期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
The Guidelines to Adopt an Applicable SIEM Solution
1
作者 hassan mokalled Rosario Catelli +3 位作者 Valentina Casola Daniele Debertol Ermete Meda Rodolfo Zunino 《Journal of Information Security》 2020年第1期46-70,共25页
The need for SIEM (Security Information and even Management) systems increased in the last years. Many companies seek to reinforce their security capabilities to better safeguard against cybersecurity threats, so they... The need for SIEM (Security Information and even Management) systems increased in the last years. Many companies seek to reinforce their security capabilities to better safeguard against cybersecurity threats, so they adopt multi-layered security strategies that include using a SIEM solution. However, implementing a SIEM solution is not just an installation phase that fits any scenario within any organization;the best SIEM system for an organization may not be suitable at all for another one. An organization should consider other factors along with the technical side when evaluating a SIEM solution. This paper proposes an approach to aid enterprises, in selecting an applicable SIEM. It starts by suggesting the requirements that should be addressed in a SIEM using a systematic way, and then proposes a methodology for evaluating SIEM solutions that measures the compliance and applicability of any SIEM solution. This approach aims to support companies that are seeking to adopt SIEM systems into their environments, suggesting suitable answers to preferred requirements that are believed to be valuable prerequisites an SIEM system should have;and to suggest criteria to judge SIEM systems using an evaluation process composed of quantitative and qualitative methods. This approach, unlike others, is customer driven which means that customer needs are taken into account when following the whole approach, specifically when defining the requirements and then evaluating the suppliers’ solutions. 展开更多
关键词 SIEM SECURITY INFORMATION and EVENT Management Requirements Evaluation CYBERSECURITY
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部