Verified Document

Event Management And Security Research Paper

Technology and Product Review for an SIEM Solution There are different approaches that are utilized for security management, which has resulted in the emergence of different security technology categories including security information and event management (SIEM), which is designed to provide a holistic view of IT security. It is based on the principle that relevant information regarding an organization's security is generated from various sources/locations. Therefore, examining each of these locations helps in identifying trends and patterns within the organization's security system.

Overview of SIEM

SIEM, which stands for security information and event management, can be described as an approach for management of security through a holistic view of information technology security within an organization (Rouse, 2014). This approach provides a holistic view for examining an organization's IT security through combining security information management (SIM) and security event management (SEM) into a single security management system. Through combination of these systems, SIEM enables speedy identification, evaluation, and recovery of security incidents. Additionally, the system enables compliance managers to confirm whether the organization is fulfilling legal compliance requirements.

SIEM systems work through gathering security log data from different sources within the organization including operating systems, security controls, and applications (Scarfone, 2015). Once security log data is obtained, the system processes it in order to normalize its format, analyze the standardized data, provide alerts in case of any anomalous...

There are certain SIEM products that are also designed and structured to block malicious activity when detected. In this case, such activities are blocked through various processes including running scripts that prompt reconfiguration of security controls like firewalls (Scarfone, 2015). SIEM products are usually available in various forms with relatively similar capabilities but different cost and performance. The most common forms of SIEM products include hardware appliances, cloud-based, conventional server software, and virtual appliances.
Product Review

One of the most commonly used SIEM products is McAfee, which is positioned as a leader in Gartner Magic Quadrant for Intrusion Prevention Systems (IPS) for the last nine years (Burnham, 2015). McAfee's position as a leader in IPS was determined following an analysis of overall liability, product track record, customer experience, operations and marketing execution, market responsiveness, and sales execution of products within this category. This SIEM product is sold by McAfee, which is a California-based firm that is part of Intel Security (Lawson, Hils & Neiva, 2015). This large security vendor has a significant product portfolio throughout different security locations including server, network, and content. The…

Sources used in this document:
References

Burnham, J. (2015, July 23). Who is a Leader (again) in Gartner's 2015 Magic Quadrant For Security Information Event Management? Retrieved February 28, 2017, from https://securityintelligence.com/ibm-is-a-leader-again-in-2015-gartner-magic-quadrant-for-siem/

Lawson, C., Hils, A. & Neiva, C. (2015, November 16). Magic Quadrant for Intrusion Prevention Systems. Retrieved February 28, 2017, from http://www.ts.avnet.com/it/magic

McAfee. (2016). McAfee Enterprise Security Manager. Retrieved February 28, 2017, from http://www.mcafee.com/us/resources/data-sheets/ds-enterprise-security-manager.pdf

McAfee (n.d.). McAfee Guide to Implementing the 10 Steps to Cyber Security. Retrieved February 28, 2017, from https://www.mcafee.com/hk/resources/white-papers/wp-10-steps-to-cyber-security.pdf
Rouse, M. (2014, December). Security Information and Event Management (SIEM). Retrieved February 28, 2017, from http://searchsecurity.techtarget.com/definition/security-information-and-event-management-SIEM
Scarfone, K. (2015, September). Comparing the Best SIEM Systems on the Market. Retrieved February 28, 2017, from http://searchsecurity.techtarget.com/feature/Comparing-the-best-SIEM-systems-on-the-market
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Countermeasures at Events
Words: 734 Length: 2 Document Type: Essay

Security Countermeasures For any event, effective countermeasures are an important part of enhancing safety. Those who take these factors into account, will ensure that everyone is protected and the chances of having any kind of incidents are decreased. To fully understand how these objectives are achieved requires focusing on public safety, transportation and issues for the celebrity. This will be accomplished by examining various agencies to be worked with, areas of

Security Architecture & Design Models:
Words: 889 Length: 2 Document Type: Article Review

A security policy is indicated by Harris (2010) to be a set of rules as well as practices that dictates how sensitive information is to be protected, managed as well as distributed while a security model is a mere symbolic representation of the security policy. The following are the security models in use. Lattice Models This security model is based on a mathematical construct that is hugely base don the group

Management in Very Day Life, It Is
Words: 3595 Length: 11 Document Type: Essay

Management In very day life, it is a common occurrence to attend various special meetings to celebrate a given occasion. These meetings can also be for education purposes, promotions or commemorations. The occurrence of such special meetings constitutes an event. Therefore, to make this event happen, a long process of planning and preparing for the event takes place. Thus, this process of applying the skills and structures of project management

Management, in Particular the Management of Mega
Words: 3655 Length: 11 Document Type: Essay

management, in particular the management of mega events. It also delves deeply into the positives and negatives of the London Olympic Games and the 2006 World Cup events in Germany. Those who manage mega events have an enormous task and an almost impossible responsibility to the public, to those participating in the events, and to the countries where mega events take place. Those issues and more are covered in

Management in Spite of the
Words: 3753 Length: 13 Document Type: Essay

Another 110 individuals would be necessary in administrative positions; 120 people in the cleaning crews and the rest of 150 should occupy diverse positions. 4.2. Recruitment, selection and hiring Once the event coordinator has identified the staffing need, he moves on to recruiting and selecting the individuals to occupy the available positions. Recruitment and selection is generically "concerned with any means available to meet the needs of the firm for certain

Management Distributed Order Management Systems
Words: 4856 Length: 11 Document Type: Term Paper

AMR Research (2005) believes that companies must begin developing and redeploying current order management architectures with the focus on delivering more flexibility rather than a strategy that delivers far less. The move toward customer-driven fulfillment processes requires the ability to build and adapt channel-specific, product-specific, and customer-specific order flows quickly without an army of developers creating custom code. However, the days of big bang, rip-and-replace implementations are over, and any

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now