SlideShare a Scribd company logo
SORT OUT
YOUR SIEM
w w w. s i e m s t r a t e g y. c o m
16 October 2013

1
AGENDA
• SIEM today
– How are you doing it?
• Why SIEM?
– Business benefits
– IT team benefits

• Introducing SIEM
– What it is, and what it isn’t
• Four foundations for SIEM
– Everything in place
– Platform approach

– Expert security contextualisation
– Resourcing for 24/7 monitoring
• Sorting out your SIEM
– In-house
– SIEM-as-a-Service

2
WHY SIEM?
TODAY’S SIEM LANDSCAPE
We find IT leaders tend to operate in one of three ways
when it comes to SIEM:

Ignore it
Seats of the
pants security

Do the
minimum
Log collation
and reporting
for compliance

Functioning
SIEM
•
•

Platform
approach
Proactive
threat
detection

4
WHY SIEM?

Business benefits

•
•
•
•

Service availability / uptime / minimise
downtime
Early warning system
Better security intelligence
More ‘known’ risks

IT benefits
•
•
•
•
•

Proactive threat detection prevents
incidents and the need for fire-fighting
Efficient – data logs from the entire
network are viewed via a single
dashboard
All IT teams have full visibility of all
logs to find the root cause faster
Reduce spend on security hardware by
getting more from your existing
infrastructure
Optimise IT resources on valuecreation project

5
SIEM AS IT
SHOULD BE
SecureData 24x7
Security Operations
Centre

SecureData 24x7 Security
Operations Centre

OPTIMISED SIEM ARCHITECTURE
Reports

Alerts

Reports

WAN

SecureData Cloud Data Centre
Events
Event Manager and
Advanced Intelligence

Logging
Managers

INTERNET

Customer
Data
Centre n

Customer Data
Centre 1

Agent

Agent

Firewalls

Firewalls
Applications

Applications

Switches

Switches
Database

Database

Routers

Routers

7
WHAT IS SIEM, AND WHAT IS IT NOT?
SIEM is not only:

But it is about:

Storing logs / Logging

Log correlation and
contextualisation

PCI or
Compliance

Security intelligence

Reports

Real time information

Real time information

Ability to view historical logs in a
structured and targeted way

Device logs

All IT logs – physical access
systems, coffee machines etc

Logs

Traffic flow, process
information, file monitoring

8
HOW TO ADDRESS SIEM
Four foundations of SIEM:

1

3

Everything in one
place

Making it make sense
– the need for an
expert eye

2
4

Logs glorious logsthink platform, not
just devices

Resourcing for
monitoring and
threat mitigation

9
1

2

FOUR FOUNDATIONS FOR SIEM
Everything in one place
•
•

•
•
•
•

•

42% of IT managers see multiple
logging systems as a security risk
Centralise logs for real time
correlation & analysis
All logs, not just security devices
logs
Use automation tools
Benchmark alarms for your
organisational norms
Provide full network visibility through
one pane of glass to identify the root
cause
Enable faster diagnostics and
mitigation

Logs glorious logs
• Take a platform or a ‘big data’ approach
to log correlation
•Set the platform up in the right way
•Pull in contextual data such as traffic,
packet analysis, traffic flow, file
management etc
•Track security behaviour across the
whole of the network
•40% of IT managers have serious
concerns about the time it takes to
analyse data and logs

10
3

4

FOUR FOUNDATIONS FOR SIEM
Make it make sense

•Real time interpretation of SIEM
monitoring is critical
•It requires an expert, human interface
•It’s important to distinguish the line
between information and intelligence
•Security experts need to review the
alarms and alerts to determine the
action in context of the organisation

Resourcing for monitoring and
threat mitigation

•SIEM needs 24/7/365 monitoring
•Security skills on a continuous basis are
expensive and under-utilised on monitoring
•Outputting a report each week is redundant
practice in threat management
•SIEM can free-up rather than use-up
resources by acting as an early warning
system
•More time to mitigate threats enable resource
planning and optimisation
•Reduce the need to ‘drop everything’ for
attack fire fighting

11
SORTING
OUT SIEM
YOUR OPTIONS FOR SIEM

Hybrid

Internal
•

•
•
•

Design, build,
install
Requires 24/7
resourcing
Great if you
have a SOC /
NOC
Security
experts are
expensive

•

•

Fully managed
SIEM by
SecureData(so
me, or all)
Equipment
located on
customer site

SIEM as a
service
•

•

Monitoring: log
correlation,
remote service
monitoring,
notifications
Managed:
remote
diagnostics and
assistance,
remote
vulnerability
scans, remote
system updates

13
AFFINITY
SecureData SIEM-as-a-Service
- Wholly owned SOC across two sites

- 24x7x365 fully-manned operations
- Affinity platform for complete security monitoring

14
THE SECUREDATA DIFFERENCE

1
2

Proactive approach to security:

We take a different approach to security, focusing on proactive monitoring and
management to minimise business disruption for our clients. We offer the
complete security spectrum from assessing risk to detecting threats, protecting
valuable assets and responding to breaches when the happen.

Excellent customer service and support

We offer independent consultancy through dedicated account managers and
technical guardians to recommend business security solutions built on the
leading security vendors in the industry. We work hard to partner with
customers, and we offer flexibility to develop customised processes that fit with
the customer. Our highly accredited technical staff give customers first-class
support and fast resolution time with the desire to do the best possible job every
time.

3

24/7 security operations platform

We operate our own support teams and SOC providing global reach with full
responsibility for 24/7 security monitoring and management for customers.
Owning the SOC enables us to better synthesise information, intelligence and
transactions to proactively mitigate more threats before they impact the
customer.

15
THANK YOU
www.siemstrategy.com
For more information, contact:
info@secdata.com
+44 1622 723456
www.secdata.com

16
17

More Related Content

PDF
SIEM Architecture
PPTX
Siem solutions R&E
DOC
PDF
Siem Overview 2009
PDF
LTS Secure SIEM Features
PPTX
Security Information and Event Managemen
PPTX
McAfee SIEM solution
PPTX
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
SIEM Architecture
Siem solutions R&E
Siem Overview 2009
LTS Secure SIEM Features
Security Information and Event Managemen
McAfee SIEM solution
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)

What's hot (20)

PDF
Security Information and Event Management
PPTX
SIEM presentation final
PPTX
Vendor Landscape: Security Information and Event Management
PPTX
SIEM - Activating Defense through Response by Ankur Vats
PPTX
Security Information and Event Management (SIEM)
PDF
Gartner_Critical Capabilities for SIEM 9.21.15
PPTX
Implementing and Running SIEM: Approaches and Lessons
PDF
Top Cybersecurity Threats and How SIEM Protects Against Them
PPTX
What is SIEM
PPTX
Security Information Event Management - nullhyd
PDF
Modern vs. Traditional SIEM
PPTX
SIEM (Security Information and Event Management)
PPTX
SIEM - Your Complete IT Security Arsenal
PDF
2012-12-12 Seminar McAfee ESM
PPTX
Security Monitoring using SIEM null bangalore meet april 2015
PPTX
Identity intelligence: Threat-aware Identity and Access Management
PPT
NIST 800-92 Log Management Guide in the Real World
PPTX
Security Information and Event Management (SIEM)
PDF
SIEM evolution
Security Information and Event Management
SIEM presentation final
Vendor Landscape: Security Information and Event Management
SIEM - Activating Defense through Response by Ankur Vats
Security Information and Event Management (SIEM)
Gartner_Critical Capabilities for SIEM 9.21.15
Implementing and Running SIEM: Approaches and Lessons
Top Cybersecurity Threats and How SIEM Protects Against Them
What is SIEM
Security Information Event Management - nullhyd
Modern vs. Traditional SIEM
SIEM (Security Information and Event Management)
SIEM - Your Complete IT Security Arsenal
2012-12-12 Seminar McAfee ESM
Security Monitoring using SIEM null bangalore meet april 2015
Identity intelligence: Threat-aware Identity and Access Management
NIST 800-92 Log Management Guide in the Real World
Security Information and Event Management (SIEM)
SIEM evolution
Ad

Similar to SORT OUT YOUR SIEM (20)

PPTX
Introduction to SIEM.pptx
PDF
The SIEM Buyer Guide the siem buyer guide
PPTX
Security Information Event Management Security Information Event Management
PDF
Cybersecurity Series SEIM Log Analysis
PPTX
Is SIEM really Dead ? OR Can it evolve into a Platform ?
PPTX
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
PDF
SIEM evaluator guide for soc analyst
PPTX
SIEM Primer:
PDF
Maceo Wattley Contributor Infosec
PPTX
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
PDF
SIEM.pdf
PPTX
Siem tools-monitor-your-network
PDF
SIEM Buyer's Guide
PPTX
Tips on SIEM Ops 2015
PPTX
KS - Introduction to System Information and Security Management (SIEM).pptx
PPTX
Beginner's Guide to SIEM
PPTX
Understanding SIEM Services By Cyber Cops
PPTX
SIEM : Security Information and Event Management
PDF
Next-Generation SIEM: Delivered from the Cloud
PDF
5-Ways-To-Future-Proof-Your-SIEM-Securonix[1].pdf
Introduction to SIEM.pptx
The SIEM Buyer Guide the siem buyer guide
Security Information Event Management Security Information Event Management
Cybersecurity Series SEIM Log Analysis
Is SIEM really Dead ? OR Can it evolve into a Platform ?
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
SIEM evaluator guide for soc analyst
SIEM Primer:
Maceo Wattley Contributor Infosec
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
SIEM.pdf
Siem tools-monitor-your-network
SIEM Buyer's Guide
Tips on SIEM Ops 2015
KS - Introduction to System Information and Security Management (SIEM).pptx
Beginner's Guide to SIEM
Understanding SIEM Services By Cyber Cops
SIEM : Security Information and Event Management
Next-Generation SIEM: Delivered from the Cloud
5-Ways-To-Future-Proof-Your-SIEM-Securonix[1].pdf
Ad

More from SecureData Europe (8)

PPTX
SecureData GI
PDF
FINE-TUNE IPS TO DIAL UP SECURITY
PPTX
Educate Your Users Not To Take The Bait: Introduction To Phishing As A Service
PDF
Managed Security Services On The Rise
PPTX
Managed Next Generation Firewall Service
PPTX
Incident Response: Tools & Techniques
PPTX
Balance Risk With Better Threat Detection
PDF
New Battle Lines for Security
SecureData GI
FINE-TUNE IPS TO DIAL UP SECURITY
Educate Your Users Not To Take The Bait: Introduction To Phishing As A Service
Managed Security Services On The Rise
Managed Next Generation Firewall Service
Incident Response: Tools & Techniques
Balance Risk With Better Threat Detection
New Battle Lines for Security

Recently uploaded (20)

PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
A Presentation on Touch Screen Technology
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Hybrid model detection and classification of lung cancer
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
project resource management chapter-09.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
August Patch Tuesday
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
Assigned Numbers - 2025 - Bluetooth® Document
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Accuracy of neural networks in brain wave diagnosis of schizophrenia
cloud_computing_Infrastucture_as_cloud_p
A novel scalable deep ensemble learning framework for big data classification...
NewMind AI Weekly Chronicles - August'25-Week II
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
1 - Historical Antecedents, Social Consideration.pdf
A Presentation on Touch Screen Technology
A comparative analysis of optical character recognition models for extracting...
Building Integrated photovoltaic BIPV_UPV.pdf
Hybrid model detection and classification of lung cancer
MIND Revenue Release Quarter 2 2025 Press Release
Enhancing emotion recognition model for a student engagement use case through...
project resource management chapter-09.pdf
Approach and Philosophy of On baking technology
Unlocking AI with Model Context Protocol (MCP)
August Patch Tuesday

SORT OUT YOUR SIEM

  • 1. SORT OUT YOUR SIEM w w w. s i e m s t r a t e g y. c o m 16 October 2013 1
  • 2. AGENDA • SIEM today – How are you doing it? • Why SIEM? – Business benefits – IT team benefits • Introducing SIEM – What it is, and what it isn’t • Four foundations for SIEM – Everything in place – Platform approach – Expert security contextualisation – Resourcing for 24/7 monitoring • Sorting out your SIEM – In-house – SIEM-as-a-Service 2
  • 4. TODAY’S SIEM LANDSCAPE We find IT leaders tend to operate in one of three ways when it comes to SIEM: Ignore it Seats of the pants security Do the minimum Log collation and reporting for compliance Functioning SIEM • • Platform approach Proactive threat detection 4
  • 5. WHY SIEM? Business benefits • • • • Service availability / uptime / minimise downtime Early warning system Better security intelligence More ‘known’ risks IT benefits • • • • • Proactive threat detection prevents incidents and the need for fire-fighting Efficient – data logs from the entire network are viewed via a single dashboard All IT teams have full visibility of all logs to find the root cause faster Reduce spend on security hardware by getting more from your existing infrastructure Optimise IT resources on valuecreation project 5
  • 7. SecureData 24x7 Security Operations Centre SecureData 24x7 Security Operations Centre OPTIMISED SIEM ARCHITECTURE Reports Alerts Reports WAN SecureData Cloud Data Centre Events Event Manager and Advanced Intelligence Logging Managers INTERNET Customer Data Centre n Customer Data Centre 1 Agent Agent Firewalls Firewalls Applications Applications Switches Switches Database Database Routers Routers 7
  • 8. WHAT IS SIEM, AND WHAT IS IT NOT? SIEM is not only: But it is about: Storing logs / Logging Log correlation and contextualisation PCI or Compliance Security intelligence Reports Real time information Real time information Ability to view historical logs in a structured and targeted way Device logs All IT logs – physical access systems, coffee machines etc Logs Traffic flow, process information, file monitoring 8
  • 9. HOW TO ADDRESS SIEM Four foundations of SIEM: 1 3 Everything in one place Making it make sense – the need for an expert eye 2 4 Logs glorious logsthink platform, not just devices Resourcing for monitoring and threat mitigation 9
  • 10. 1 2 FOUR FOUNDATIONS FOR SIEM Everything in one place • • • • • • • 42% of IT managers see multiple logging systems as a security risk Centralise logs for real time correlation & analysis All logs, not just security devices logs Use automation tools Benchmark alarms for your organisational norms Provide full network visibility through one pane of glass to identify the root cause Enable faster diagnostics and mitigation Logs glorious logs • Take a platform or a ‘big data’ approach to log correlation •Set the platform up in the right way •Pull in contextual data such as traffic, packet analysis, traffic flow, file management etc •Track security behaviour across the whole of the network •40% of IT managers have serious concerns about the time it takes to analyse data and logs 10
  • 11. 3 4 FOUR FOUNDATIONS FOR SIEM Make it make sense •Real time interpretation of SIEM monitoring is critical •It requires an expert, human interface •It’s important to distinguish the line between information and intelligence •Security experts need to review the alarms and alerts to determine the action in context of the organisation Resourcing for monitoring and threat mitigation •SIEM needs 24/7/365 monitoring •Security skills on a continuous basis are expensive and under-utilised on monitoring •Outputting a report each week is redundant practice in threat management •SIEM can free-up rather than use-up resources by acting as an early warning system •More time to mitigate threats enable resource planning and optimisation •Reduce the need to ‘drop everything’ for attack fire fighting 11
  • 13. YOUR OPTIONS FOR SIEM Hybrid Internal • • • • Design, build, install Requires 24/7 resourcing Great if you have a SOC / NOC Security experts are expensive • • Fully managed SIEM by SecureData(so me, or all) Equipment located on customer site SIEM as a service • • Monitoring: log correlation, remote service monitoring, notifications Managed: remote diagnostics and assistance, remote vulnerability scans, remote system updates 13
  • 14. AFFINITY SecureData SIEM-as-a-Service - Wholly owned SOC across two sites - 24x7x365 fully-manned operations - Affinity platform for complete security monitoring 14
  • 15. THE SECUREDATA DIFFERENCE 1 2 Proactive approach to security: We take a different approach to security, focusing on proactive monitoring and management to minimise business disruption for our clients. We offer the complete security spectrum from assessing risk to detecting threats, protecting valuable assets and responding to breaches when the happen. Excellent customer service and support We offer independent consultancy through dedicated account managers and technical guardians to recommend business security solutions built on the leading security vendors in the industry. We work hard to partner with customers, and we offer flexibility to develop customised processes that fit with the customer. Our highly accredited technical staff give customers first-class support and fast resolution time with the desire to do the best possible job every time. 3 24/7 security operations platform We operate our own support teams and SOC providing global reach with full responsibility for 24/7 security monitoring and management for customers. Owning the SOC enables us to better synthesise information, intelligence and transactions to proactively mitigate more threats before they impact the customer. 15
  • 16. THANK YOU www.siemstrategy.com For more information, contact: info@secdata.com +44 1622 723456 www.secdata.com 16
  • 17. 17