description: subsection within the field of computer security, where software products and services combine security information management and security event management
4 results
by Scott J. Shapiro · 523pp · 154,042 words
you will see miles of vendors hyping a different silver bullet. They pitch “next-generation” everything: firewalls, antimalware software, intrusion- detection services, intrusion-prevention services, security-information and event-management utilities, network-traffic analyzers, document taggers, log visualizers, and unified threat-management dashboards. If you ask vendors what separates their products from their competitors’, they
by Richard A. Clarke and Robert K. Knake · 15 Jul 2019 · 409pp · 112,055 words
, and other protective controls, and we needed a way to detect when that occurred. Thus were born technologies such as intrusion detection systems (IDS) and security information and event management (SIEM), which helped organizations home in on unusual activities detected in their logs. Security organizations shifted to include threat management programs and started building security
…
secure development life cycle (SDLC), 79, 80, 306 secure segmented diverse-source microgrid (SSDM), 164–65, 306 Securities and Exchange Commission, 8, 43, 87, 115 security information and event management, 71 security operations centers (SOCs), 71, 74, 153, 246, 248, 307 Seehra, Jasmeet, 111 Senate, U.S., 78, 232 Senior Cyber Service, 173, 178 sensors
by Jan Kunigk, Ian Buss, Paul Wilkinson and Lars George · 8 Jan 2019 · 1,409pp · 205,237 words
a database. All access to data and other protected resources is recorded for posterity, such as audits performed by security personnel or automated processes (like security information and event management [SIEM] tools). Sizing: The user, group, and permission information is often comparatively small and rather static in nature. The larger part is the audit log
by Michael S Collins · 23 Feb 2014 · 446pp · 102,421 words
,” Proceedings of the 1999 Large Installation Systems Administration Conference. * * * [9] A number of similar tools are associated with SEM, particularly security information management (SIM) and security information and event management (SIEM). Technically, SIM refers to the log data and information management while SEM is focused on more abstract events, but you are more likely to