Changing the SIEM Game

Making the investment for storage, processing and infrastructure support

For many companies, deploying security information and event monitoring (SIEM) technology to strengthen the ability to identify potential security threats has been an unreachable goal.

That might be about to change, with two of the largest public cloud service providers announcing new cloudbased offerings that include SIEM capabilities. Implementing SIEM has been a challenge because many organizations do not have the storage, processing and related infrastructure to support these applications. Many either cannot afford to make the investment or are unwilling to do so.

Now, with both Microsoft and Google announcing new services that support SIEM, the technology has suddenly become more approachable and affordable for organizations from the largest enterprises to small companies looking to bolster their cyber security postures.

Google announced a multitude of security-related capabilities for its Google Cloud Platform (GCP), including Cloud Security Command Center (Cloud SCC), a security management and data risk platform for GCP. The platform includes an Event Threat Detection service that leverages Google-proprietary intelligence models to quickly detect threats such as malware, cryptomining and outgoing distributed denial-of-services (DDoS) attacks.

Around the same time, Microsoft introduced Azure Sentinel, a cloud-native SIEM platform that provides intelligent security analytics at cloud scale. Azure Sentinel is designed to make it easy to collect security data across an entire hybrid organization from devices, users, applications and servers on any cloud using artificial intelligence (AI) to identify real threats quickly.

Multiple Benefits

With these cloud-native services, businesses can acquire the functionality and capabilities of SIEM without making the financial outlay for servers, storage and related maintenance and support. The cost shifts from capital expenditures to operating expenditures, and the economics of the cloud make pricing far more palatable even for organizations with limited security budgets.

Additionally, organizations don’t need to acquire as much, or any, of the internal expertise they would need if they were running these systems on premises. With the ongoing shortage of cyber security skills, that’s an important factor and another cost consideration. These services can also be deployed much faster than on-premises systems because the service providers are doing all the heavy lifting as far as infrastructure is concerned.

Another key advantage to cloud-based SIEM is scalability. Because of the cloud infrastructure supporting the services, organizations can easily scale processing and storage up or down as needed. Many companies have struggled with the issue of how many months’ worth of security logs to keep and how to scale storage to accommodate that. That’s not an issue with the cloud.

As a result, companies are not limited by storage capacity or number of events. They no longer need to port event logs out of the cloud environment into on-premise platforms if they have such products. There are long-term archiving solutions available. That enables companies to access past events without having to keep these records on more costly active storage.

Connectors Needed

One drawback, at least in the short term, is that these services have relatively few connectors to other technology platforms that can feed information about events and incidents. In comparison, on-premises SIEM platforms have a long list of pre-defined application programming interface (API) connectors that makes it easier to pull data such as log information from other systems.

That said, both Microsoft and Google are working hard to get as many pre-defined API connectors as possible and with the cloud, such efforts tend to move rapidly. In the meantime, organizations can build their own connectors with software development kits (SDKs) available for each of these new services. These could be used to overcome the limitation.

Companies can leverage the cloud-native SIEM services as they move into hybrid cloud environments. With the flexibility offered by these solutions, they can use one of the cloud-based services as their master SIEM platform and feed data into it from on-premises SIEM and other systems.

On the other hand, if they’re more comfortable making an onpremises offering the primary SIEM, they can then leverage the cloud-enabled services to support the on-premises platform, as long as these different environments are connected.

Moving Forward

How organizations handle SIEM comes down to what they are looking to achieve, how long they want to keep records, their level of risk tolerance, and other factors.

Some companies remain resistant to putting sensitive data in the cloud—even though the cloud in many cases has been shown to be more secure than data center environments—and therefore will prefer to maintain an on-premises SIEM as their main platform for security information and event monitoring. Others may be more concerned about keeping a long history of data or require a lot of processing power, so a cloud-native service makes more sense as the primary SIEM.

Either way, these offerings provide organizations with new options for their SIEM needs. These services represent an important step in the right direction.

This article originally appeared in the July/August 2019 issue of Security Today.

Featured

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

  • Report: Cyber Attackers Continue to Turn to AI-Based Tools to Avoid Detection

    Comcast Business recently released its 2025 Cybersecurity Threat Report, a comprehensive analysis of 34.6 billion cybersecurity events detected between June 1,2024 and May 31, 2025. Now in its third year, the report offers business leaders a unique perspective into the evolving threat landscape and provides actionable insights to help organizations strengthen their defenses and align cybersecurity with business risk. Read Now

  • Axis Communications Creates AI-powered Video Surveillance Orchestra

    What if cameras could not only see the world, but interpret it—and respond like orchestra musicians reading sheet music: instantly, precisely, and in perfect harmony? That’s what global network technology leader Axis Communications set to find out. Read Now

  • Just as Expected

    GSX produced a wonderful tradeshow earlier this week. Monday was surprisingly strong in the morning, and the afternoon wasn’t bad at all. That’s Monday’s results and asking attendees to travel on Sunday. Just a quick hint, no one wants to give up their weekend to travel and set up an exhibit booth. I’m just saying. Read Now

    • Industry Events
    • GSX
  • NOLA: The Crescent City

    Twenty years later we finds ourselves in New Orleans. Twenty years ago the aftermath of Hurricane Katrina forced exhibitors and attendees to look elsewhere for tradeshow floor space. Read Now

    • Industry Events
    • GSX

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.