Discover how to Optimize your SIEM

Discover how to Optimize your SIEM


SIEM still plays an important role in attack detection. But for it to succeed in detecting both known and unknown attack types, you must build a set of policies to look for attack conditions and indicators in its environment, and consistently monitor for those conditions. 

View this security classroom and learn how to enhance and extend your SIEM technology so it effectively supports incident response. Discover how to assess the variety of vendor products, what noncommercial sources to consider, what costs are involved, and how much heavy lifting is required. 


Mike Rothman President, Securosis

Mike Rothman is president of Securosis, an independent information security research and consulting firm. Having spent over 15 years as an end-user advocate for global enterprises and mid-sized businesses, Rothman's role is to educate and stimulate thought-provoking discussion on how information security contributes to core business imperatives. 

14 May 2014
14 May 2014
Virtual Environment
Already a Bitpipe member? Login here

Download this Virtual Environment!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor