Security information and event management

SIEM : Security information and event management (SIEM) is a term for software products and services combining security information management (SIM) and security event management (SEM). SIEM technology provides real-time analysis of security alerts generated by network hardware and applications. SIEM is sold as software, appliances or managed services, and are also used to log security data and generate reports for compliance purposes.[1]

The acronyms SEM, SIM and SIEM have been sometimes used interchangeably.[2] The segment of security management that deals with real-time monitoring, correlation of events, notifications and console views is commonly known as security event management (SEM). The second area provides long-term storage, analysis and reporting of log data and is known as security information management (SIM).[3] As with many meanings and definitions of capabilities evolving requirements continually shape derivatives of SIEM product categories. The need for voice centric visibility or vSIEM (voice security information and event management) is a recent example of this evolution.

The term security information event management (SIEM), coined by Mark Nicolett and Amrit Williams of Gartner in 2005,[4] describes the product capabilities of gathering, analyzing and presenting information from network and security devices; identity and access management applications; vulnerability management and policy compliance tools; operating system, database and application logs; and external threat data. A key focus is to monitor and help manage user and service privileges, directory services and other system configuration changes; as well as providing log auditing and review and incident response.[3]

As of November 2014, Mosaic Security Research identified 73 SIEM and log management products.[5]

Capabilities

Vendor products

See also

References

  1. "SIEM: A Market Snapshot". Dr.Dobb's Journal. 5 February 2007.
  2. Swift, David (26 December 2006). "A Practical Application of SIM/SEM/SIEM, Automating Threat Identification" (PDF). SANS Institute. p. 3. Retrieved 14 May 2014. ...the acronym SIEM will be used generically to refer...
  3. 3.0 3.1 Jamil, Amir (29 July 2009). "The difference between SEM, SIM and SIEM" (BLOG).
  4. The Future of SIEM - The market will begin to diverge
  5. Mosaic Security Research
  6. Correlation
  7. Understanding and Selecting SIEM/LM: Use Cases
  8. 8.0 8.1 Compliance Management and Compliance Automation – How and How Efficient, Part 1
  9. http://www.verizonbusiness.com/about/events/2012dbir/ Data Breach Report
  10. "Assuria Log Manager Overview". Assuria Ltd. Retrieved 24 March 2015.
  11. "CCTM - Awards - Assuria Log Manager Version 4". UK Government (Crown Copyright). 2011. Archived from the original on 4 December 2011. Retrieved 24 March 2015.
  12. LogRhythm Positioned as a Leader in Gartner’s 2014 SIEM Magic Quadrant
  13. Info-Tech Research Group Designates LogRhythm a “Champion” in 2014-15 SIEM Vendor Landscape Report
  14. LogRhythm Named Company of the Year for 2014
  15. DCIG Ranks LogRhythm SIEM No.1 and “Best-in-Class” in SIEM Appliance Buyer’s Guide
  16. Information Security Magazine and SearchSecurity.com Crown LogRhythm’s Solution as Best SIEM Security Product
  17. LogRhythm Awarded 5 Stars in SC Mag. SIEM Group Test
  18. Netwrix Auditor
  19. Splunk Named Leader in Gartner SIEM MQ
  20. Splunk Enterprise Selected Best SIEM Appliance in 2013 SC Awards
  21. Splunk App for Enterprise Security
  22. Tamnun System Security and features