How Will You Handle a Cyber-Attack? What to Do When You’re Under Fire

How Will You Handle a Cyber-Attack? What to Do When You're Under Fire

You likely use security event management tools to gather, organize and report on security data in your environment. The trick is traditional management processes are manual, costly, and limited in scalability. How does your current solution make it easy for you to work together to diagnose and fix issues? In this post, I discuss why Softchoice likes McAfee’s Enterprise Security Manager, and what you can do to ensure you will react efficiently when threats place your environment under fire. [Read more…]

Is Your SIEM Platform Dealing With Critical Threats As Well As It Should? [McAfee]

Effective security information and event management (SIEM) means properly analyzing your security event data in real time – threats and vulnerabilities to your organization’s systems — and collecting and analyzing your log data for regulatory compliance. But as SIEM/Log Management technology has rapidly evolved and you’ve had some time to live with the offerings you’ve implemented, you might be having a little buyer’s remorse. In other words, you might be wondering or worrying whether your SIEM is working as it should and meeting your – and your organization’s — expectations. You may also be scared to find out.

Don’t be. If a thorough analysis leads you to conclude you need an SIEM replacement, the good news is that might be easier than the initial installation. Equally good news, that analysis tells you your SIEM purchase and implementation was the right one. Either way, just about the worst thing you can do is pretend that uneasiness or uncertainty you’re feeling doesn’t exist.

It’s better to know than to not know.

So how do you start? What’s the process for deciding whether the benefits of considering a new security management platform and migrating to it outweigh the risks of doing nothing? The way I see it, there are 7 steps to get you there.

[Read more…]