Written by security and compliance experts and speakers, Security Information and Event Management Implementation shows IT professionals how to effectively implement SIEM in order to efficiently analyze and report data, respond effectively to inside and outside threats, and follow compliance regulations.About the Book SIEM technology provides real-time analysis of security alerts generated by network hardware and applications. SIEM solutions come as software, appliances, or managed services and enable companies to respond to attacks faster, log security data and generate compliance reports. In spite of the economic downturn, the Security Information and Event Management marketplace is growing rapidly. There are several factors driving the rise of the SIEM market: it is ideal for reporting and compliance, exposes internal and external threats, improves operational efficiencies while cutting administrative expenses, and the technology's flexibility allows it to be used as a managed service.EMC, IBM, Novell, Cisco, CheckPoint, Symantec, CA, Attachmate, Q1Labs, eIQ Networks, SenSage and others all have SIEM products. Because of the technology's relatively new emergence in the marketplace, there are few publications that address more than one vendor's product. SIEM Implementation shows how to implement multiple products, and also discusses the strengths, weaknesses, and advanced tuning of these various systems.
SIEM Implementation covers the gamut of topics a network administrator or security professional needs - from basic concepts and components to high-level configuration, analysis, interpretation and response. It aids in the performance of risk analysis, threat detection, threat analysis and threat response for IT systems and businesses of every size.This book also shows the separate pieces that make up a complete and cohesive SIEM. These pieces are what most small and medium size businesses are forced to implement, due to the relatively high cost to acquire, implement, maintain and reap benefits from the full scale SIEM systems. This teaches the IT professional how to implement a more integrated collection of discrete SIEM pieces, approaching similar utility of a full featured SIEM tool. Further, SIEM Implementation shows readers how to use the SIEM tool to develop business intelligence, beyond the realm of being just a fancy security tool.SIEM Implementation is a valuable addition to our security plan for 2010.Security Plan / Pub Date Mobile Application Security - Spring 2009 Hacking Exposed Virtualization - Summer 2010 Empirical Security: Protecting Data with Metrics - Summer 2010 Security Information and Event Management (SIEM) - Summer 2010 Hacking Evolved - Fall 2010 Hacking Exposed Web Applications, 3rd Edition - Fall 2010 Hacking Exposed Wireless, 2nd Edition - Fall 2010Key Selling Features Includes a Smartbook ' a knowledge base of business use cases: real world examples of business needs that can be satisfied by using a finely tuned SIEM system.
Covers the top SIEM products/vendors: ArcSight, Q1 QRadar, and Cisco MARS Authors are security, SIEM, and compliance experts who speak globally around the world, are famous published authors, and have close ties with the government and multiple corporate vendors. Foreword by Shon Harris Includes product feature summaries, and analysis and trending examples Covers regulatory compliance issues Provides Incident Response solutionsMarket / Audience Targeted at IT/security professionals and compliance professionals Fueled originally by stealthy threats such as worms and more recently by compliance, the SIEM market is projected to grow from about $380 million last year to $873 million in 2010, according to research firm IDC. RSA Security, the security division of EMC, estimates that the SIEM market is expanding at a rate of between 25 percent and 35 pe.