article thumbnail

SHARED INTEL Q&A: Everything the Cisco-Splunk merger tells us about the rise of SIEMs

The Last Watchdog

Combining a security Information tool with a security event tool made it easier to correlate alerts generated by security products, like firewalls and IDS, normalize it, and then analyze it to identify potential risks. Nayyar: : The transition from SIM to SIEM was born out of necessity. What’s the most important thing to keep in mind?

Marketing 306
article thumbnail

SHARED INTEL: How ‘observability’ has enabled deep monitoring of complex modern networks

The Last Watchdog

Instead of just monitoring event logs and analyzing traffic patterns at a surface level, observability tools today leverage machine learning and advanced data analytics to shed light on three data formats: metrics, traces and logs. A trace is a record of all events that trigger across multiple systems stemming from the same request flow.

Software 205
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Five steps to improving identity management — and reinforcing network security

The Last Watchdog

Current events, such as the global pandemic and ‘ The Great Resignation, ’ which have accelerated cloud adoption, remote working environments, and the number of business applications and systems in use has complicated matters. The identity management market has grown to $13 billion and counting.

article thumbnail

RSAC insights: How the ‘CIEM’ framework is helping companies manage permissions glut

The Last Watchdog

It’s called “cloud infrastructure entitlement management,” or CIEM , not to be confused with security information and event management, or SIEM , which is something else altogether. Now comes an emerging security discipline to help companies get a grip on all of these permissions.

article thumbnail

MY TAKE: A few reasons to believe RSAC 2023’s ‘stronger together’ theme is gaining traction

The Last Watchdog

It certainly was terrific to see the cybersecurity industry’s premier trade event fully restored to its pre-Covid grandeur at San Francisco’s Moscone Center last week. The trick in today’s operating environment is how to do this well with cloud migration accelerating.

Mobile 238
article thumbnail

Cloud Security Podcast?—?Two Years Later or Our Year-End Reflections for 2022!

Security Boulevard

For our main conference ( Google Cloud Next 2022 ), we did something different again: we ran 4 episodes daily during the event, but with each episode being good listening on its own too. More “CISO meets cloud” episodes are planned as well! Cloud security for CISOs. Security during cloud migration.

article thumbnail

Cloud Security Podcast?—?Two Years Later or Our Year-End Reflections for 2022!

Anton on Security

Many more of this are coming, some are even already recorded For our main conference ( Google Cloud Next 2022 ), we did something different again: we ran 4 episodes daily during the event, but with each episode being good listening on its own too. More “CISO meets cloud” episodes are planned as well! because Mandiant!