The promise of SIEM is clearly an essential one - aggregate, correlate & analyze all of the security-relevant information in your environment.
It is clear that these are two entirely different beasts. But do we need both?
Protecting mission-critical systems against cyber attacks has become a national priority for government, critical infrastructure and military sites, and a business priority for corporations.
The status quo can be managed, but it requires a different capital investment profile than the one that most organizations are using today.
Industry professionals must update and continue to adapt their security tactics, according to an expert at this year's Black Hat conference in Las Vegas.
Considered to be one of the biggest weapons in the fight against cyber crime, security intelligence should also be backed by an arsenal of security layers.
The technology is capable of providing all of the data organizations need for compliance, but managing the log activity to make sense of it can be a challenge.
With data proliferating at astonishing rates, organizations are tearing into it, hoping to derive new business value, which, according to Zions CSO Preston Wood, includes better security decision making.
Most businesses don't understand how to manage risk, yet, we live in a world full of risks, says Guidance Software's Anthony Di Bello.
Throughout the day, SC Magazine will be announcing the finalists from each of its 32 award categories, covering the Reader Trust, Professional and Excellence sections.
IBM on Tuesday announced it is buying privately held Q1 Labs, a Waltham, Mass.-based vendor of security event and log management software. The company will be integrated into the newly formed IBM Security Systems division, expected to be led by Q1 Labs CEO Brendan Hannigan. Q1 Labs provides analytics and correlation technology that, it says, can help prevent breaches, such as an employee accessing unauthorized information. Financial terms of the deal, the second SIEM-related acquisition announced Tuesday, were not disclosed.
McAfee on Tuesday announced it is acquiring NitroSecurity, a privately owned security information and event management provider based in Portsmouth, N.H. McAfee said that following the buy, which is subject to regulatory approvals and other customary closing conditions, the integration of NitroSecurity's technology into McAfee ePolicy Orchestrator will give organizations greater visibility into their IT environment. The acquisition is expected to close by the fourth quarter of this year. During 2010, the SIEM market grew from $858 million to $987 million, a growth rate of 15 percent, according to Gartner.
Richard Weeks, VP of business and channel development at Cyber-Ark, tells SC Magazine Executive Editor Dan Kaplan why stopping privileged users is a key strategy to deterring abuse coming from both inside and outside the network.
In a conversation with SC Magazine Executive Editor Dan Kaplan, Steve Livingston, principal of Deloitte Enterprise Risk Services, chronicles how people, processes and technology can combine to create a robust risk framework that achieves buy-in from senior management.
To fight today's sophisticated adversaries and protect the nation's digital infrastructure, the cybersecurity industry must unite technologies, develop new ones and cultivate experts.
This month, the focus is on analysis. We look at the network through the lens of the SIEM, and we look at digital incidents and cybercrime through digital forensics.
For many small and midsize businesses, neglecting IT security is a thing of the past, reports Angela Moscaritolo.
A credit union with 17 branches in Alaska found the right tool for logging, not of timber, but of its data assets, reports Greg Masters.
Another IT security company was gobbled up by an IT bellwether when HP on Monday announced plans to acquire Cupertino, Calif.-based SIEM provider ArcSight for $1.5 billion.
Security information and event management (SIEM) tools have frustrated many - yet they are here to stay, reports Beth Schultz.
We are only at the beginning of evolution in terms of the meaningful intelligence that can be derived from log and event data, says LogRhythm's Eric Knight.
Sign up to our newsletters
SC Magazine Articles
- Zero-day in Fiat Chrysler feature allows remote control of vehicles
- 'GSMem' malware designed to infiltrate air-gapped computers, steal data
- All smartwatches are vulnerable to attack, finds study
- Fake games in Google Play redirect Android users to porn sites
- Apple App Store and iTunes buyers hit by zero-day
- United reportedly hacked by same group that breached Anthem, OPM
- HAMMERTOSS malware represents culmination of 'best practices' for cyber attackers
- Hundreds of Massachusetts General Hospital patients notified of data incident
- Majority of Android devices vulnerable to denial-of-service bug
- Security concerns raised at Windows 10 roll-out