Mitigating Risk: Analysis of Security Information and Event Management

Mitigating Risk: Analysis of Security Information and Event Management

Ken Lozito (GSK, USA)
Copyright: © 2011 |Pages: 9
DOI: 10.4018/jbir.2011040105
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Business Intelligence (BI) has often been described as the tools and systems that play an essential role in the strategic planning process of a corporation. The application of BI is most commonly associated with the analysis of sales and stock trends, pricing and customer behavior to inform business decision-making. There is a growing trend in utilizing the tools and processes used in the analysis of data and applying them to security event management. Security Information and Event Management (SIEM) has emerged within the last 10 years providing a centralized source to enable both real-time and deep level analysis of historical event data to drive security standards and align IT resources in a more efficient manner.
Article Preview

Security Technology - Past 10 Years

Organizations have invested heavily in targeted security solutions including firewalls, VPNs, intrusion detection and prevention systems, and vulnerability scanners. Unfortunately these solutions alone have not been able to completely protect organizations from the evolving landscape of threats. Recently there has been a steady increase in the complexity of threats, including zero day attacks, worms and trojans that span many systems and are difficult to detect using existing security solutions (Q1Labs, 2009a). Many companies have implemented some or all of the following security technologies:

  • Network Intrusion Detection & Prevention Systems

  • Firewalls

    • o

      Perimeter

    • o

      Application

    • o

      Endpoint

  • Antivirus & AntiSpyware

  • Host Intrusion Prevention – HIPS

  • Behavioral Heuristic Detection

  • Information/Data Leakage Protection.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 8: 2 Issues (2017): 1 Released, 1 Forthcoming
Volume 7: 2 Issues (2016)
Volume 6: 2 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing