Operations | Monitoring | ITSM | DevOps | Cloud

SIEM

Journey of Elastic SIEM Getting Started to Investigating Threats: Part 2

Calling all security enthusiasts! Many of us are now facing similar challenges working from home. Introduced in 7.2, Elastic SIEM is a great way to provide security analytics and monitoring capabilities to small businesses and homes with limited time and resources. In this three part meetup series we will take you on a journey from zero to hero - getting started with the Elastic SIEM to beginner threat hunting.

How to Overcome the Drawbacks of SIEM Tools

These days, “SIEM” (Security Information and Event Management) is all over the place. SIEM tools work by collecting data from multiple systems and noticing patterns in the data. This adds immediate value to the business by providing insights, security recommendations, and actionable intelligence. Despite being helpful tools for many companies, SIEM tools do have their drawbacks. This article will describe the four main ones and offer suggestions for how they might be overcome.

Automated incident response with Flowmon and FortiGate

Flowmon has teamed up with Fortinet to provide security administrators with an integrated solution for automated threat detection and incident response. Join this webinar to learn about the benefits of the integration between Flowmon and the FortiGate next-generation firewall. You will experience a live demo demonstrating how Flowmon’s detection capabilities can enhance FortiGate’s security enforcement to create a truly automated security matrix. Incident logging to FortiSIEM included.

Getting started with adding a new security data source in your Elastic SIEM: Part 1

What I love about our free and open Elastic SIEM is how easy it is to add new data sources. I’ve learned how to do this firsthand, and thought it’d be helpful to share my experience getting started. Last October, I joined Elastic Security when Elastic and Endgame combined forces. Working with our awesome security community, I’ve had the opportunity to add new data sources for our users to complement our growing catalog of integrations.

A Journey of Elastic SIEM: Getting Started through Threat Analysis Part 1

Calling all security enthusiasts! Many of us are now facing similar challenges working from home. Introduced in 7.2, Elastic SIEM is a great way to provide security analytics and monitoring capabilities to small businesses and homes with limited time and resources. In this three-part meetup series we will take you on a journey from zero to hero, getting started with the Elastic SIEM to becoming a threat hunter.

5 Reasons You Should Start Analyzing Your Logs

In IT environments, all software applications and systems produce logs with varying levels of details or context about different events. These log files are automatically generated, and you can see them as a time-stamped record of events. Traditionally, organizations maintained logs locally or in a self-hosted setup. This was done primarily to meet various compliance mandates.

Integration and Shipping Okta Logs to Logz.io Cloud SIEM

Company security usually depends on your ability to come up with a diverse set of passwords and then manage them. Remembering all of them is considered a tad too difficult for most mere mortals, so a number of password storage apps have emerged. But they too have to be secured, and ultimately results in inefficient access and flawed security. Single-sign on (SSO) is still preferred, but to make it effective, companies like Okta have to secure integration across a number of apps.

Best Log Management Tools in 2020, and How to Select One for Your Organization

In modern digital environments, logs are present everywhere. From networking devices, servers, and databases, to operating systems, cloud-based services, and applications, every component produces some form of digital records of events. These records or logs provide an audit trail for Security Information Event Management (SIEM) and help in performance monitoring of servers and applications.