Skip the navigation

Security Manager's Journal: Giving thanks for SIEM

This tool helps with a lot more than telling you at a glance about the threats you face

By J.F. Rice
December 3, 2013 12:06 PM ET

Computerworld - The holidays are upon us once again. Traditionally, this means it's a time to be thankful for what we have. I, for one, am thankful for my SIEM.

Some (such as AT&T and EMC/RSA) say that "SIEM" stands for security "incident" and event management, others (like Unisys and McAfee) say it's security information and event "monitoring," and others (e.g., Qualys and FishNet) go with security "incident" and event "monitoring." I call it security information and event management, and it's at the core of my security strategy.

What's in a name? The one word that's common to the various nomenclatures is "security," because these technologies are used by security professionals to gain visibility into many disparate data sources that form a complete picture of what's happening on the network. And as the saying goes, you can't secure what you can't see. I prefer the description with "information" in the name, rather than "incident," because all those data sources allow us to see more than just alerts. Like the dashboard of a car, we can observe how our network and computer resources are being used at any given time and make predictions about what could happen next. And in the same context, I prefer the term "management" versus "monitoring," because we use the information to govern our actions and decisions. Thus, to me, SIEM is all about security information and event management.

Earlier this year, I mentioned that I was looking into upgrading my SIEM. The inexpensive product I had been using up to that point had reached its end of life, so I was more or less forced to move to a new platform. My search led me to a wonderful product that is very affordable and yet very powerful. I wasn't the only one to discover this diamond in the rough -- it's the highest-rated SIEM product in both feature performance and overall vendor performance in reviews by well-known organizations. Other products are also good in other respects, but they require more money upfront or more work to configure, and I needed something that worked right out of the box within my limited budget.

After sending my IDS alerts to the new SIEM, I added additional information like firewall logs (including allowed and denied traffic). I also sent my server logs to the SIEM (including things like login successes and failures). Combining these with network flow data and other statistical information, my SIEM grew very powerful indeed.

I'm very pleased with the result. I now have a fully operational security management platform with a dashboard that lets me see at a glance what threats I need to be concerned about, and whether I'm at risk at any given time. Now that my SIEM has been in operation for several months, I've become completely dependent on it, not only for security monitoring, but also for overall awareness of my network. Now, when system administrators complain that "the network is slow" or "traffic is being blocked," I can quickly prove whether my firewalls and security devices are at fault, or the problem lies elsewhere. For example, last week I had to contend with a disgruntled network administrator who was certain that my firewall was slowing down the network. A quick search on my SIEM led me to the real culprit -- a branch office in which several employees were downloading streaming video of a sporting event. That's real power -- having the right information at your fingertips.



Our Commenting Policies