Category Archives: Security


What Makes a Successful SIEM Solution

SIEM (or Safety Info and also Event Management) can be extremely complex. It often ends up costing more than planned, and can involve the need of IT specialists to finish the job. Time & effort estimates can blow out very quickly.

Why do companies end up implementing SIEM? Many factors. It could be to conform with a legislative ruling. It may be implemented as part of a response to a cyber-attack. It could also be a requirement of a supplier, partner or other associated company requiring SIEM to be in place as a security measure, before doing business. In most cases there are already some levels of security in place which are strengthened by the new SIEM solutions.

Things to Consider before Implementing SIEM Security

SIEM solutions require significant consideration & planning. A company should never rush into implementing it without careful consideration of all key aspects. The company’s network specialists will need a comprehensive knowledge of the network topology and how it interacts with other elements of the organization. The end goal should be clearly understood by all parties involved to avoid surprises at any stage of the installation.

Effective SIEM security requires logging and maintaining a list of alerts and activities, as well as reacting to those alerts.

SIEM Safety Control Measures

SIEM solution considerationsTo implement SIEM security properly, it’s also important to factor-in the various safety controls which will need to be in place.

For example, frequent check-ups of the desktop & server operating systems and the above-base apps. Protection from spam, virus and trojan attacks at the Exchange and desktop layers. Correctly configured and frequently updated firewalls. Utilization of a system to avoid network invasions.

Implementing SIEM successfully isn’t as simple as just monitoring network activity and logging all the results. It takes active interaction.

You also want to think about resource capital. Avoid the scenario where only one key team member has the “keys to the kingdom”, leaving you vulnerable if that person ever leaves the organization.

Many companies struggle with security because as they grow, their IT security doesn’t grow accordingly. Processes and procedures used when the company were small, will no longer be effective to the now large company. Gaps will appear. And these gaps will create security risks.

As with any large-scale IT project, a post implementation review (or PIR) is critical to the success of the SIEM security solution. To find out what went well, what did not, and what lessons can be learned from the exercise.

Far too many companies rush into IT network projects like SIEM before they’ve considered the entire scope of work from start to finish. Often this is a knee-jerk reaction, or a requirement to spend budget before the end of the financial year. But the best implementations are those based on careful planning, consideration, stakeholder management and staff buy-in. With those elements in place, the chances of a successful SIEM security project increase significantly.