Event Management AND Security information | IT NETWORKS
Security Information and Event Management or SIEM, grew out of two requirements. One was to contend with the flood of alerts issued from IPS or Intrusion Prevention Systems and IDS or Intrusion Detection Systems which were overwhelming security teams.
IDS were used to measure and prove compliance to various legislations. A deluge of compliance legislation appeared in the first two decades of the twenty-first century in reply to numerous high-profile network breaches.
In the other hand, the technology needed several things:
First, logs aggregation from many network sources, such as network and security devices, servers and databases, and applications into a central repository for analysis and pattern detection.
Second, storing data logs for a period of time to satisfy auditing requirements.
Third, correlation, monitoring and notifying events in real-time.
SIEM is primarily an information platform. As CyberAttacks became more sophisticated and stealthy, demands for information about a CYBERATTACK, it's characteristics, its purpose and the degree to which it had penetrated the networks, grew louder.
Another alarming fact was that the security teams very often did not discover a breach until many months after it had occurred, and then it was more often discovered by a third party then internal security.
IT Security needed a global overview of what is happening in the network and the real-time data that the SIEM collected was identified as a valuable asset to leverage. In the second stage of development, threat detection capabilities with built-in threat intelligence, historical and real-time analytics, and user and entity behaviour analytics or (UEBA) were added.
Recently machine learning became a part of SIEM's tools and is particularly needed when sifting through Big DATA.
Another issue that beleaguered SIEM was the effort involved to configure and set it up than integrate it into the network and use it.
It was kind of complex and not so clear to use and demanded a very skilled person to manage and identify attacks.
Also, everything became more sophisticated and hard to manage because IT infrastructures weren't homogenous.
In nowadays SIEM products, most of them are based on machine learning which solved too many problems and issues. Machine learning made it easy to detect attacks and identify issues in addition to its configuration and implementation which became more automated.
Learn more:
In Programing
How to install PYTHON 3.8.0 :
https://itnetworks2020.blogspot.com/2019/12/1-programming-with-python-installing.html
In Security
Endpoint introduction :
https://itnetworks2020.blogspot.com/2019/10/endpoints-introduction.html
Firewalls:
https://itnetworks2020.blogspot.com/2019/10/firewalls.html
Security Email Gateways:
https://itnetworks2020.blogspot.com/2019/10/secure-email-gateway.html
CyberSecurity Evolution : UnKnown Threats:
https://itnetworks2020.blogspot.com/2019/10/cybersecurity-evolution-unknown-threats.html
CyberSecurity Evolution : Known Threats
https://itnetworks2020.blogspot.com/2019/10/cybersecurity-evolution-known-threats.html
Comments