May 12, 2017 By Reto Zeidler 2 min read

Security information and event management (SIEM) is top-of-mind for many chief information security officers (CISOs). There are many common challenges related to the implementation of SIEM, some of which are rooted in false expectations and inconsistent views. This is a good reason to address five of the most common misunderstandings associated with SIEM, which regularly come across in discussions I have with customers.

Five Misconceptions About SIEM Solutions

1. SIEM Is Just a Tool

SIEM describes a management functionality designed to identify security events by aggregating and analyzing real-time and historic data from distributed systems. But in reality, SIEM is widely associated with a piece of technology.

This is not necessarily wrong, but it is only a part of the story. In many security programs, the implementation of SIEM is considered a strategic goal and suggests that a piece of software can solve all our problems. In fact, the true intention behind SIEM is to strengthen the organization’s security intelligence capabilities, including governance and processes.

2. SIEM Is Only for Audit and Compliance

The main benefit of SIEM goes far beyond reports based on historic data. SIEM aims to empower organizations to detect threats and attacks before they cause serious harm. But this capability does not simply appear when a SIEM solution is implemented; it requires analysts to shift away from a compliance-centric view of security and establish a risk-aware culture.

3. It Will Prevent Attacks

The idea that SIEM solutions are designed to prevent attacks is a widespread misunderstanding. In truth, the main purpose of SIEM is to detect activities that might be part of an attack. SIEM solutions can detect suspicious or unusual activities and deliver this information to security analysts, who then decide how to respond to or remediate any associated vulnerabilities. The subsequent incident response is at least as important as the detection capabilities of an SIEM tool.

4. SIEM Is a Silver Bullet

An SIEM solution is no silver bullet; it requires continuous conditioning and tuning to work effectively. Data must be defined and collected, and the appropriate correlation rules applied. These definitions are known as SIEM use cases.

To be effective, use cases need to reflect the organization’s risk profile, which is a result of a risk assessment process such as threat modeling. But don’t underestimate the effort needed to define and continuously update use cases.

5. The Solution Won’t Impact the Organization

The good thing about a formal and automated SIEM process is that it dramatically increases the visibility into your environment. However, there is a risk that organizations will get overwhelmed by this visibility if large volumes of vulnerabilities or even persistent threats are discovered within a short time.

Enterprises must be prepared to handle this data and shift workloads accordingly. My recommendation is to start by implementing and activating the most critical use cases to ensure that there are enough resources to both analyze and remediate severe threats.

Generating Maximum Value

The most critical task of an SIEM solution is to generate value by improving the organization’s overall security posture as quickly as possible. This might rule out traditional waterfall-based project approaches, so organizations have to seek more agile methods to stay on track.

Read the IT Executive Guide: Transitioning from SIEM to Total Security Intelligence

More from Intelligence & Analytics

What makes a trailblazer? Inspired by John Mulaney’s Dreamforce roast

4 min read - When you bring a comedian to offer a keynote address, you need to expect the unexpected.But it is a good bet that no one in the crowd at Salesforce’s Dreamforce conference expected John Mulaney to tell a crowd of thousands of tech trailblazers that they were, in fact, not trailblazers at all.“The fact that there are 45,000 ‘trailblazers’ here couldn’t devalue the title anymore,” Mulaney told the audience.Maybe it was meant as nothing more than a punch line, but Mulaney’s…

New report shows ongoing gender pay gap in cybersecurity

3 min read - The gender gap in cybersecurity isn’t a new issue. The lack of women in cybersecurity and IT has been making headlines for years — even decades. While progress has been made, there is still significant work to do, especially regarding salary.The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the field. In fact, only 17% of the 14,865 respondents to the survey were women.Pay gap between men and womenOne of the most concerning disparities revealed by…

Protecting your data and environment from unknown external risks

3 min read - Cybersecurity professionals always keep their eye out for trends and patterns to stay one step ahead of cyber criminals. The IBM X-Force does the same when working with customers. Over the past few years, clients have often asked the team about threats outside their internal environment, such as data leakage, brand impersonation, stolen credentials and phishing sites. To help customers overcome these often unknown and unexpected risks that are often outside of their control, the team created Cyber Exposure Insights…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today