SIEM: Security Information and Event Management

This category contains articles related to security information trends and tips, as well as event management best practices and guidelines.

SIEM for Google Cloud Platform

SIEM for Google Cloud Platform

  • SIEM

Google Cloud Platform and Security Monitoring Google Cloud Platform (GCP) is attracting a lot of companies, large and small, with its stability and many built-in services. But aggregated security monitoring has to be done via an external service.   However, log aggregation for security purposes… Read More »SIEM for Google Cloud Platform


LogSentinel SIEM Roadmap: From SIEM to a 360-Degree Security Monitoring Platform

  • SIEM

LogSentinel’s vision is to provide a security monitoring solution to any organization that needs it and thus reduce their risk of security breaches. That vision requires many innovations and here we’re sharing our high-level roadmap for the next 2 years. Each part of LogSentinel SIEM… Read More »LogSentinel SIEM Roadmap: From SIEM to a 360-Degree Security Monitoring Platform

SIEM Pillars

The Three Pillars of SIEM

  • SIEM

We have built our LogSentinel SIEM around some core principles and we’d like to share and explain them. Every organization can get value from SIEM SIEM is considered expensive and complicated and generally not fit for smaller organizations (and “smaller” can mean anything from a… Read More »The Three Pillars of SIEM

Why Are SIEMs Expensive and How To Choose Affordable SIEM

Why Are SIEMs Expensive?

  • SIEM

Top Reasons Why SIEMs Are Considered Expensive SIEM (Security Information and Event Management) systems have a reputation for being expensive. And that’s generally correct – they can cost hundreds of thousands per year or have huge upfront costs. But why is that? There are several… Read More »Why Are SIEMs Expensive?


Evolving to SIEM

  • SIEM

LogSentinel was founded several years ago with the vision of improving security for everyone and an initial goal of protecting audit log integrity. Initially, we implemented and scaled state-of-the-art research to guarantee the integrity of logs – through hash chains, merkle trees, timestamps and, ultimately,… Read More »Evolving to SIEM


SIEM Buyer’s Guide for SMEs

  • SIEM

You have probably seen many other SIEM buyer’s guides and realized that they are focused on large multinationals and Fortune 500 companies and you find them hard to relate to. However, the SIEM products are no longer targeted just at large corporations (despite the fact… Read More »SIEM Buyer’s Guide for SMEs