New & Notable
Security Event Management News
August 28, 2014
Despite SIEM technology improvements, Gartner says many organizations still dive into SIEM deployments without adequate planning, often resulting in disaster.
February 26, 2014
At the 2014 RSA Conference, a trio of CISOs said that SIEM still has its uses, but when it comes to big data analytics, tools like Splunk are needed.
June 13, 2013
Cisco introduces pxGrid, a new framework for sharing contextual information between security technologies, beginning with Cisco ISE.
February 27, 2013
CISOs at RSA Conference 2013 say identifying attack campaigns means taking security big data to the next level. The hard part? Finding data analysts.
Security Event Management Get Started
Bring yourself up to speed with our introductory content
Expert Kevin Beaver explains how enterprises can take a page from Facebook's ThreatData framework security analytics to boost enterprise defense. Continue Reading
Security information and event management technology isn't new but it's changing rapidly. In this webcast viewers will learn SIEM's history, current uses and likely future as a security big data analytical device. Continue Reading
Uncover key continuous security monitoring tips enterprises can take away from the federal government's Continuous Diagnostics and Mitigation program. Continue Reading
Evaluate Security Event Management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
When an organization has a highly outsourced IT environment, it is critical to use a SIEM system to reduce security complexity and identify threats. However, finding the proper system can be challenging. Kevin Beaver offers tips for success. Continue Reading
The next-generation network -- one that must encompass the cloud, mobility and Internet of Things devices -- requires a different standard of network monitoring tools. Learn about new and improved tools that conquer those challenges. Continue Reading
The widening array of sophisticated security attacks has prompted vendors of unified threat management systems to add advanced features to their products. This tip outlines emerging UTM features and explains how IT pros can best use them. Continue Reading
Product ReviewsPowered by IT Central Station
Powered by IT Central Station
Use Of Solution: I worked on version 5 and then 6 for a total of 6 years. My personal score is 4 stars based on my experience with the latest...Continue Reading
Support can retrieve salient logging data from massive distributed systems in seconds but deployment is not easy.Powered by IT Central Station
I've been using Splunk for over 3 years now. The most valuable feature for me is alerting. Using Splunk, production support teams can retrieve...Continue Reading
I've evaluated Splunk and IBM Q1 but LogLogic is the best choice for log management. SIEM funcionailty needs improvementPowered by IT Central Station
Rating: If considering only the log management functionality (collecting, storing, search engine, reporting, alerting, etc.), I would give it...Continue Reading
Manage Security Event Management
Learn to apply best practices and optimize your operations.
This Security School explains the best methods for infosec pros to effectively use SIM to get the best data in order to improve incident response, change management processes and security policies overall. Continue Reading
Learn how SIEM systems have evolved and how they now gather the data operations teams need to investigate and mitigate attackers' damage. Continue Reading
Several governments reportedly banned PCs with alleged ties to the Chinese government. Uncover the network security controls to ease enterprise fears. Continue Reading
Problem Solve Security Event Management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Discover what your enterprise should do to replace the Symantec Protection Center Enterprise platform as it reaches end of life. Continue Reading
Developing a continuous security monitoring program to ensure 24/7 security is no easy task. Michael Cobb offers key advice for completing the task. Continue Reading
Learn how to improve policies and enhance monitoring to make your security information and event management (SIEM) product more effective. Continue Reading