logo
May 5, 2022 | Farrah Gamboa

Is It Reasonable to Deploy a SIEM Just for Compliance?

Many organizations need to meet various compliance standards, and investing in a security information and event management (SIEM) solution can often help them reach that goal. But it worth the cost and effort to deploy a SIEM solution solely for compliance? Or is there a way to maximize the value...
November 3, 2021 | Dirk Schrader

Integrating FIM and SIEM Solutions

As a business owner or manager, you must invest in top-notch security software to protect your critical files and other IT assets. Proactive vulnerability management and real-time threat monitoring help minimize the risk of costly data breaches and downtime. A well-crafted audit policy can help...
June 3, 2021 | Farrah Gamboa

What Is Security Information and Event Management (SIEM)?

As IT environments become more complex and attacks increase in frequency and sophistication, it’s vital for organizations to adopt solutions that can help them promptly identify, investigate and respond to suspicious behavior in their IT environments. One option is security information and event...
May 5, 2021 | Mike Tierney

SIEM Use Cases: Implementation and Best Practices

A security and information event management (SIEM) tool can be a valuable component of a mature security strategy. Indeed, effective SIEM solutions have been available for well over a decade. Organizations typically purchase SIEM tools expecting fast implementation and reliable security threat...
April 28, 2021 | Jeff Melnick

SIEM vs Log Management

It now takes organizations 207 days to identify and 73 days to contain security breaches, according to IBM's 2020 Cost of a Data Breach Report. That means the average "lifecycle" of an incident is a staggering 280 days — 7 months! Moreover, cybercrimes are becoming increasingly sophisticated...
September 9, 2016 | Richard Muniz

Good SIEM Setups Go Bad

SIEM is a system, that collects logs and other security related data for analysis.  In most cases, it installs an agent someplace that gathers security-related events from the various pieces of hardware on a network, be it a laptop, server, firewalls and etc. Then looks at what’s going on and...
March 21, 2016 | Alex Vovk

How to Overcome SIEM Limitations

SIEM has a reputation as a helpful and must-have solution to improve security for any enterprise. However, Forrester experts say that SIEM has certain limitations, which makes it inefficient without additional investments in technology and personnel. Key SIEM Limitations SIEM has limitation...
March 15, 2016 | Alex Vovk

Infographics: Common Drawbacks of SIEM Solutions

SIEM is a complex solution that requires thorough maintenance and support, which often skyrockets SIEM expenses. The need to hire and train more SIEM analysts is named as the main factor that significantly influences the total cost of SIEM ownership. It earned the highest score (4.8) in the rating...
October 30, 2014 | Jeff Melnick

Can SIEM Solutions Be Effectively Used for Change Auditing?

This should be no revelation to IT professionals: you have to regularly monitor changes occurring in your network – and mainly for two reasons. The first one is this: continuous monitoring will take pain off meeting compliance requirements and surviving auditor’s visits. The second reason to...
October 24, 2013 | Nick Cavalancia

Next Generation of SIEMs? Ease Of Use, Analyze More Data

In one of the most recent articles posted on darkreading.com, Robert Lemans speaks about the new features of Security Information and Event Management (SIEM) systems and some common problems the comapnies face when using them. The most interesting quote in this article came as no surprise - "Yet...
Show more articles
...