IDC PeerScape: SIEM Practices for Enabling a Trusted Tool

IDC PeerScape: SIEM Practices for Enabling a Trusted Tool

This IDC PeerScape discusses the security information and event management (SIEM) practices that enable a trusted tool."A SIEM is one of the most complex and costly tools in the security operations center," said Michelle Abraham, research director, Security and Trust at IDC. "It is incumbent upon security teams to maximize the detection and correlation capabilities of the SIEM in their differentiated environment by ingesting necessary log sources and tuning the rules to reduce noise while ensuring critical alerts are examined."

Please Note: Extended description available upon request.


IDC PeerScape Figure
Executive Summary
Peer Insights
Practice 1: Know Your Log Source Options Before Choosing Your SIEM Vendor
Challenge
Example
Guidance
Practice 2: Understand the Care and Feeding Required to Maintain the SIEM
Challenge
Example
Guidance
Practice 3: Adjust the SIEM to Your Environment by Tweaking Detections as Needed
Challenge
Example
Guidance
Practice 4: Squeeze the Value Out of the SIEM by Using Its Full Capabilities
Challenge
Example
Guidance

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook
Cookie Settings