Why SIEM is Irreplaceable in a Secure IT Environment?
Santrauka
The aim of the publication is to brief on the importance of a SIEM (Security Information and Event Management) solution. Its benefits but also taking time to reflect on this system drawbacks. All of which is intended for those who are looking into cybersecurity solution that will learn from entire IT infrastructure and be able to identify anomalies, like cyberattacks. Depending on the region and market, enterprise priorities tends to be different, but all mainly take into consideration TCO (Total Cost of Ownership), which in SIEM case is a key metric. If company/organization is serious about deploying a SIEM, then another key security technology they should think about is SOC. If deployed correctly than SOC (Security Operations Centre) is a full framework of technologies, people and processes to act like a well-oiled machine that identifies, protects, detects, responds and recovers from all security related incidents.
Paskelbimo data (metai)
2019Autorius
Podzins, OskarsRelated items
Showing items related by title, author, creator and subject.
-
Public security institutions in countries of Central and Eastern Europe: improvement of the systems of development of public security management specialists
Melnikas, Borisas (Jurisprudencija : mokslo darbai, 2005)1. It reveals the main problems which are faced in the field of development of public security management specialists: development of public security management specialists lacks systematic character, processes of development ... -
Security ontology for adaptive mapping of security standards
Ramanauskaitė, Simona; Olifer, Dmitrij; Goranin, Nikolaj; Čenys, Antanas (International Journal of Computers, Communications & Control (IJCCC), 2013)Adoption of security standards has the capability of improving the security level in an organization as well as to provide additional benefits and possibilities to the organization. However mapping of used standards has ... -
Defining the minimum security baseline in a multiple security standards environment by graph theory techniques
Olifer, Dmitrij; Goranin, Nikolaj; Čenys, Antanas; Kačeniauskas, Arnas; Janulevičius, Justinas (Applied sciences, 2019)One of the best ways to protect an organization’s assets is to implement security requirements defined by different standards or best practices. However, such an approach is complicated and requires specific skills and ...
