Skip to main content

SIEM One for All


This situation directly aligns with the Security Information & Event Management (SIEM) market. With the scores of costly, appliance-based and enterprise SIEM solutions on the market, the majority of security teams find it difficult to adopt SIEM to strengthen network security. Even if they do manage to meet the high cost of a SIEM purchase, they end up acquiring a SIEM which is too big for their security needs.

This means incurring additional appliance maintenance costs, IT staff overhead costs to manage the SIEM product, and training and consulting costs, not to mention the many other operational expenses. In addition to the cost factor, traditional enterprise SIEM solutions ship a surplus of extraneous features packaged with basic SIEM requirements and capabilities. Resource-sensitive security teams rarely need these features.

So, the question to the 99% security departments is, “Why purchase a costly SIEM, and invest more in edge use-case functionality that you don't need?

The straight answer is - Don’t!” Instead, explore SIEM options that suit your needs and budget before you make your decision to go with an expensive SIEM.

How do you evaluate SIEM that meets your requirements?
1.     Match the SIEM Potential with Your Reality: The promise of SIEM automation and security visibility is possible. But distractions lie ahead that you need to prepare for. Arm yourself against vendor-induced confusion by clearly identifying what type of help you want from a SIEM and how you need to interact with it.
2.     Don’t Fall for the More-is-Better Pretense: Enterprise SIEM vendors always market the comprehensiveness and extensive functionality of their SIEM. Don’t get distracted by these edge use cases because the functionality you don’t need will add to your cost.
3.     Estimate Total Cost of Ownership (TCO): Every SIEM evaluation should also be accompanied by an estimate of your organization’s TCO which includes both the cap-ex, op-ex, and annual maintenance costs. If you are already overstretching your manpower, a complex SIEM product is only going to make it worse, requiring even more management overhead. There are affordable SIEM alternatives that cost only as much as or even less than the annual renewal money spent on enterprise SIEM solutions.
4.     Look for SIEM Software that’s Easy to Manage: When it comes to SIEM, the general perception is that the cost and setup and configuration time is enormous. This is true. It’s also true that appliance-based hardware SIEM products make already overstretched IT lives even worse. Evaluate SIEM software alternatives that simplify your SIEM installation and configuration and allow you to deploy the solution yourself without needing additional consultation or training.
The core essentials of SIEM are real-time security monitoring, threat visibility, automation, incident response, and reporting capabilities. If these features are included in an affordable SIEM software, try it first before breaking the bank to purchase from enterprise vendors.



Comments

Popular posts from this blog

LinuxGuruz Netfilter IPTABLES Firewall Page

The Netfilter Project Homepage http://www.netfilter.org Source Code Userspace code (tar.bz2) http://www.netfilter.org/files/iptables-1.3.0.tar.bz2 FAQ Netfilter/Iptables FAQ http://netfilter.samba.org/documentation/FAQ/netfilter-faq.html Firewall Forensics (What am I seeing?) FAQ http://www.robertgraham.com/pubs/firewall-seen.html Network Intrusion Detection Systems - IDS http://www.robertgraham.com/pubs/network-intrusion-detection.html Sniffing (network wiretap, sniffer) FAQ http://www.robertgraham.com/pubs/sniffing-faq.html Linux IP Masquerade FAQ http://en.tldp.org/HOWTO/IP-Masquerade-HOWTO/ Firewall Admins Guide to Porn FAQ http://www.robertgraham.com/pubs/firewall-pr0n.html Hacking Lexicon - hacking dictionary http://www.robertgraham.com/pubs/hacking-dict.html Submit a FAQ Link or URL http://www.linuxguruz.com/iptables/#links Scripts Home LAN masquerading http://the-devil.dnsalias.net/home/extremist_MASQ Home LAN ip6t...

How to Address the Patching Paradox

Analyze your vulnerability response capabilities.  Assess vulnerability detection and patching capabilities to identify vulnerability response issues. Tackle low-hanging fruit first.  Prioritize minor vulnerability response problems and build a comprehensive vulnerability response strategy over time. Eliminate barriers between security and IT teams.  Combine vulnerability and IT configuration data into a single platform to drive collaboration between security and IT teams. Create end-to-end vulnerability response processes.  Develop vulnerability response processes and ensure that security and IT teams have a shared view of these processes. Retain security talent.  Remove internal barriers, optimize day-to-day processes and automate mundane work; by doing so, an organization can create a positive environment for security teams, increase employee satisfaction and boost the likelihood of retaining top security talent. Manual vulnerability response process...

mobile application Security Testing

Apps that enterprises develop themselves (or have developed by outsourcers) must be tested, to ensure they’re not leaking customer data or opening the enterprise to attack It’s cheaper and faster to test apps pre-production than it is after deployment Automated testing of mobile software is faster and more effective than manual testing Mobile applications interact with back-end web servers and services that also need to be tested That’s where AppScan® comes in What customers struggle with: Deploying secure mobile applications – both iOS and Android Static testing of mobile applications for security exposures, prior to deployment Inability to assess security of mobile applications developed by outsourcers Finding resources to test application code Understanding security risks of the mobile application environment Bringing together mobile application testing results with back-end web application and services resu...