Feeds

SIEMs like a good idea: How to manage security in real time

Join us in Reg Studios on September 29

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Live webcast Register now for this webcast that explains how security information and event management (SIEM) can work, but also takes us beyond today’s implementations to show how SIEM will become an essential feature of your security environment..

Watch this live event on September 29 at 13:00 BST (8:00 EST) - if you can't make it, just sign up and we will email you when the recording is available.

Handy synopsis for you

You face more, and more dangerous threats every day - drive-by infections, APTs, executive targeted phishing to name three. At the same time, the potential attack surface of IT systems are growing rapidly: your VMs, your cloud, your users’ mobile devices are all at risk. You have probably spent a large part of 2014 developing external-facing web applications. How do you secure them all?

Reg readers tell us they have multiple tools handling security, making it impossible to get an idea of security in real time. Operating best-effort security isn’t enough, but security Information and event management, touted as the answer to this, has so far been complicated to set up and hard to interpret.

Has this changed? Is SIEM the future of enterprise security and, if so, what will that future look like? Raj Samani, CTO, from McAfee of Intel Security, joins us in the Reg studio to explain how SIEM can work, what it does, and how to fit it into your existing security environment. Tony Lock from Freeform Dynamics will join him, and Tim Phillips will put your questions to the experts. ®

Bootnote

Do check out The Register's YouTube channel, which is home to most of our on-demand webcasts.

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.