SURVEY: 1 IN 2 BUYERS REQUIRE CSR IN PROCUREM... » Almost half of buyer documents (48 per cent) seen by electrotechnical businesses with turnover above... G4S Africa supports small business development thr... » The latest product in the G4S Deposita range is a smart safe system called mini-pay that holds up to... Commissioner's statement following incident in Man... » This is an utterly appalling attack. My thoughts are with the people of Manchester as they try to co... UPDATE: Policing events in the Capital » Following the horrific terrorist attack in Manchester last night, in which 22 people were killed and... Statement from Assistant Commissioner » Statement from Assistant Commissioner Mark Rowley, Head of National Counter Terrorism Policing: The... Met intensifies policing activities in London fol... » The Metropolitan Police Service (MPS) has increased police numbers and operations across the Capital... OF FOOLS OF THE MIDDLE BELT, ONE NORTH AND PASTORA... » Please visit also: www.scorpionnewscorp.com SERIES: BUHARISM AND THE FIERCE URGENCY OF NOW A treat... Home Secretary’s statement on the Manchester attac... » I know that some people will only just be waking up to the news of the horrific attacks in Mancheste... Checkpoint Systems unveils Bug Tag 2 loss preventi... » Checkpoint Systems has announced the launch of Bug Tag 2 – an innovative loss prevention solution th... Edesix launches new head and torso mounted body wo... » Edesix has announced the launch of new head and torso mounted cameras. The X-100 is a side-mounta...

CLICK HERE TO

Advertise with Vigilance

SOCIAL BOOKMARK

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

New York:  Balabit has been identified as a representative vendor in a Gartner report entitled: ‘Use Central Log Management for Security Event Monitoring Use Cases’[1]. The report focuses on the role of Central Log Management (CLM) in improving threat monitoring and detection, and recognizes the challenges of fragmented or incomplete log management environments. It also looks at the factors that can hamper Security Information and Event Management (SIEM) deployments such as training and licensing models, and examines use cases where CLM can help organizations to maximize the return on their SIEM tool investments.

 

Regarding the current log management challenges organizations face, Gartner’s report states: “…At the other end of the spectrum, enterprises that have started their SIEM journey usually end up in one of two places: underinvested in their initial implementation and having to find budget to increase capacity to meet their use cases, or overlicensed and being stuck paying higher maintenance costs to the SIEM vendor for years for that unused capacity.”

 

Balázs Scheidler, Balabit co-founder and CTO comments: “The report recognizes given particular scenarios, the importance of a centralized log management for security event monitoring is having a renaissance. This is something that we have been advocating for more than 16 years. For many organizations, the resource constraints, coupled with the budget and expertise requirements for successful SIEM deployments can mean that they don’t always meet expectations. Added to that, there are often unknown costs to factor in, particularly when SIEM costs are based on the volume of data processed.”

The report includes recommendations from Gartner that security and risk management leaders responsible for security monitoring and operations should pay attention to:

·         Use a CLM tool to address security monitoring and compliance use cases where there are insufficient resources or budget for a SIEM or for managed security services.

·         For midsize organizations, look to use existing IT and network operations log management tools to collect and manage security event logs.

·         Consider a multitier approach using a CLM tool when planning a SIEM deployment to avoid overutilization, and overlicensing, from the start.

·         Use a CLM tool to better manage your existing SIEM tool investment if your organization has an existing SIEM solution that cannot scale its collection and analysis capabilities due to budget constraints.

Scheidler continues: “There are ways to optimize SIEM investments, to lower the total cost of ownership and to improve incident response capabilities. Analysis for security alerts is only as good as the information that is received from logs. By filtering irrelevant data and classifying messages before they are fed to SIEM solutions, organizations can reduce the costs of their SIEM investment and process structured and unstructured data across their IT environment. For some of our customers, we are reducing their SIEM licensing costs by as much as 40%.”

Balabit’s syslog-ng collects, processes, and transfers logs from a wide variety of sources and securely stores the data or forwards it to analytic tools such as SIEM. More than a million users worldwide trust syslog-ng to deliver log data from across their IT environments. Whether it’s deployed as a software or as a turnkey appliance, syslog-ng supports the use cases most frequently mentioned by clients to Gartner: improving foundational security capabilities in the absence of other means and augmenting new or existing SIEM deployments or service engagements.