August 21, 2017 By Derek Brink 2 min read

This is the final installment in a three-part series. Be sure to read Part 1 and Part 2 for more information.

Improving integration, visibility and analytics with a platform approach to security information and event management (SIEM) is the means to the business value of security, compliance and operational efficiency.

Security teams are operating in an evolving macro environment, which presents three challenges:

  1. The incredible rate of change in information technology infrastructure has led to such complexity in our networks, systems and applications that most organizations struggle with the in-house capabilities and resources to keep up.
  2. Regulatory and legal responses to these issues can literally be years behind, and yet the intensifying requirements for demonstrating compliance represent another significant demand on limited in-house resources.
  3. At the same time, the attackers are increasingly sophisticated, focused and disruptive.

These forces — in combination with a critical skills shortage in cybersecurity — are driving a significant shift in how enterprise security operations centers (SOCs) are evolving.

Download the Report: The Business Value of a Security Analytics Platform

Four Capabilities to Build a More Efficient Security Operations Center

To keep up with the complexity and compliance of their computing infrastructures — and to get ahead of the current time advantage of the attackers — enterprise SOCs need to build on the foundation of their existing SIEM platforms with additional capabilities such as:

  • Advanced threat monitoring that leverages the rules engines of the leading SIEM platforms, in combination with the specialized expertise and focus of full-time threat hunters, to make continuous improvements in use cases;
  • Advanced threat detection that combines context-specific data with analytics and machine learning to look for suspicious patterns, behaviors and anomalies across a wider range of both historical and real-time data;
  • Accelerated incident investigation of suspected incidents with increasingly automated triage, prioritization and validation of alerts based on context-specific data — in addition to a final review and validation by human security analysts; and
  • Faster incident response by replacing purely ad hoc activities with common playbooks, analytical tools, incident management tools and reporting, which liberates security analysts to spend less time doing research and more time doing analysis.

Ultimately, these capabilities help to deliver value by reducing the total time needed to detect, investigate, respond and remediate security-related incidents — from the status quo of weeks and months to as short as hours and days.

Taking SIEM to the Next Level

Many organizations lack the resources — both bandwidth of existing personnel and specialized technical expertise — and the tactical focus to perform well at these types of activities. Their primary strategic focus is on running and growing their business, not security, compliance, privacy and risk.

Even if a given organization is capable of traditional, do-it-yourself integration of on-premises security solutions using in-house resources, is it really better off doing these activities on its own? A growing number of companies choose to leverage the expertise, scale and scope of a specialized, third-party security services provider and prioritize other activities for their own staff. Regardless of how you implement — whether in-house, software-as-a-service (SaaS) or fully outsourced — what’s important is that you address these needs by taking your SIEM platform to the next level.

Either way, the platform approach to security monitoring and analytics is well-aligned with these capabilities, while a traditional, tools-based approach is not.

Download the Report: The Business Value of a Security Analytics Platform

More from Intelligence & Analytics

What makes a trailblazer? Inspired by John Mulaney’s Dreamforce roast

4 min read - When you bring a comedian to offer a keynote address, you need to expect the unexpected.But it is a good bet that no one in the crowd at Salesforce’s Dreamforce conference expected John Mulaney to tell a crowd of thousands of tech trailblazers that they were, in fact, not trailblazers at all.“The fact that there are 45,000 ‘trailblazers’ here couldn’t devalue the title anymore,” Mulaney told the audience.Maybe it was meant as nothing more than a punch line, but Mulaney’s…

New report shows ongoing gender pay gap in cybersecurity

3 min read - The gender gap in cybersecurity isn’t a new issue. The lack of women in cybersecurity and IT has been making headlines for years — even decades. While progress has been made, there is still significant work to do, especially regarding salary.The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the field. In fact, only 17% of the 14,865 respondents to the survey were women.Pay gap between men and womenOne of the most concerning disparities revealed by…

Protecting your data and environment from unknown external risks

3 min read - Cybersecurity professionals always keep their eye out for trends and patterns to stay one step ahead of cyber criminals. The IBM X-Force does the same when working with customers. Over the past few years, clients have often asked the team about threats outside their internal environment, such as data leakage, brand impersonation, stolen credentials and phishing sites. To help customers overcome these often unknown and unexpected risks that are often outside of their control, the team created Cyber Exposure Insights…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today