Cyber security concept. Encryption. Data protection. Anti virus software. Communication network.
Insight Type: Blog
SIEM… is it over? Is there a legacy?

In today’s ever-evolving technological age where everyone has the power to innovate, develop, design, enforce, implement, multiply, evolve, and increase, things are becoming unmanageable. Simply put, there is no control.

And then there is the flip side of the coin, where organisations simply stick to what they know. There is no innovation and no development – they are simply keeping their businesses ticking over. 

So where does security information and event management (SIEM) fit in? What does it do and why do we need it?

In today’s big data world every entity is facing a similar problem. They lack the end-to-end visibility that helps to prevent attacks. While security solutions and controls definitely help to plug the holes, they still lack adequate functionality to consolidate, normalise and correlate events from various point solutions. These capabilities are at the core of a SIEM solution as they help to develop a strong “single-pane-of-glass” view that enables the business to baseline, detect, and triage, allowing the analyst to pinpoint and identify anomalies and threats at a glance.

Is this still relevant today? More than ever. There is a growing need to have access to the historical and recent activity that happens within today’s largest enterprises to enable true visibility and control over the entire IT stack. New and emerging technologies such as SOAR (See my previous article “Why SOAR is important… How is it different… How it helps your organisation” for more insight to the SOAR topic) are becoming increasingly reliant on historical information provided by SIEM to facilitate adequate triage, incident consolidation, and false-positive mitigation. With SOAR, even machine learning and AI functionality rely on historical context.

To answer the one-million-dollar question… No, SOAR does not Replace SIEM. If anything, it simply augments the analyst’s capability or in some cases, replaces the analyst.

Share Articles

Insights

News Centre

Media Type
Maidar Secure Advisory:Black Basta Ransomware Operators Exploit M...
Overview The notorious ransomware group, Black Basta, has intensified its use of social engineering techniques to infiltrate organizations, leveraging Microsoft Teams and malicious...
Maidar Secure Achieves Prestigious ISO 27001:2022 Certification
Maidar Secure Achieves Prestigious ISO 27001:2022 Certification Maidar Secure is proud to announce its achievement of the internationally recognized ISO 27001:2022 certification, u...
Basic SOC-as-a-Service: Simplified Security for Growing Businesse...
As businesses grow, so do their cybersecurity challenges. From increased exposure to evolving threats, navigating today’s digital landscape requires robust protection. Yet, for man...
Why a Security Operations Center (SOC) is Essential for Businesse...
Organizations face constant threats to their digital assets, from malware and phishing to unauthorized access and advanced cyberattacks. Protecting sensitive data, ensuring operati...
Security Automation, Orchestration & Response
As a leading provider of SOC-as-a-Service (SOCaaS), Maidar Secure helps customers automate their repetitive security operations tasks through various means. Here are some examples:...
Standard SOC‑as‑a‑Service (SOCaaS)
Standard SOC-as-a-Service (SOCaaS) with SIEM Platform: A Proven Solution for Enhanced Security As a leading provider of SOC-as-a-Service (SOCaaS), Maidar Secure SOC offers a standa...
Hope is not a security strategy. Get proactive about your defence today with Maidar Secure.