SIEM

elastic

Elastic SIEM for home and small business: GeoIP data and Beats config review

Hey, there. This is part three of the Elastic SIEM for home and small business blog series. In the Getting started blog, we created our Elasticsearch Service deployment and started collecting data from one of our computers using Winlogbeat. In the Securing cluster access blog, we secured access to our cluster by restricting privileges for users and Beats. If you haven’t read the first and second blogs, you may want to before going any further.

elastic

Elastic SIEM for home and small business: Securing cluster access

Hey, there. This is part two of the Elastic SIEM for home and small business blog series. In the Getting started blog, we created our Elasticsearch Service deployment and started collecting data from one of our computers using Winlogbeat. If you haven't read the first blog, you may want to before going any further. In this blog, we will secure access to our cluster by restricting privileges for users and Beats.

sqreen

SIEM for startups: why should you care?

Security information and event management (SIEM) products came into the limelight during the early 2000s. They are widely regarded as something that only large enterprises need. While it’s true that deploying a SIEM system makes the most sense for big companies, startups and small and midsized businesses (SMBs) shouldn’t rule it out.

Interacting With Log Data in Security Event Manager

SolarWinds Security Event Manager is designed to give users a centralized view of logs and events occurring across their network, and quickly and easily recall specific logs and identify suspicious patterns and behaviors in that data. This video gives a quick overview of the features in SEM, making it easy for users to view and interact with their log data.
sumologic

Top 10 best practices of Cloud SIEM

Nowadays, it’s not uncommon to see enterprise IT leaders in a situation that seems like a catch 22. Oftentimes, they are expected to be involved in making data-driven decisions for augmenting productivity and profitability. Paradoxically, they are preoccupied with what they consider as their core responsibilities – applying best practices to safeguard the IT infrastructure and expediting investigations when incidents occur.

elastic

Elastic SIEM for home and small business: Getting started

With the increase in cyber attacks and data breaches, we’re told to be vigilant in regards to keeping sensitive data safe. But when it comes to cybersecurity, being proactive is just as important. Knowing what is happening to our information systems helps us identify how we should improve our information security posture. This is why security analytics are important.

elastic

Elastic Endpoint Security excels in third-party tests

Openness has long been at the heart of our ethos at Endgame, and it’s part of what makes joining forces with Elastic — an organization with nearly identical culture and values — so exciting. It has long been important to us that endpoint security not be treated as a magic black box shrouded in buzzwords and marketing deception.