Project Description
Network Security
Why Security Monitoring?
Security monitoring is the automated process of collecting and analyzing indicators of potential security threats, then triaging these threats for appropriate action.
Security monitoring, sometimes referred to as “security information monitoring (SIM)” or “security event monitoring (SEM),” involves collecting and analyzing information to detect suspicious behaviour or unauthorized system changes on your network, defining which types of behaviour should trigger alerts and taking action on alerts as needed.
Different aspects of Security Monitoring.
The Key Aspects of security monitoring to consider, are:
- Business traffic crossing a boundary
- Activity at a boundary
- Internal workstation, server or device
- Internal network activity
- Network connections
- Session activity by user & workstation
- Alerting on events
- Accurate time in logs
- Data backup status
SOAR vs SIEM
Like many new product categories, SOAR was born from problems without solutions (or perhaps more accurately, problems which had grown beyond the point that they could be adequately solved with existing solutions). To more accurately define the product category, it is crucial to first understand what problems drove its creation. There are five key problems the SOAR market space has evolved to address. Increased workload combined with budget constraints and competition for skilled analysts means that organizations are being forced to do more with less.
SOAR solutions are different than SIEM solutions. While SIEM systems aggregate log data from a variety of sources and provide real-time alerts, SOAR integrates a broader range of internal and external applications. However, most SOAR solutions are deployed alongside SIEM systems. Also, Gartner noted that many SIEMs are beginning to add SOAR capabilities, so it is possible the two categories of tools may eventually merge into one.
Possible candidates for heightened internal monitoring include:
- Core electronic messaging infrastructure
- Sensitive databases Project servers and file stores with restricted access requirements