The Benefits of Using a SIEM to Improve IT Security
Robert Bond
VP of Marketing at Nighthawk Digital Marketing | Global Leader in Product Marketing Management
The Benefits of Using a SIEM to Improve IT Security
SIEM’s Role in Network Security Analysis and Monitoring
We put together a series of blog posts that deal with Network Security Design and Log Monitoring that are hopefully providing you clear, straightforward information about the real basics of Network Security. In our last blog post we addressed Log Monitoring and Management and why they are so critical to gathering insight into an organization’s IT Security status and issues.
Previously, we addressed “The Fundamentals of Network Security Analysis and Monitoring ” in a blog post where we discussed active versus passive security devices, flow analysis versus packet analysis, and several of the security technologies used to analyze or stop traffic including IDS/IPS technology. Prior to that blog post, we wrote another post titled “Network Security Design is Critical to Eliminating Security Gaps and Reducing Costs” – “The 5 Pieces to the Cybersecurity Puzzle ,” where we discussed the five core elements of Secure Network Design .
We’ll end this blog series with this post that will discuss SIEM’s. In this post we would like to analyze SIEM’s and their function within the SOC or Security Operations Center.
What is the Value and Function of a SIEM?
SIEM’s have 3 critical capabilities in most organizations: (1) Threat Detection (2) Investigation and (3) Time to Respond. SIEM’s were developed to collect, store, analyze, investigate and report on log and other data for incident response, forensics and regulatory compliance purposes. Prior to SIEM’s, the logs and other data were often manually collected and logs from a variety of different technologies including servers, firewalls, antivirus, spam filters and more had to be collected, normalized and analyzed.
Even in small organizations there could be over 300 software and hardware products producing logs and a large enterprise will likely have thousands. Thus, as you can imagine this was a brutally slow and monotonous process that was costly and ripe with errors. Now, after ingesting and normalizing the logs SIEM’s typically have the ability to analyze the event data in real time to provide the early detection of targeted attacks, advanced threats, and data breaches.
So, let’s boil this down into a couple of sentences to provide a clean clear definition of a SIEM.
A SIEM ingests log data from a variety of network hardware and software and analyzes the data in real time. A SIEM’s purpose is to correlate events and identify anomalies or patterns of behavior like traffic from suspicious IP addresses or unusual exfiltration of data that may indicate a breach.
Most SIEM’s have a variety of features and functionality including:
How Does a SIEM Help with Log Monitoring and Management
Let’s take a step back and go over some quick information that we introduced in the last blog post titled Log Monitoring and Management . Effective log management is essential to an organization’s security. Monitoring, documenting and analyzing system events is a crucial component of IT security. Log management software or SIEM’s automate many of the processes involved. A SIEM handles the two following jobs that prior to today’s SIEM’s were handled individually:
领英推荐
So, if we go back over what we address in the last blog post, a SIEM combines SIM and SEM and provides real-time analysis of security alerts generated by network hardware and applications. They employ or handle the following:
The Costs and Benefits of a SIEM
The Costs and Drawbacks of a SIEM
The Benefits and Advantages of a SIEM
Conclusion and 3rd Party Assistance
At this point, SIEM’s are clearly proven technology if deployed, implemented and tuned correctly. However, the upfront cost, training, operating manpower and complexity are often overwhelming for security teams. MSSP’s or Managed Service Providers are doing an excellent job of managing SIEM’s for many organizations. The benefits start with the ability to lease, rather than buy SIEM technology; an enormous upfront cost savings.
“SIEM-as-a-Service” as it is typically called by MSSP’s also provide seamless implementation and ongoing maintenance so that analysts can immediately use the technology to protect the organization, its customers and employees rather than spending time implementing and deploying.
We got a little long winded here and certainly there are a variety of points made about SIEM’s in this post that could be argued including the costs and benefits that were presented. We would love to hear your feedback and certainly thank you for reading the post.
?