Event Management AND Security information | IT NETWORKS

Security Information and Event Management or SIEM, grew out of two requirements. One was to contend with the flood of alerts issued from IPS or Intrusion Prevention Systems and IDS or Intrusion Detection Systems which were overwhelming security teams.

IDS were used to measure and prove compliance to various legislations. A deluge of compliance legislation appeared in the first two decades of the twenty-first century in reply to numerous high-profile network breaches.


In the other hand, the technology needed several things:

First, logs aggregation from many network sources, such as network and security devices, servers and databases, and applications into a central repository for analysis and pattern detection.
Second, storing data logs for a period of time to satisfy auditing requirements.
Third, correlation, monitoring and notifying events in real-time.


siem - no copyright photo



 SIEM is primarily an information platform. As CyberAttacks became more sophisticated and stealthy, demands for information about a CYBERATTACK, it's characteristics, its purpose and the degree to which it had penetrated the networks, grew louder.

Another alarming fact was that the security teams very often did not discover a breach until many months after it had occurred, and then it was more often discovered by a third party then internal security.



IT Security needed a global overview of what is happening in the network and the real-time data that the SIEM collected was identified as a valuable asset to leverage. In the second stage of development, threat detection capabilities with built-in threat intelligence, historical and real-time analytics, and user and entity behaviour analytics or (UEBA) were added.


Recently machine learning became a part of SIEM's tools and is particularly needed when sifting through Big DATA.

Another issue that beleaguered SIEM was the effort involved to configure and set it up than integrate it into the network and use it.
It was kind of complex and not so clear to use and demanded a very skilled person to manage and identify attacks.
Also, everything became more sophisticated and hard to manage because IT infrastructures weren't homogenous.


In nowadays SIEM products, most of them are based on machine learning which solved too many problems and issues. Machine learning made it easy to detect attacks and identify issues in addition to its configuration and implementation which became more automated.


Learn more:

In Programing

How to install PYTHON 3.8.0 :
https://itnetworks2020.blogspot.com/2019/12/1-programming-with-python-installing.html

In Security

Endpoint introduction :
https://itnetworks2020.blogspot.com/2019/10/endpoints-introduction.html

Firewalls:
https://itnetworks2020.blogspot.com/2019/10/firewalls.html

Security Email Gateways:
https://itnetworks2020.blogspot.com/2019/10/secure-email-gateway.html

CyberSecurity Evolution : UnKnown Threats:
https://itnetworks2020.blogspot.com/2019/10/cybersecurity-evolution-unknown-threats.html

CyberSecurity Evolution : Known Threats
https://itnetworks2020.blogspot.com/2019/10/cybersecurity-evolution-known-threats.html








Comments

Popular Posts

Network Access Control NAC | IT NETWORKS

CISCO : Dynamic Multipoint Virtual Private Network (DMVPN) | ITNETWORKS

Issues with CISCO WIRELESS Controller (And resolution) | IT NETWORKS