SIEM Selling
SIEM Selling
Security information and event management (SIEM) technology provides real-time monitoring and
historical reporting of security events from networks, systems and applications.
SIEM deployments are often funded to address regulatory compliance reporting requirements, but
organizations should also use SIEM to improve security operations, threat management and incident
response capabilities.
Log management functions have become a more important customer requirement because of the
following factors:
• Payment Card Industry Data Security Standards (PCI DSS) requirement for log management
• The usefulness of detailed and historical log data analysis for breach investigation and general
forensics
• The ability to employ log management in front of a SEM-focused deployment to enable more-
selective forwarding of events to correlation engines (thereby, reducing the load on the event
manager and improving its scalability)
Application layer monitoring for fraud detection or internal threat management continues to evolve as a
use case for SIEM technology. SIEM technology is being deployed alongside fraud detection and
application monitoring point solutions to broaden their scope. These projects have been undertaken by
large companies in industry vertical markets, such as financial services and telecommunications, as an
internally justified security measure. A number of SIEM vendors are beginning to position their
technologies as "platforms" that can provide security, operations and application analytics.
We’ve shown an example for EPS calculations below where as the calculations for log sources on
sizing can be as simple as counting the numbers of devices and applications that you want to collect
logs and events from.
Events Per Second, or EPS, as it is commonly referred to in the world of network security, is a
measurement that is used to convey how fast a network generates data from its security devices
(firewalls, Intrusion Detection Systems (IDS), servers, routers, etc.), and/or how fast an SEM product
can correlate data from those devices.
Example EPS
If an organisation had two firewalls, two network switches, one router, and four servers
Firewalls 1000 EPS, Switches 100 EPS, Router 1 EPS, Servers 40 EPS = Total 1141 EPS
Each vendor will measure EPS differently so it is good to get an understanding of their measures to
help with the calculations.
What to monitor on a SIEM solution
Knowing what to monitor on a SIEM solution is key as there is a huge amount of data that can be
generated from server, appliances and applications and in order to understand key interesting events
you need to filter out the less interesting information that is captured.
Some people refer to the huge amounts of less interesting information as ‘Noise’ and there can be huge
amounts of it when selecting policies to collect everything.
A more pragmatic approach would be to start collecting key interesting events and then to build the
amount of information collected to match your own capabilities to act on the results.
You can start to understand why appliance based solutions have such a strict requirements gathering
exercise when thinking about the sheer volume of data that they can gather as they need to allow
sufficient space for growth unless that can offload data to some other disaster recovery format.
IT Security compliance can set the retention period in some cases and so can legal requirements for
some industry sectors. There are so many different business areas that have stipulations on data
retention that it’s worth doing some investigation on this before starting any SIEM sizing but I would
like to think that most data owners would be aware of their own requirements from the start.