2014 SIEM Challenge Series

Round 1: The SIEM Challenge

Industry Issues. Vendor Differentiators.

The bad guys have stepped up their attacks and become more sophisticated. They have developed advanced evasion techniques (AET) and advanced persistence threats (APT) to break into enterprises and make off with the goods. All this has made it more important for IT to combat the attacks. Having good security is more than just firewalls and IPSs. You need a good SIEM solution that can look at the bigger picture and root out the bad guy's AET and APT attacks.

The question is: Which SIEM vendor has the right solution to meet these new security challenges? I have brought together two leading SIEM vendors -– HP and McAfee -– to shed light on how their solutions handle the growing security challenges you face. The Challenge document doesn't focus on telling you that there are bad guys out there, and they need to be stopped. You already know that. Instead, it explains how the vendors' solutions can successfully meet today's security challenge. You'll learn how each vendor stands out from the competition, gaining information far beyond just reviewing a checklist of features. The Challenge is your guide to what makes their solutions different.

Download our challenge to the MDM industry and see how the vendors responded.

SIEM Network World Challenge Series presented by Robin Layland

Round 2: Webcast Panel Discussions

Understanding Big Data Security Analytics (BDSA)

Industry analyst Robin Layland joins Eric Schou from HP and Michael Leland of McAfee in examining how Big Data Security Analytics can sort through the mass of security and business data to find attacks that go unnoticed. We start by explaining what BDSA is and how it works. The discussion then moves on to how to best implement a BDSA solution, along with the importance of having a good user interface. To help you select the right SIEM solution, we cover the key attributes of a good SIEM/BDSA solution.

Download this white paper now

Stopping Low and Slow Attacks in Real-Time

Trevor Welsh from McAfee joins Eric Schou from HP and industry analyst Robin Layland to discuss what a SIEM needs to identify and stop low and slow attacks that use advanced persistence threats (APT) in real-time. We start by identifying why legacy SIEMs have problems dealing with APT and then talk about the characteristics of low and slow attacks. Next, we explore how baselining, and good correlation analysis combined with risk assessment can turn your SIEM into a self-sustaining SIEM that can catch the bad guys in real-time.

Download this white paper now

Top 5 Truths About Big Data Hype and Security Intelligence

Big Data Security Analytics (BDSA) is the subject of exuberant predictions. However, a Gartner analyst points out that no available BDSA solutions come close to these forecasts. Nevertheless, the principles of Big Data are the key to advanced security intelligence. This white paper discusses the key tenets of Big Data, including:

- The hidden skill requirement of BDSA: data scientists
- The real-time requirement for security intelligence, often misunderstood in relation to Big Data
- The risk of data silos persisting in Big Data repositories
- Investing in a Big Data cluster that runs search and a schema-less database is only the beginning of building a BDSA practice

Download now

Needle in a Datastack Report

Big Data is changing the face of the global business landscape, with few technologies left untouched by the opportunities it presents—and information security is no different. With the increasing sophistication of attacks and growing regulatory pressures, the variety, volume, and analytic needs of security data have grown beyond the capabilities of traditional information management systems. The sheer volume of security-related data facing an organization these days can make identifying a threat like looking for a needle in a haystack. Yet collecting more data can also play a transformational role in information security. Organizations need to become smarter at harnessing and sifting through this wealth of information to protect themselves from the unrelenting threats they face every day.

Download now