What is SIEM?


Security Information and Event Management. 

Events are described as any activity on the network performed by event sources, such as routers, switches, applications, or anything that communicates across the network.

SIEM software is designed to scan all events on the network and aggregate data in the form of logs.

SIEM is a security solution that helps organisations recognize potential threats and vulnerabilities before they have a chance to disrupt business operations. 

Does my business need a SIEM?

It is not a matter of if you will be attacked, but when. Cyber threats occur 24 hours a day, 7 days a week. No holidays in this industry 😉
Regardless of how large or small your organisation, taking proactive steps to monitor for and mitigate security threats is essential.

How does SIEM work? 

To make it simple, all SIEM solutions perform some level of data (logs) aggregation, consolidation, and sorting/filtering functions in order to identify threats. SIEM also helps to automatically identify systems that are out of compliance with the security standards.

From a user perspective, it’s a centralised dashboard of security information which displays alerts and suspicious network activity to a security analyst. Advanced SIEM platforms integrate artificial intelligence (AI) to automate intrusion detection and prevention. After a configuration and personalisation period, the SIEM will provide the right alerts and detailed information to quickly determine the right steps based on the threat detected.
Next, the SOC (security operation center) is necessary for containment and eradication of the threat. 

Some of the key requirements to look for in a SIEM solution (according to Gartner):

  • Analytics: You want a SIEM solution that uses real time analytics to detect and prioritise events.
  • Feature Administration: The SIEM solution should provide tools to administer, maintain and support the different functions. 
  • Integrations: It’s critical for any SIEM solution to integrate with all relevant applications, data sources, and technologies. 
  • Monitoring, logging and tracking: You want your SIEM solution to provide proactive alerts on system events across all of your environments including cloud services, physical and virtual appliances and softwares, and combinations of these.

How long does it take to implement a SIEM solution?

While most google searches say it takes a long time to implement a SIEM solution and suggest a 90 days time frame. An advanced solution can have you up and monitored within 24 hours. 

Read “What is MSSP?” : here

More to explorer

New Deployed Rules

Process CreationSuspicious Execution Location Of Wermgr.EXEPotential CVE-2023-36874 Exploitation – Fake Wermgr ExecutionNetwork Reconnaissance ActivityNode Process ExecutionsNslookup PowerShell Download Cradle – Process CreationSuspicious

New Deployed Rules

Account ManagementOutgoing Logon with New CredentialsRottenPotato Like Attack PatternScanner PoC for CVE-2019-0708 RDP RCE Vuln File EventWebDAV Temporary Local File CreationSCR File

New Deployed Rules

Process CreationMMC20 Lateral Movement Process CreationMMC Spawning Windows Shell Process CreationPotential Arbitrary Command Execution Using Msdt.EXE Process CreationSuspicious MSDT Parent Process Process

Sign up for our newsletter

Time to market

One-day SIEM integration