Is Your SIEM Platform Dealing With Critical Threats As Well As It Should? [McAfee]

Effective security information and event management (SIEM) means properly analyzing your security event data in real time – threats and vulnerabilities to your organization’s systems — and collecting and analyzing your log data for regulatory compliance. But as SIEM/Log Management technology has rapidly evolved and you’ve had some time to live with the offerings you’ve implemented, you might be having a little buyer’s remorse. In other words, you might be wondering or worrying whether your SIEM is working as it should and meeting your – and your organization’s — expectations. You may also be scared to find out.

Don’t be. If a thorough analysis leads you to conclude you need an SIEM replacement, the good news is that might be easier than the initial installation. Equally good news, that analysis tells you your SIEM purchase and implementation was the right one. Either way, just about the worst thing you can do is pretend that uneasiness or uncertainty you’re feeling doesn’t exist.

It’s better to know than to not know.

So how do you start? What’s the process for deciding whether the benefits of considering a new security management platform and migrating to it outweigh the risks of doing nothing? The way I see it, there are 7 steps to get you there.

[Read more…]

Cloud-Based Security (SaaS) Is The Next Generation of Defense [McAfee]

 It’s such a familiar story these days. Businesses facing budget tradeoffs find themselves looking for ways to defer costs, cut costs and squeeze value wherever they can. And when they do, they often risk creating greater headaches down the road.

While it may sound cliché, it’s also the reality we live in. And nowhere is that reality confronting decision makers and raising more red flags than on the security front. Whether you’re an IT manager or security specialist, you’re likely evaluating what security solutions to buy, how to implement them and how to manage them, all while the black cloud of malware, spyware, spam and other intrusions and vulnerabilities hangs over your head.

[Read more…]

Mobile Devices Are Flooding The Office – Can You Rise Above It? [Cisco]

By 2015, more than 10 billion WIFI-enabled devices will enter the market. Many of them will find their way into office buildings, changing employee habits and the way we work, as more and more users depend on tablets, smartphones and similar machines for a variety of daily personal and professional tasks. And as these devices become ubiquitous at work, more employees are expecting full network access, even on non-corporate devices.

Remember your first security policy? Good stuff on, bad stuff off. But these days, in our new mobile consumerized BYOD world, defining good and bad has become really difficult. And the one or two policies of yore have become five, ten and more. Plus, forget about just defining these policies, you now need to enforce them as well. Now there’s compliance and proving your network, flooded with these new devices, is actually still secure.

[Read more…]