What is SIEM?


Security Information and Event Management. 

Events are described as any activity on the network performed by event sources, such as routers, switches, applications, or anything that communicates across the network.

SIEM software is designed to scan all events on the network and aggregate data in the form of logs.

SIEM is a security solution that helps organisations recognize potential threats and vulnerabilities before they have a chance to disrupt business operations. 

Does my business need a SIEM?

It is not a matter of if you will be attacked, but when. Cyber threats occur 24 hours a day, 7 days a week. No holidays in this industry 😉
Regardless of how large or small your organisation, taking proactive steps to monitor for and mitigate security threats is essential.

How does SIEM work? 

To make it simple, all SIEM solutions perform some level of data (logs) aggregation, consolidation, and sorting/filtering functions in order to identify threats. SIEM also helps to automatically identify systems that are out of compliance with the security standards.

From a user perspective, it’s a centralised dashboard of security information which displays alerts and suspicious network activity to a security analyst. Advanced SIEM platforms integrate artificial intelligence (AI) to automate intrusion detection and prevention. After a configuration and personalisation period, the SIEM will provide the right alerts and detailed information to quickly determine the right steps based on the threat detected.
Next, the SOC (security operation center) is necessary for containment and eradication of the threat. 

Some of the key requirements to look for in a SIEM solution (according to Gartner):

  • Analytics: You want a SIEM solution that uses real time analytics to detect and prioritise events.
  • Feature Administration: The SIEM solution should provide tools to administer, maintain and support the different functions. 
  • Integrations: It’s critical for any SIEM solution to integrate with all relevant applications, data sources, and technologies. 
  • Monitoring, logging and tracking: You want your SIEM solution to provide proactive alerts on system events across all of your environments including cloud services, physical and virtual appliances and softwares, and combinations of these.

How long does it take to implement a SIEM solution?

While most google searches say it takes a long time to implement a SIEM solution and suggest a 90 days time frame. An advanced solution can have you up and monitored within 24 hours. 

Read “What is MSSP?” : here

More to explorer

New Deployed Rules

NTFS:   1. Volume Shadow Copy Mount PowerShell Script   2. Code Executed Via Office Add-in XLL File   3. Potential Invoke-Mimikatz PowerShell Script   4.

New Deployed Rules

MSMQ:    1. MSMQ Corrupted Packet Encountered Network Share Object:    2. Protected Storage Service Access   3. Possible Impacket SecretDump Remote Activity

Sign up for our newsletter

Time to market

One-day SIEM integration