Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

The latest advances in SIEM products

There are many factors to consider when selecting a security incident and event management (SIEM) product. Read on to learn about the latest SIEM tech advances.

SIEM products have been at the heart of many organizations security operations for over a decade. Whether they're...

being used mostly for centralized logging and compliance or for incident detection and response efforts, security information and event management products (SIEM products), provide a single interface to information from many security systems. Over the years, SIEM technologies have changed, and it's important that your own SIEM strategies evolve to incorporate these advances.

Here are a few recent advances you should be aware of when looking at new SIEM products or re-evaluating your existing SIEM's quality.

Big data adoption

One of the biggest trends in SIEM during the past few years has been the switch from relational databases to big data models. If your organization is using SIEM strictly as centralized logging, a switch to big data may be ill advised, because of its potentially lossy nature. (Big data doesn't use traditional relational databases, so it cannot be relied upon to comprehensively retrieve every bit of data originally stored in it.) But if your organization is using SIEM for incident detection and response, a switch to big data may improve your incident detection rates by being able to collect much more data and crunch it to find the patterns of attacks within it.

Threat intelligence feeds

One pixel SIEM products, features evolving to
spot new threats

SIEM products increasingly support the ingestion of threat intelligence feeds. These feeds contain information about threat indicators, such as the IP addresses, hostnames and URLs attackers use. Each feed typically includes a score for each threat indicator, rating relative confidence in its malicious nature, as well as additional metadata that provides context for the threat intelligence. When a threat intelligence feed is used in conjunction with SIEM data, it provides a wealth of intelligence and allows for the expedited identification of incidents and more confident responses. Make sure that your SIEM supports threat intelligence feeds.

Cloud-based integration

Logging in multitenant clouds has long been a challenge for SIEM systems. Fortunately, there are now many cloud-based SIEM services and products that can collect audit logs and route those logs to an organization's regular (non-cloud) SIEM servers. Some of these cloud-based SIEM products are offered by the same vendors that offer regular SIEM products; integration may be trivial for these cases. In other cases, extensive planning and testing may be needed to determine if the data from the cloud can be collected, processed and transported to the enterprise SIEM system in a timely enough manner to support incident response.

Distributed analysis

Although SIEM products have traditionally been thought of as centralized log processing, enterprises can now ensure increased scalability by having individual data collection points do some of their own data analysis and processing. If your SIEM is currently struggling to keep up with its workload, you may benefit from switching to a distributed architecture.

In conclusion, consider your own organization's needs for a SIEM product in the context of these four recent advances. Odds are that if your organization is solely interested in SIEM for centralized logging, these advances aren't so important -- but be aware that your SIEM can do so much more than just log management. It can be an invaluable tool both for discovering incidents more quickly and by correlating data across systems and events with threat intelligence.

Next Steps

What problem does your SIEM system need to solve?

Before you choose a SIEM, consider these factors

Stay up to date on SIEM product developments

This was last published in October 2015

Dig Deeper on SIEM, log management and big data security analytics

PRO+

Content

Find more PRO+ content and other member only offers, here.

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

What features are most, and least, important to your team when choosing a new SIEM system?
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close