New & Notable
SIEM, log management and big data security analytics News
February 24, 2020
At RSA Conference 2020, Cisco unveiled SecureX, which integrates the vendor's security portfolio into a single platform with enhanced visibility and automation.
December 26, 2019
Siemplify aims to become the security equivalent of Salesforce. Chief strategy officer Nimmy Reichenberg discusses the company's plans for 2020 and the obstacles it faces.
November 21, 2019
IBM Security is shifting its strategy with a new Cloud Pak designed specifically to unify data from multiple security tools and vendors through accessing federated data.
October 30, 2019
Mission Control is intended to unify Splunk Enterprise Security, Splunk Phantom and Splunk User Behavior Analytics into the Splunk Security Operations Suite.
SIEM, log management and big data security analytics Get Started
Bring yourself up to speed with our introductory content
Companies have used traffic data analytics to improve bandwidth and network performance. Now, though, a new class of tools taps network data to improve security. Continue Reading
Gartner just produced its first-ever guide to network traffic analytics security tools. Learn how the analysis of network traffic is broadening to include network security. Continue Reading
Many security pros initially thought SOAR software could replace SIEM. Our security expert advocates learning how SIEM and SOAR can work together. Continue Reading
Evaluate SIEM, log management and big data security analytics Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
AI and machine learning in cybersecurity are not so much useful to security teams today as they are necessary. Examine cybersecurity automation trends and benefits. Continue Reading
Cyberthreats loom large in this modern IT environment. Explore the six most common roles of AI in cybersecurity and the products synthesizing them. Continue Reading
When it comes to the SOAR vs. SIEM debate, it's important to understand their fundamental differences to get the most benefit from your security data. Continue Reading
Manage SIEM, log management and big data security analytics
Learn to apply best practices and optimize your operations.
Network traffic analysis best practices require network teams to work closely with security teams and constantly assess their tool sets, analysis processes and traffic patterns. Continue Reading
AI is often associated with technology replacing humans. In the case of AI-based cybersecurity teams, however, AI will augment its human counterparts, not supplant them. Continue Reading
An effective security operations center framework includes more than just monitoring and analysis. AI and machine learning can also play a role. Continue Reading
Problem Solve SIEM, log management and big data security analytics Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Security cannot be an afterthought in internet-connected industrial control systems. IEEE member Kayne McGladrey offers best practices to stay safe in a connected world. Continue Reading
Network traffic analysis, network detection and response -- whichever term you prefer, the technology is critical to detecting new breeds of low-and-slow threats. Continue Reading
When it comes to insider threat awareness and prevention, enterprises would be wise to marry a people-centric approach with a technology-centric approach. Continue Reading