article thumbnail

SHARED INTEL Q&A: Everything the Cisco-Splunk merger tells us about the rise of SIEMs

The Last Watchdog

Combining a security Information tool with a security event tool made it easier to correlate alerts generated by security products, like firewalls and IDS, normalize it, and then analyze it to identify potential risks. Nayyar: : The transition from SIM to SIEM was born out of necessity. What’s the most important thing to keep in mind?

Marketing 306
article thumbnail

SHARED INTEL: How ‘observability’ has enabled deep monitoring of complex modern networks

The Last Watchdog

Instead of just monitoring event logs and analyzing traffic patterns at a surface level, observability tools today leverage machine learning and advanced data analytics to shed light on three data formats: metrics, traces and logs. A trace is a record of all events that trigger across multiple systems stemming from the same request flow.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Five steps to improving identity management — and reinforcing network security

The Last Watchdog

Current events, such as the global pandemic and ‘ The Great Resignation, ’ which have accelerated cloud adoption, remote working environments, and the number of business applications and systems in use has complicated matters. The identity management market has grown to $13 billion and counting.

article thumbnail

RSAC insights: How the ‘CIEM’ framework is helping companies manage permissions glut

The Last Watchdog

It’s called “cloud infrastructure entitlement management,” or CIEM , not to be confused with security information and event management, or SIEM , which is something else altogether. Now comes an emerging security discipline to help companies get a grip on all of these permissions.

article thumbnail

MY TAKE: A few reasons to believe RSAC 2023’s ‘stronger together’ theme is gaining traction

The Last Watchdog

It certainly was terrific to see the cybersecurity industry’s premier trade event fully restored to its pre-Covid grandeur at San Francisco’s Moscone Center last week. The trick in today’s operating environment is how to do this well with cloud migration accelerating.

Mobile 238
article thumbnail

These Six Security Capabilities Will Keep Applications, Hybrid Environments Secure

CyberSecurity Insiders

The remainder of companies deploy them across private clouds or on-premise data centers. To complicate matters, most organizations do not trust the security offered by their public cloud providers. In a cloud environment, both the application surface and the application infrastructure are exposed. And no wonder.

article thumbnail

IoT and Quantum Computing’s Impact on the Federal Government

Thales Cloud Protection & Licensing

The focus on the rest of 2019 and looking ahead to 2020 was very clear when I attended two recent industry events. I spoke at both an Air Force Information Technology and Cyberpower (AFITC) training event and the 2019 Billington Cybersecurity Summit. Cybersecurity remains one of the top concerns and priorities for our government.

IoT 101