Cutting through SIEM/Log Management vendor hype

Cutting through SIEM/Log Management vendor hype

While there is little doubt that SIEM solutions are critical for compliance, security monitoring or IT optimization, it is getting harder for buyers to find the right product for their needs. The reason for this is two fold; firstly, there are a number of products available and vendors have done a great job of making their products sound roughly the same in core features such as correlation, reporting, collection, etc. and secondly, vendors are too busy differentiating on shiny features that in many cases have little or nothing to do with core functionality. This is not surprising. It is easier to spin a shiny feature than slug it out on whose product actually meets core requirements.

SIEM solutions, in reality, are optimized for different use-cases and one size never fits all. The good news is that with the number of potential solutions to choose from, if you do your homework, you will find a product that meets your requirements. So how do you cut through all the vendor claims and hype and select the right solution for your environment and needs?

Read full article for the 7 steps for cutting through vendor hype

Industry News

The lowdown on zero-day attacks 
By definition, zero-day attacks always beat anti-virus vigilantes to the punch. That’s because these destructive viruses are able to exploit unknown, undisclosed or newly discovered computer application vulnerabilities before a software developer is able to release a patch to the public — which can render anti-virus programs practically ineffective.

Did you know? EventTracker detects zero-day attacks with its integrated Change Management module

Extortionists target major pharmacy processor
One of the nation’s largest processors of pharmacy prescriptions said that extortionists are threatening to disclose personal and medical information on millions of Americans if the company fails to meet payment demands.

Did you know? EventTracker safeguards your critical data whether it is at rest, in motion or in use and protects you from costly and embarrassing breaches.

3 reasons why employees don’t follow security rules
A recent survey finds employees continue to ignore security policies. (Surprise, surprise.) Here’s a reminder about what often is missing in organizations that tempts workers to walk the wrong side of security law.

Did you know? EventTracker tracks all employee activity including user rights and activities, file and object access, and logon/offs to ensure that corporate and security policies are being followed