Evaluate your SIEM
Get the guideComplete visibility for DevSecOps
Reduce downtime and move from reactive to proactive monitoring.
May 10, 2016
Often, when I present at conferences around the country, people ask me, “Is SIEM Dead”? Such a great question! Has the technology reached its end of life? Has SIEM crashed and burned? I think the answer to that question is NO. SIEM is not dead; it has just evolved.
SIEMs, unfortunately, have struggled to keep pace with the security needs of modern enterprises, especially as the volume, variety, and velocity of data have grown. SIEMs have also struggled to keep pace with the sophistication of modern-day threats. Malware 15 years ago was static and predictable. But today’s threats are stealthy and polymorphic. Furthermore, the reality is that few enterprises have the resources to dedicate to the upkeep of SIEM, and the use of SIEM technology to address threat management has become less effective and waned. Gartner Analyst Oliver Rochford famously wrote, “Implementing SIEMs continues to be fraught with difficulties, with failed and stalled deployments common.”(1)
In Greek mythology, a phoenix (Greek: φοῖνιξ phoinix; Latin: phoenix, phœnix, fenix) is a long-lived bird that is cyclically regenerated or reborn. Associated with the sun, a phoenix obtains new life by arising from the ashes of its predecessor.
The SIEM ashes are omnipresent, and security analytics is emerging as the primary system for detection and response.
Although we use the term SIEM to describe this market, SIEM is made up of two distinct areas:
Folks no longer distinguish between these two areas and use “SIEM” to describe the market category. However, it’s important to note what you are trying to accomplish and which problems you are trying to solve with these solutions.
One could easily dismiss these solutions outright, but the security market is huge – $21.4B in 2014, according to our friends at Gartner. And the SIEM piece alone reached $1.6B last year.
According to 451 Research, the security market has around 1,500-1,800 vendors broken down into several main categories across IAM, EPP, SIEM, SMG, SWG, DLP, Encryption, Cloud Security, etc. Within each of these main categories, there are numerous subcategories.
And despite the billions of dollars invested, current security and SIEM solutions are struggling to keep the bad guys out. Whether cyber criminals, corporate spies, or others, these bad actors are getting through.
The Executive Chairman and former CEO of Cisco Systems famously said, “There are two types of companies, those who have been hacked and those who have no clue.” Consider that the median # days before a breach is detected exceeds 6 ½ months and that the % of victims notified by external 3rd parties is almost 70% (3). People, indeed, have no clue! Something different is needed.
Find out how Sumo Logic helps deliver advanced security analytics without the pain of SIEM
Sign up for a free trial of Sumo Logic. It’s quick and easy. Within just a few clicks, you can configure streaming data and start gaining security insights into your data in seconds.
Mark Bloom runs Product Marketing for Compliance & Security at Sumo Logic. You can reach him on LinkedIn or on Twitter @bloom_mark
Sources
(1) Gartner: Overcoming Common Causes for SIEM Deployment Failures by Oliver Rochford 21Aug2014
(2) Forrester: Evolution of SIEM graph, taken from Security Analytics is the Cornerstone of Modern Detection and Response, December 2015
(3) Mandiant mTrends Reports
Reduce downtime and move from reactive to proactive monitoring.
Build, run, and secure modern applications and cloud infrastructures.
Start free trial