Story image

Taking a look at what makes up a modern SIEM solution

When SIEM tools first emerged in the early 2000s, they were complex and unwieldy beasts, requiring large amounts of customisation and careful management.

It was certainly true that SIEM - at this stage - was only suited to large organisations with big budgets, with smaller organisations not possessing the resources to implement them.

However SIEM has evolved, and the tools of today bear little resemblance to those of the past.

Modern SIEM tools are based on a big data analytics platform which enables them to scour much larger data sets, proving quite significant for organisations experiencing a data deluge and with infrastructures that continue to grow in complexity.

Today's SIEM tools can also deal with large volumes of both structured and unstructured data, which is relevant as potential security threats come in many forms and can only be identified through the careful analysis of both data types.

To achieve this, today's SIEM tools leverage machine-based analytics, which effectively automates the task of examining large volumes of data.

This, in turn, allows patterns and incidents to be identified that traditionally may have gone unnoticed.

This capability is what is making SIEM tools attractive for smaller firms. They give them access to analytical capabilities that until recently were only available to large organisations.

This comes at a time when they recognise the importance of having a robust security infrastructure in place. They understand that just having anti-virus software and firewalls in place is no longer enough.

What to look for when deploying SIEM​

Analyst heavyweight Gartner, in its Magic Quadrant report, routinely outlines a handful of vendors that qualify as leaders in the SIEM department.

Gartner describes Leaders as those vendors who provide products that are a strong functional match to general market requirements, have been the most successful in building an installed base and revenue stream within the SIEM market, and have a relatively high viability rating (due to SIEM revenue or SIEM revenue in combination with revenue from other sources).

Among the organisations recognised in the Leaders Quadrant is security intelligence organisation LogRhythm, who were highlighted by Garnet for a number of reasons.

Gartner said the LogRhythm SIEM solution had a host of strengths, including;

  • LogRhythm provides a strong platform for organizations that want a contained platform that includes core SIEM capabilities enhanced by complementary host and network monitoring capabilities, in a solution that can scale from a single appliance up to n-tier architectures.​

  • LogRhythm's out-of-the-box content (and updates delivered to the AI Engine component), along with a powerful user interface, provides a strong real-time monitoring experience for users.​

  • SmartResponse allows users to integrate preconfigured automated response activities into their alert, investigation and response activities, either fully automated or semiautomated (e.g., manually initiated).

Particularly, Gartner said its clients - particularly midsize and smaller enterprise organizations -  reported that the simplified deployment model and support by LogRhythm via the Core Deployment Service is useful.

The analyst also noted that customers with specific use cases indicate that the analytics Co-Pilot Service is also useful to speed up implementation times.

Learn from the experts: Click here to find out how to effectively deploy a SIEM by Gartner.​

How to stay safe when shopping online
Online shopping is a great way to avoid the crowds – but there are risks.
Dell EMC embeds security in latest servers
Dell EMC's 14th generation of PowerEdge servers has comprehensive management tools to provide security across hardware and firmware.
Why data backups should be a part of daily operations
"Disaster recovery needs to address complete system failure and provide a set of security policies to govern disaster incidents."
Businesses focusing on threats from within - survey
Over 50% of respondents reported that 100 days of dwell time or more was representative of their organisation.
Corelight and Exabeam partner to improve network monitoring
The combination of lateral movement and siloed usage of point security products leaves many security teams vulnerable to compromise.
SailPoint releases first identity annual report
SailPoint’s research found that many organisations are lacking maturity in their governance processes over identities.
Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.