers and in-house IaaS, outlining how enterprises can get the most out of both options. Continue Reading
In this edition of Beyond the Page, Anton Chuvakin offers Information Security magazine readers a multimedia presentation that discusses strategies that you can use to take advantage of next-generation SIEM for internal and external threat ... Continue Reading
Even the best SIEM deployments need to sometimes come unglued to reach higher levels of success. Continue Reading
Problem Solve Security Event Management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
One of today's top security infrastructure issues is learning how to achieve interoperability. Expert Kevin Beaver explains how to start down the right path. Continue Reading
Several governments reportedly banned PCs with alleged ties to the Chinese government. Uncover the network security controls to ease enterprise fears. Continue Reading
Discover what your enterprise should do to replace the Symantec Protection Center Enterprise platform as it reaches end of life. Continue Reading