Verified Document

Event Management And Security Research Paper

Technology and Product Review for an SIEM Solution There are different approaches that are utilized for security management, which has resulted in the emergence of different security technology categories including security information and event management (SIEM), which is designed to provide a holistic view of IT security. It is based on the principle that relevant information regarding an organization's security is generated from various sources/locations. Therefore, examining each of these locations helps in identifying trends and patterns within the organization's security system.

Overview of SIEM

SIEM, which stands for security information and event management, can be described as an approach for management of security through a holistic view of information technology security within an organization (Rouse, 2014). This approach provides a holistic view for examining an organization's IT security through combining security information management (SIM) and security event management (SEM) into a single security management system. Through combination of these systems, SIEM enables speedy identification, evaluation, and recovery of security incidents. Additionally, the system enables compliance managers to confirm whether the organization is fulfilling legal compliance requirements.

SIEM systems work through gathering security log data from different sources within the organization including operating systems, security controls, and applications (Scarfone, 2015). Once security log data is obtained, the system processes it in order to normalize its format, analyze the standardized data, provide alerts in case of any anomalous...

There are certain SIEM products that are also designed and structured to block malicious activity when detected. In this case, such activities are blocked through various processes including running scripts that prompt reconfiguration of security controls like firewalls (Scarfone, 2015). SIEM products are usually available in various forms with relatively similar capabilities but different cost and performance. The most common forms of SIEM products include hardware appliances, cloud-based, conventional server software, and virtual appliances.
Product Review

One of the most commonly used SIEM products is McAfee, which is positioned as a leader in Gartner Magic Quadrant for Intrusion Prevention Systems (IPS) for the last nine years (Burnham, 2015). McAfee's position as a leader in IPS was determined following an analysis of overall liability, product track record, customer experience, operations and marketing execution, market responsiveness, and sales execution of products within this category. This SIEM product is sold by McAfee, which is a California-based firm that is part of Intel Security (Lawson, Hils & Neiva, 2015). This large security vendor has a significant product portfolio throughout different security locations including server, network, and content. The…

Sources used in this document:
References

Burnham, J. (2015, July 23). Who is a Leader (again) in Gartner's 2015 Magic Quadrant For Security Information Event Management? Retrieved February 28, 2017, from https://securityintelligence.com/ibm-is-a-leader-again-in-2015-gartner-magic-quadrant-for-siem/

Lawson, C., Hils, A. & Neiva, C. (2015, November 16). Magic Quadrant for Intrusion Prevention Systems. Retrieved February 28, 2017, from http://www.ts.avnet.com/it/magic

McAfee. (2016). McAfee Enterprise Security Manager. Retrieved February 28, 2017, from http://www.mcafee.com/us/resources/data-sheets/ds-enterprise-security-manager.pdf

McAfee (n.d.). McAfee Guide to Implementing the 10 Steps to Cyber Security. Retrieved February 28, 2017, from https://www.mcafee.com/hk/resources/white-papers/wp-10-steps-to-cyber-security.pdf
Rouse, M. (2014, December). Security Information and Event Management (SIEM). Retrieved February 28, 2017, from http://searchsecurity.techtarget.com/definition/security-information-and-event-management-SIEM
Scarfone, K. (2015, September). Comparing the Best SIEM Systems on the Market. Retrieved February 28, 2017, from http://searchsecurity.techtarget.com/feature/Comparing-the-best-SIEM-systems-on-the-market
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Security Analysis Security Analysis Managing Security
Words: 737 Length: 3 Document Type: Essay

Computer Security Analysis Security Analysis Managing security strategies for an enterprise requires intensive levels of planning and integration across each of the functional area, in conjunction with synchronization across departments, business units and divisions (Bellone, de Basquiat, Rodriguez, 2008). Enterprise Security Management strategies continue to become part of the overall strategic plans of an enterprise, supporting each strategic initiative and its related tactics to ensure profitable growth (Bellone, de Basquiat, Rodriguez, 2008).

Security Management at Aviation and Healthcare Sectors
Words: 2154 Length: 8 Document Type: Essay

Security Management at Aviation and Healthcare Sectors Security Management Essay This paper discusses the concept of aviation security management and security management at healthcare settings. In addition to that, this paper also lists down and describes the important factors that can have an influential impact on the functions of aviation and a healthcare security manager. Security Management at Aviation and Healthcare Sectors Aviation Security The general aviation security confronts a number of security challenges. The

Security Countermeasures at Events
Words: 734 Length: 2 Document Type: Essay

Security Countermeasures For any event, effective countermeasures are an important part of enhancing safety. Those who take these factors into account, will ensure that everyone is protected and the chances of having any kind of incidents are decreased. To fully understand how these objectives are achieved requires focusing on public safety, transportation and issues for the celebrity. This will be accomplished by examining various agencies to be worked with, areas of

Security Architecture & Design Models:
Words: 889 Length: 2 Document Type: Article Review

A security policy is indicated by Harris (2010) to be a set of rules as well as practices that dictates how sensitive information is to be protected, managed as well as distributed while a security model is a mere symbolic representation of the security policy. The following are the security models in use. Lattice Models This security model is based on a mathematical construct that is hugely base don the group

Management in Very Day Life, It Is
Words: 3595 Length: 11 Document Type: Essay

Management In very day life, it is a common occurrence to attend various special meetings to celebrate a given occasion. These meetings can also be for education purposes, promotions or commemorations. The occurrence of such special meetings constitutes an event. Therefore, to make this event happen, a long process of planning and preparing for the event takes place. Thus, this process of applying the skills and structures of project management

Management, in Particular the Management of Mega
Words: 3655 Length: 11 Document Type: Essay

management, in particular the management of mega events. It also delves deeply into the positives and negatives of the London Olympic Games and the 2006 World Cup events in Germany. Those who manage mega events have an enormous task and an almost impossible responsibility to the public, to those participating in the events, and to the countries where mega events take place. Those issues and more are covered in

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now