IT Decision Checklist: Security Information and Event Management
As the complexity of the networks IT manages continues to increase, so too does the volume of security-related information generated by network devices. In fact, it is not unusual for a large firm to produce more log data than the entire printed collection of the Library of Congress, all before breakfast. In this climate, security information management (SIM) tools are increasingly critical in order to maintain control.
Access this edition of Information Security magazine for our experts' insights into choosing and successfully implementing SIM tools. Uncover the critical business and technical considerations involved in the selection process, including:
- Integration with workflow and change management
- Cost and staffing requirements
- Alerting and reporting
- Architecture and scalability
- And more