The SIEM Architecture

Download Now Date Added: Oct 2007
Format: PDF

Security Event Management (SEM) products collected log data from security devices in order to correlate disparate events and detect security incidents in real time. Today, many SEM vendors claim that these same products that help security administrators identify attacks can also meet the comprehensive reporting needs of regulatory compliance auditors. These vendors reason that both security and compliance systems are based upon a similar technology infrastructure and anchor their analysis to the collection, processing and storage of log file data. Given these technical similarities, SEM vendors simply added some compliance analysis capabilities and now offer a one-size-fits-all solution.