Last Updated: 12th September, 2019
Security Information And Event Management (SIEM) are a technology that is mature, but aging; the term SIEM was coined in 2005 by Mark Nicolett and Amrit Williams, in Gartner’s SIEM report, “Enhance IT security with Vulnerability Management.” Since then, vendors have evolved “contemporary” SIEMs promises new capacities to provide safety teams with unparalleled visibility and automation.
And while companies crave these new capabilities to improve threat detection, enhance analyst productivity, and decrease logging costs, many hesitate to replace their legacy SIEM. In this article, we’ll discuss why SOC leaders may be dragging their feet on performing a SIEM tech refresh and what can be done about it.
A Brief History Of Security Information And Event Management (SIEM)
The first generation of SIEMs included in the Gartner report was created over 10 years ago — before the first iPhone! Originally, these SIEMs were built out for compliance and threat detection use cases, performing much better at the former rather than the latter. With legacy solutions, security teams poured hours into maintaining static correlation rules, identifying new threats as they arose.
Investigation proved similarly painful, requiring querying and pivoting until analysts gathered enough evidence to manually create a timeline of events. Once analysts figured out what happened, they could contain and respond to the incident.
Modern Threats Require Modern Solutions
Quite a lot has changed since then. In recent years, SIEMs have evolved to keep up with increasingly frequent and sophisticated threats. Today, Gartner identifies both users and entity behavior analytics (UEBA) and security, orchestration and automation response (SOAR) as integral features of a “modern” SIEM.
UEBA improves threat detection by identifying anomalous behavior relative to a normal baseline of activity, while SOAR automates incident response through integrations with other enterprise systems via APIs, for instance, endpoint detection response and response playbooks.
Meanwhile, data sources for ingestion continue to expand. Companies seeking modern solutions are looking to leverage big data architecture while managing ballooning logging costs. Further, as companies continue to migrate to cloud-based applications such as Office 365 or Salesforce, they must extend their security to the cloud. For more detail on the history and evolution of SIEM, see our blog post SIEM Security Primer.
Roadblocks To Change?
With the changes in the SIEM landscape over the last decade, companies are eager to adopt new technologies. Many companies are considering a “tech refresh” for their legacy SIEMs. However, replacing an existing SIEM can be a daunting process. In particular, security teams may face organizational and operational constraints, preventing them from a complete tech overhaul.
From an organizational perspective, log management systems and SIEMs are frequently shared resources which may be used for use cases outside of security, for example IT operations.
Politics may influence the ability to replace an existing SIEM if other teams are still receiving value. Security teams may choose not to pursue a tech refresh to avoid a political battle over the tool in use.
From a user perspective, “ninjas” and other specialists can become attached to an existing SIEM, wanting to stick with the familiar tools they’ve used for years. Combined with the fact that security teams often lack the budget or time to undertake an immediate overhaul, it may be easiest to simply rely on the tools and technologies already in place.
Modular SIEMs: Augment Instead Of Replacing
Many SIEMs force customers to use a single vendor to provide all their security management needs. But with all the advantages that newer technologies provide, should customers have to choose between their existing SIEM and a more modern one? Instead, companies may consider using a modular solution to avoid the pain of a complete replacement project. A modular solution leverages a company’s existing SIEM while concurrently investing in a newer, more modern tech stack.
The beauty of this approach is that it allows security teams to take an incremental approach to modernization. By completing a tech-refresh in phases, companies can spread out upgrade costs over multiple budgetary cycles while augmenting their SIEM with complementary technologies.
BYOS: Bring Your Own SIEM And Enhance It
The Security Management Platform is modular, allowing customers to “mix and match” products to obtain new technology without needing to rip out their existing SIEM. You can opt to either replace your existing SIEM or augment it with products to build custom solutions tailored to meet your security teams’ specific needs:
- Improve Threat Detection – Static correlation rules often miss unknown attacks, lateral movement, and create an enormous number of false positives, while also requiring huge amounts of maintenance. Advanced Analytics and Entity Analytics detect threats based on identifying abnormal, high-risk user and machine activity, regardless of whether it’s been seen before, improving accuracy without the need to create and maintain correlation rules.
- Enhance Analyst Productivity – Keep moving beyond manual inquiry of incidents and also save analysts to conduct each inquiry from days to weeks of parsing and pivoting. Smarter Timelines automate this process, allowing analysts to focus on high-value work instead of tedious tasks.
- Enable Faster Response Times – Avoid the work of using dozens of tools to manually respond to an incident and reduce inconsistencies from analysts of varying skill level. Incident Responder includes pre-built, out-of-the-box playbooks that automate and standardize incident response actions.
- Decrease Logging Costs – Don’t be forced to choose between anticipating which data will be most useful in the event of an attack or deal with unpredictable logging bills from the increased collection. Deploy Data Lake alongside an existing SIEM for unlimited log storage and search with flat, user-based pricing.
- Extend Security To The Cloud – Easily ingest logs from popular cloud-based services like SalesForce, O365, AWS, Google Apps for work, and dozens more. Cloud Connectors provide pre-built connectors that can be added to any existing SIEM.
Each company has a different environment, making its progress on adopting newer SIEM technologies a unique case. Regardless of where you are in your journey towards modernization, you don’t have to choose between the old ways and modern solutions. You can opt for a modular platform that works with existing tech to avoid the headaches of a full replacement project.