Information Security

Defending the digital infrastructure


Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Beyond the Page: Security information and event management

In this special report, Gartner's Anton Chuvakin uses SIEM processes to show how security monitoring can make or break a SIEM implementation.

Beyond the Page is a monthly online Information Security magazine supplement, offering an in-depth, multimedia-centric look at a topic featured in a given month's issue. It's an opportunity to provide you with even more expertise from a selection of our best Information Security magazine contributors.

In addition to the contributor's magazine feature, Beyond the Page also offers an exclusive webcast presentation to help security practitioners and decision makers alike understand an issue from all angles, as well as an exclusive technical article that offers practical advice on implementation, management or troubleshooting.

Our October 2013 Information Security magazine Beyond the Page supplement covers SIEM technology. See the content below.

Information Security magazine cover story: SIEM analytics
The success or failure of your SIEM deployment rests on your security monitoring capabilities.

Video: SIEM architecture and operational processes
In this webcast, Anton Chuvakin describes why the success of your SIEM deployment is determined more by operational processes than by its architecture or by a specific tool. 

Technical tip: Use SIEM to identify unauthorized access attempts
Learn how to use SIEM technology to identify unauthorized access attempts to prevent data theft.

About the contributor:
Anton Chuvakin, Ph.D., is a research director at Gartner in the Gartner for Technical Professionals’ Security and Risk Management Strategies group. He is an author of books Security Warrior, Log Management and PCI Compliance. Follow him on Twitter @anton_chuvakin.

Article 2 of 7
This was last published in October 2013

Dig Deeper on SIEM, log management and big data security analytics

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

Get More Information Security

Access to all of our back issues View All