NIPS

SIEM News

View All News

SIEM Get Started

Bring yourself up to speed with our introductory content

  • security information and event management (SIEM)

    Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of organization’s information technology (IT) security.  Continue Reading

  • Five questions to ask before purchasing NAC products

    Organizations are recognizing the need for network access control systems, but it is important to evaluate and perform research before you invest in enterprise NAC products. Continue Reading

  • Will it last? The marriage between UBA tools and SIEM

    The failure to detect insider threats and a growing need to store and sort through massive amounts of data have drawn attention to user behavior analytics, sometimes called user and entity behavior analytics. According to Gartner, UBA tools deliver value for use cases such as compromised accounts, including stolen and phished credentials. They can also be used to find compromised systems and data exfiltration.

    Security platforms like data loss prevention, endpoint security and cloud access security brokers will increasingly layer or incorporate UBA features to help analyze alerts and make underlying technology more useful, according to analysts. SIEM and UBA are also converging, with SIEM vendors adding UBA tools and UBA vendors building SIEM systems.

    In this issue of Information Security magazine, we look at the dynamics around UBA and strategies for CISOs going forward. UBA vendors are releasing product suites targeted at security operations centers, today built around SIEM. What does the future hold for standalone UBA tools? We look at time to value and use cases, and help you sift through the noise.

     Continue Reading

View All Get Started

Evaluate SIEM Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage SIEM

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve SIEM Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • Meet security goals by avoiding threat intel and analytics mistakes

    Meeting top security goals is only the first step. Get up to speed on how to avoid common pitfalls in the use of threat intelligence and analytics. Continue Reading

  • Building a threat intelligence program? How to avoid the 'feed' frenzy

    Cyberthreat intelligence is just data if it is not actionable. We offer tips to help your team focus on relevant CTI for faster threat detection and response. Continue Reading

  • Insider Edition: Improved threat detection and incident response

    The security incident response process isn't getting any easier, not in an age characterized by mobile workers, cloud computing and faster networks. So much can go wrong: Attacks can come from any source and use every method imaginable -- and some not yet identified. The trick is to get a grasp on what's most likely to breach your system, ensure that you're alerted when it does and know what you're going to do about it when it happens. To achieve this, you need to have a security incident response plan in place. As part of this plan, set up good policies and coordinated responses, making sure your IR tools are the most capable possible, including those that can automate aspects of the security incident response process.

    This Insider Edition of Information Security magazine focuses on how to minimize cyber-risk through threat detection and incident response. Security pros will find the latest information on options for IR tools and other ideas on making your incident response process as effective as it can be.

     Continue Reading

View All Problem Solve