Security Information and Event Management systems are considered a “must-have” in many industries. They are effectively a horizontal security tool that improves security posture and improves visibility regardless of the domain specifics. Or at least it seems so at first. The reality is somewhere in… Read More »Three Industry-Specific Aspects of SIEM
SIEM: Security Information and Event Management
This category contains articles related to security information trends and tips, as well as event management best practices and guidelines.
Top Reasons Why SIEMs Are Considered Expensive SIEM (Security Information and Event Management) systems have a reputation for being expensive. And that’s generally correct – they can cost hundreds of thousands per year or have huge upfront costs. But why is that? There are several… Read More »Why Are SIEMs Expensive?
What is a SIEM? SIEM stands for Security information and event management. This technology has existed since the late 1990s. Traditional SIEM has been joined by a broad use log management technology that focuses on collecting various types of logs and events for different purposes,… Read More »SIEM: What Is SIEM, How It Works, and Useful Resources
Security Information and Event Management (SIEM) systems are crucial for every organization as they are able to detect malicious acts and even to prevent them. By converting simple audit logs into a very detailed behavior analysis, SIEMs can help in achieving full data protection and… Read More »Free Webinar: SIEM – Benefits and Pitfalls
Log Integrity Capabilities of SIEMs Log integrity and non-repudiation are key properties of audit logs. As SIEMs are usually the way to collect audit logs (among many other things) in large organizations, we have to make sure they give us those properties. We have discussed previously that it’s not… Read More »Log Integrity: How SIEMs Address the Issue and Is It Enough?
Logs are ubiquitous in IT – they are semi-structured pieces of information about the behavior of a system and its users. Many standards, regulations and best practices assume and require the existence of logs. Consequently, many systems collect those logs and make use of them for… Read More »Log Collectors Landscape: SIEM, Log Collectors, UEBA, and Audit Trail
It is for a good reason that “integrity” is one of the three main aspects of information security. Lack of data integrity can be a serious issue in many cases, as we have already discussed in our post “3 Reasons Not to Ignore Data Integrity”.… Read More »Does Your SIEM Guarantee Log Integrity? And Does It Make You Compliant?
There are a lot of products that allow collecting data, aggregating it, and displaying it for security or monitoring purposes. That includes SIEMs (Security information and event management systems), UEBAs (User and entity behavior analytics), log collectors, and catch-all multi-purpose data platforms (like Splunk). And… Read More »Track Events You Have Not Tracked Before
Many large organizations prefer to have their audit trail stored within their own infrastructure. Due to their structure and policies they are reluctant to use cloud services. Using a cloud service has the additional benefit of responsibility segregation – your sysadmins may not have the… Read More »Protecting On-Premise Audit Trail
We are happy to announce that you can now use SentinelTrails in your Heroku deployments. The SentinelTrails addon can be found here. SentinelTrails is a blockchain-enabled secure audit trail. It will help you take control of the data you store and will ease your log… Read More »Try SentinelTrails In Your Heroku Deployment
An audit trail (or audit log) is something both intuitive and misleading at the same time. There are many definitions of an audit trail, and all of them give you an idea of what it is about: A system that traces the detailed transactions relating… Read More »What is an Audit Trail in IT Context?
SIEMs can help detect different kinds of issues related to information security. Some of these issues are vital to the organization as they affect confidential data, or can even lead to personal data leaks.