Security

The SIEM Architecture

Download Now Free registration required

Executive Summary

Security Event Management (SEM) products collected log data from security devices in order to correlate disparate events and detect security incidents in real time. Today, many SEM vendors claim that these same products that help security administrators identify attacks can also meet the comprehensive reporting needs of regulatory compliance auditors. These vendors reason that both security and compliance systems are based upon a similar technology infrastructure and anchor their analysis to the collection, processing and storage of log file data. Given these technical similarities, SEM vendors simply added some compliance analysis capabilities and now offer a one-size-fits-all solution.

  • Format: PDF
  • Size: 353.4 KB