Five Best (and Worst) Practices for Using SIEM Solutions

To the uninitiated, deploying and implementing SIEM solutions may seem like a straightforward task, but reality begs to differ. SIEM are complex, often unwieldy technologies, and they require careful implementation or your organization may end up with a flawed or failed deployment.

In this 29-slide SlideShare presentation, Dr. Anton Chuvakin, Research Director for Gartner’s Security and Risk Management Strategies team and Solutions Review featured InfoSec Influencer and author breaks down the five best and worst practices for implementing SIEM as part of security monitoring and intelligence.


This presentation may be a few years old, but the macro-focused advice inside is still highly relevant for security pros and organizations looking to avoid common pitfalls and create a successful SIEM
implementation will help maximize security and compliance value, and avoid costly obstacles,
inefficiencies, and risks.

If you find this presentation helpful, you may also be interested in the recently released 2016 SIEM and Security Analytics Buyer’s Guide, which features the 24 top SIEM vendors for comparison, as well as advice on choosing and implementing SIEM solutions. A complimentary copy of the report is available here.


Widget not in any sidebars

 

Follow Jeff

Jeff Edwards

Jeff Edwards is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large.He holds a Bachelor of Arts Degree in Journalism from the University of Massachusetts Amherst, and previously worked as a reporter covering Boston City Hall.
Jeff Edwards
Follow Jeff

Leave a Reply

Your email address will not be published. Required fields are marked *