Security Management 2.0: Time to Replace Your SIEM?

Security Management 2.0: Time to Replace Your SIEM?
Security Management 2.0: Time to Replace Your SIEM?

CLICK HERE TO REGISTER FOR FREE

Date: Tuesday, Jan 31.  2012

Time: 2:00 p.m. ET/11:00 a.m. PT

The reality is that many organizations have spent millions and years trying to get productivity out of their SIEM - with mediocre results.  Most security teams need to start asking themselves some key questions: Is it time? Are you waving the white flag? Has your SIEM failed to perform to expectations despite your significant investment?  If you are questioning whether your existing product can get the job done, you are not alone.

Given the rapid evolution of SIEM/Log Management offerings - and the evolution of requirements with new application models and this cloud thing - you should be wondering whether there are better, easier, and less expensive solutions for security monitoring and analysis.

This webcast takes a brutally candid look at triggers for considering a new security management platform, walks through each aspect of the decision, and presents a process to migrate - if the benefits of moving outweigh the risks.  Key topics include:

  • SIEM Evolution - New features, advanced capabilities, and deployment models
  • Requirements - Security, compliance and operations management
  • Platform Evaluation - What you have, what works, what doesn't
  • Decision Process - Original requirements, new needs
  • Selection Process - Key questions and evaluation criteria
  • Negotiation - Incumbent and new vendors
  • Migration - Pragmatic steps to get there

Don't be scared - in some ways SIEM replacement can be easier than the initial installation (yes, you can breathe a sigh of relief), but only if you leverage your hard-won knowledge and learn from your mistakes.

Featured Speakers

Adrian Lane, Analyst/CTO, Securosis
Mel Shakir, CTO, NitroSecurity

More in Vendor Webcasts

Why NAC? Why now?

Why are so many enterprises rushing to implement network access control (NAC) now? Watch this webcast to learn about the many uses of NAC.

Security Based on Trust, Not Fear

Security Based on Trust, Not Fear

Trust is essential for building a sustainable business. Security is essential for building trust. To build that trust in electronic networks, security needs to be built into a suitable framework, ...

Unknown Targeted Attacks - Stopping malware at the endpoint

Unknown Targeted Attacks - Stopping malware at the ...

The threat of Targeted Persistent Attacks (TPAs) continues to grow and nearly every day there is another headline about an organization being breached and critical data stolen. Organizations must ask ...