The Case for Security Information and Event Management (SIEM) in Proactive Network Defense

It’s widely accepted that Security Information and Event Management (SIEM) systems are excellent tools for regulatory compliance, log management and analysis, trouble-shooting and forensic analysis. What’s surprising to many is that this technology can play a significant role in actively defending your network. This whitepaper explains precisely how real-time analysis, combined with in-memory correlation, and automated notification and remediation capabilities can provide you with unprecedented network visibility, security and control.

Information technology and security professionals are literally drowning in data. The devices and systems they’ve deployed to protect their organizations generate millions of events every day which are virtually impossible
to analyze without automation. In spite of the complexity, this data must be analyzed - both to ensure the integrity of the customer, credit card, or patient data, and also to meet serious regulatory requirements and fiduciary responsibilities.

To be effective in network defense, and not just for forensic analysis, the network and security event data must also be analyzed and correlated in real-time. This information needs to be manageable and actionable as well. Forensics are not enough. Detecting and stopping today’s zero-day, multi-vector and blended threats requires real-time, in-memory, analystics that can capture, correlate and respond to network attacks and insider abuse - at network speed. There are numerous obstacles to performing this task efficiently, securely and with minimal personnel resources.

The information being analyzed from log files needs to be manageable and actionable. Forensics are not enough. Detecting and stopping today’s zero-day, multi-vector and blended threats requires real-time, in-memory, analystics that can capture, correlate and respond to network attacks and insider abuse - at network speed.