Three Questions to Ask about Identity Management

By | Security, SIEM | No Comments

Identity ManagementSome years ago, we knew RSA as the company that made those key fob tokens for dual-factor authentication. Indeed, they were pioneers in the multi-factor authentication space, and to my knowledge, no one has ever found a way to successfully beat their SecurID token-based authentication. But RSA is so much more than that these days. Even the venerable SecurID product has grown into a powerful and flexible Identity Management solution.

Unfortunately, “powerful and flexible” can sometimes translate into “I’m not sure where to start with this.” So here are three questions that may help you get on the right track: Read More

4-Point Checklist for Choosing the Right SIEM

By | Security, SIEM | No Comments

SIEMOrganizations implement security information and event management systems (SIEMs) for a variety of reasons [Read “4 Reasons to Build SIEM into Your Security Platform”], from protecting data against increasingly sophisticated threats to improving compliance in complex regulatory environments. But while the use cases are clear, choosing the right SIEM to deliver on them isn’t as straightforward. To ensure your SIEM can support your organization today and tomorrow, it’s wise to focus on four key attributes. Read More

SIEM

SIEM Intelligence: The Gift That Keeps On Giving

By | SIEM | No Comments

Tis the season! In the spirit of holiday giving, Xiologix would like to provide you with something more magical than mistletoe — especially for those in corporate IT. We would like to speak to the advantages of SIEM (security information event management); and an approach to integrating it into your security toolbelt.

A better approach to security management.

As threats and regulatory requirements increase, organizations are scrambling for more efficient ways to monitor, analyze and respond to threat intelligence. The need for advanced, scalable solutions that provide holistic event management capabilities has become greater than ever.   Read More

How to Optimize SIEM Security Effectiveness

By | Security, SIEM | No Comments

Compliance concerns and the need to protect data from security breaches are helping to drive Security Information and Event Management (SIEM) adoption. A successful SIEM, however, requires work upfront to ensure you’re collecting the right logs, triggering alerts about the right events, and creating an accurate picture that keeps you secure over time. That’s where a good threat assessment comes in.

Read More

What is SIEM Protection and Why do I Need It?

By | SIEM | No Comments

The greater your visibility into the total network, the easier it is to do a thorough job of securing that network and protecting your critical assets. For IT administrators, there can be dark spots where they have no visibility that represent real security risks that hackers can and will exploit. Security Information and Event Management (SIEM) solutions increase network transparency and allow you to do a better job of catching suspicious or malicious behavior. Read More