Solved

SIEM Application

Posted on 2013-12-03
3
289 Views
Last Modified: 2016-03-28
I'm looking to implement an SIEM (Security Information Event Manager) application that will not break the bank as well as I can quickly integrate in my environment. Can you recommend an application that would provide an eval copy to test drive.
0
Comment
Question by:SydNal2009
3 Comments
 
LVL 24

Accepted Solution

by:
Mohammed Khawaja earned 500 total points
ID: 39694351
I recommend Splunk, it is reasonably priced, easy to use and beats most other traditional SIEM packages.  Check the link below for more information:

http://www.splunk.com/web_assets/pdfs/secure/Splunk_as_a_SIEM_Tech_Brief.pdf
0
 
LVL 6

Expert Comment

by:mo_patel
ID: 40196607
LogRhythm is very user friendly, compared to others used in past.  All rules pre built, saves you doing your own configurations....don't need in-depth knowledge of windows event log ID's
0
 

Expert Comment

by:Naomi Goldberg
ID: 41459849
You can read real user reviews for all the major SIEM solutions on IT Central Station: https://www.itcentralstation.com/categories/security-information-and-event-management-siem.

This LogRhythm user noted, "Pricing was on the higher end when compared to other products we looked at. However, we felt the advantages with LogRhythm justified the price premium. Licensing is fair and straightforward. We evaluated SIEMs from AlienVault, Tripwire, and Solarwinds." You can read the full review here: https://www.itcentralstation.com/product_reviews/logrhythm-review-34386-by-srinfosysspec477

Hope this helps!
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Suggested Solutions

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now