SlideShare a Scribd company logo
1 of 1
Download to read offline
Evolution of the
           MODERN SIEM
           First Generation SIEM Matures to Anchor Security Intelligence

           Security Information Management (SIM)
           Log Management
           Reporting
           Analysis
           Compliance reporting

                                                                                             Next Generation SIEM                 Risk Management                   Network Behavior               Future
                                                      1st Gen SIEM                                                                                                  Anomaly Detection
                                                                                                                              +                                 +
                                                                                             Threat and anomaly detection         Device con guration &                                            Open Systems & SDKs
                                                      Monitor traditional                                                         topology                          Network activity monitoring;
                                                      security telemetry                     Policy-aware compliance                                                                               Increasing levels of context
                                                                                                                                  Pre-exploit analysis &            virtual, physical
                                                      Visibility into servers                User behavior & context                                                                               Full integration of security
                                                                                                                                  simulation                        Full packet capture            process & work ow
                                                      and security systems                   Analysis before, during, after       Prioritized vulnerabilities                                      Greater predictive ability
                                                                                             attack

           Security Event Management (SEM)                                                         Integrated Architecture | Database Rapid Search & Query | Correlation, Analysis, Normalization | One-console Security
           Real-time monitoring of events
           Security and network devices
           Applications
           Event correlation
           Incident response

                                                                                                                 Security Intelligence Platform
           Phased Evolution to Security Intelligence

                                                                          Targets of Opportunity                                                                                   Targets of Choice
                                                                          Phase 1 - Perimeter                                 Phase 2 - Logging & Compliance                        Phase 3 - Security Intelligence

                               Objective                                  Perimeter defense, log                              Deeper reporting and analytics,                       Log management, compliance,
                                                                          consolidation and correlation                       log consolidation, real-time                          threat detection, application
                                                                                                                              detection, forensics                                  monitoring, risk management,
                                                                                                                                                                                    user activity monitoring

                               Timeframe                                  2000-2004                                           2005-2009                                             2010 - present



                               Architecture                               Security management was an                          Maturing of log management and                        Less intrusive and separated from
                                                                          integrated solution. Deeply                         security analytics. Distributed                       data center. Network ow
                                                                          embedded into existing systems.                     architecture.                                         included in analytics. Single
                                                                                                                                                                                    console.


                                                                          Small numbers of sources                            Larger variety of log data sources.                   All relevant security data across
                               Data sources                               supported out of the box.                                                                                 the enterprise.


                                                                          Dozens to hundreds                                  Hundreds to thousands                                 Unlimited, based on unique
                               Num of devices                                                                                                                                       scaling requirements of each
                               managed                                                                                                                                              deployment

                                                                          1,000 to 5,000                                      10,000 +                                              Unlimited, based on unique
                               Events per second                                                                                                                                    scaling requirements of each
                                                                                                                                                                                    deployment

                                                                          Hundreds of gigabytes                               Terabytes                                             Unlimited, based on unique
                               Storage                                                                                                                                              scaling requirements of each
                                                                                                                                                                                    deployment

                                                                          Event ltering, basic event                          Advanced correlation, analytics                       Advanced analytics including
                               Analytics                                  correlation                                         limited by data type (log only)                       network and infrastructure events
                                                                                                                                                                                    (VPN, IDS/IPS, etc), network and
                                                                                                                                                                                    application context, user data via
                                                                                                                                                                                    IAM products.
                                                                          Perimeter security team (web                        IT security and compliance teams                      IT security, compliance, opera-
                               End users                                  services)                                                                                                 tions, auditor, networking and line
                                                                                                                                                                                    of business
                                                                          Slow, manual gathering of data                      Often takes months or years to                        Real-time / near-real-time
                               Breach response                            and device info. Can take years to                  discover. Faster, but limited                         discovery of breaches, often with
                                                                          discover.                                           analytics prevent quick response.                     same-day remediation.

                                                                          Manual analysis. False                              Limited data analytics. Data                          Standards governing bodies not
                               Major limitations                          positives/negatives. Limited log                    outside of logs cannot be                             yet formed. Integration with
                                                                           le formats. Not scalable, small                    collected. Performance issues                         third-party products/sources still
                                                                          number of supported devices.                        with large data sets. False                           labor intensive.
                                                                                                                              positives and negatives.

                                                                                                                                    ** Phase 1 and Phase 2 data source: Enterprise Strategy Group, Security Management Evolution




                              Copyright 2011 Q1 Labs, Inc. All rights reserved. EMS-IG0911
Total Security Intelligence

More Related Content

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Evolution of the Modern SIEM

  • 1. Evolution of the MODERN SIEM First Generation SIEM Matures to Anchor Security Intelligence Security Information Management (SIM) Log Management Reporting Analysis Compliance reporting Next Generation SIEM Risk Management Network Behavior Future 1st Gen SIEM Anomaly Detection + + Threat and anomaly detection Device con guration & Open Systems & SDKs Monitor traditional topology Network activity monitoring; security telemetry Policy-aware compliance Increasing levels of context Pre-exploit analysis & virtual, physical Visibility into servers User behavior & context Full integration of security simulation Full packet capture process & work ow and security systems Analysis before, during, after Prioritized vulnerabilities Greater predictive ability attack Security Event Management (SEM) Integrated Architecture | Database Rapid Search & Query | Correlation, Analysis, Normalization | One-console Security Real-time monitoring of events Security and network devices Applications Event correlation Incident response Security Intelligence Platform Phased Evolution to Security Intelligence Targets of Opportunity Targets of Choice Phase 1 - Perimeter Phase 2 - Logging & Compliance Phase 3 - Security Intelligence Objective Perimeter defense, log Deeper reporting and analytics, Log management, compliance, consolidation and correlation log consolidation, real-time threat detection, application detection, forensics monitoring, risk management, user activity monitoring Timeframe 2000-2004 2005-2009 2010 - present Architecture Security management was an Maturing of log management and Less intrusive and separated from integrated solution. Deeply security analytics. Distributed data center. Network ow embedded into existing systems. architecture. included in analytics. Single console. Small numbers of sources Larger variety of log data sources. All relevant security data across Data sources supported out of the box. the enterprise. Dozens to hundreds Hundreds to thousands Unlimited, based on unique Num of devices scaling requirements of each managed deployment 1,000 to 5,000 10,000 + Unlimited, based on unique Events per second scaling requirements of each deployment Hundreds of gigabytes Terabytes Unlimited, based on unique Storage scaling requirements of each deployment Event ltering, basic event Advanced correlation, analytics Advanced analytics including Analytics correlation limited by data type (log only) network and infrastructure events (VPN, IDS/IPS, etc), network and application context, user data via IAM products. Perimeter security team (web IT security and compliance teams IT security, compliance, opera- End users services) tions, auditor, networking and line of business Slow, manual gathering of data Often takes months or years to Real-time / near-real-time Breach response and device info. Can take years to discover. Faster, but limited discovery of breaches, often with discover. analytics prevent quick response. same-day remediation. Manual analysis. False Limited data analytics. Data Standards governing bodies not Major limitations positives/negatives. Limited log outside of logs cannot be yet formed. Integration with le formats. Not scalable, small collected. Performance issues third-party products/sources still number of supported devices. with large data sets. False labor intensive. positives and negatives. ** Phase 1 and Phase 2 data source: Enterprise Strategy Group, Security Management Evolution Copyright 2011 Q1 Labs, Inc. All rights reserved. EMS-IG0911 Total Security Intelligence