6 Key Use Cases for Security Information and Event Management (SIEM)

6 Key Use Cases for Security Information and Event Management (SIEM)

The term Security Information and Event Management (SIEM) finds its origin from the combination of Security Information Management (SIM) and Security Event Management (SEM). Where SIM focuses on the collection and long-term storage of log files, SEM focuses on real-time monitoring of (suspicious) behaviour. SEM does this by aggregating and identifying interesting log entries (events),Read more about 6 Key Use Cases for Security Information and Event Management (SIEM)[…]

Webinar- Mastering Next Gen SIEM Use Cases (Part3)

Webinar- Mastering Next Gen SIEM Use Cases (Part3)

Explore in-depth Use Cases of Next-Gen Security Information and Event Management (SIEM) – Part 3 of 3 series.   What will you learn: Tools and techniques – understanding the taxonomy Top use cases for the SOC Attack surfaces Insider threat Credential theft Endpoint compromise Application attack Monitoring / Building / SWIFT Fraud Analytics and hunting playbooks for SWIFT AboutRead more about Webinar- Mastering Next Gen SIEM Use Cases (Part3)[…]

Webinar- Mastering Next Gen SIEM Use Cases (Part2)

Webinar- Mastering Next Gen SIEM Use Cases (Part2)

Explore in-depth Use Cases of Next-Gen Security Information and Event Management (SIEM) – Part 2 of 3 series.   What will you learn: Tools and techniques – understanding the taxonomy Top use cases for the SOC Attack surfaces Insider threat Credential theft Endpoint compromise Application attack Monitoring / Building / SWIFT Fraud Analytics and hunting playbooks for SWIFT AboutRead more about Webinar- Mastering Next Gen SIEM Use Cases (Part2)[…]

Webinar- Mastering Next Gen SIEM Use Cases (Part1)

Webinar- Mastering Next Gen SIEM Use Cases (Part1)

Explore in-depth Use Cases of Next-Gen Security Information and Event Management (SIEM) – Part 1 of 3 series.   What will you learn: Tools and techniques – understanding the taxonomy Top use cases for the SOC Attack surfaces Insider threat Credential theft Endpoint compromise Application attack Monitoring / Building / SWIFT Fraud Analytics and hunting playbooks for SWIFT AboutRead more about Webinar- Mastering Next Gen SIEM Use Cases (Part1)[…]

Top Metrics to manage your SIEM Program

Top Metrics to manage your SIEM Program

SIEM tool is among some of the most complex security tools to manage and operate. Here in this learn about the key parameters which you can track to make your SIEM tool more effective:   Percentage reduction in False Positives/Negatives over a specified period of time: These metrics track the maturity and effectiveness of SIEMRead more about Top Metrics to manage your SIEM Program[…]

Top 5 Security Information and Event management (SIEM) Vendors at RSAC 2017

Top 5 Security Information and Event management (SIEM) Vendors at RSAC 2017

RSA conference is one of the leading security conference worldwide.  It creates tremendous opportunity for vendors, users and practitioners to innovate, educate and discuss around the current security landscape.   A SIEM tool enables an organization to aggregate structured (logs from hosts, devices, applications, network etc.)  and unstructured (News feed, Threat intelligence, articles etc)  dataRead more about Top 5 Security Information and Event management (SIEM) Vendors at RSAC 2017[…]