Changing the SIEM Game

Making the investment for storage, processing and infrastructure support

For many companies, deploying security information and event monitoring (SIEM) technology to strengthen the ability to identify potential security threats has been an unreachable goal.

That might be about to change, with two of the largest public cloud service providers announcing new cloudbased offerings that include SIEM capabilities. Implementing SIEM has been a challenge because many organizations do not have the storage, processing and related infrastructure to support these applications. Many either cannot afford to make the investment or are unwilling to do so.

Now, with both Microsoft and Google announcing new services that support SIEM, the technology has suddenly become more approachable and affordable for organizations from the largest enterprises to small companies looking to bolster their cyber security postures.

Google announced a multitude of security-related capabilities for its Google Cloud Platform (GCP), including Cloud Security Command Center (Cloud SCC), a security management and data risk platform for GCP. The platform includes an Event Threat Detection service that leverages Google-proprietary intelligence models to quickly detect threats such as malware, cryptomining and outgoing distributed denial-of-services (DDoS) attacks.

Around the same time, Microsoft introduced Azure Sentinel, a cloud-native SIEM platform that provides intelligent security analytics at cloud scale. Azure Sentinel is designed to make it easy to collect security data across an entire hybrid organization from devices, users, applications and servers on any cloud using artificial intelligence (AI) to identify real threats quickly.

Multiple Benefits

With these cloud-native services, businesses can acquire the functionality and capabilities of SIEM without making the financial outlay for servers, storage and related maintenance and support. The cost shifts from capital expenditures to operating expenditures, and the economics of the cloud make pricing far more palatable even for organizations with limited security budgets.

Additionally, organizations don’t need to acquire as much, or any, of the internal expertise they would need if they were running these systems on premises. With the ongoing shortage of cyber security skills, that’s an important factor and another cost consideration. These services can also be deployed much faster than on-premises systems because the service providers are doing all the heavy lifting as far as infrastructure is concerned.

Another key advantage to cloud-based SIEM is scalability. Because of the cloud infrastructure supporting the services, organizations can easily scale processing and storage up or down as needed. Many companies have struggled with the issue of how many months’ worth of security logs to keep and how to scale storage to accommodate that. That’s not an issue with the cloud.

As a result, companies are not limited by storage capacity or number of events. They no longer need to port event logs out of the cloud environment into on-premise platforms if they have such products. There are long-term archiving solutions available. That enables companies to access past events without having to keep these records on more costly active storage.

Connectors Needed

One drawback, at least in the short term, is that these services have relatively few connectors to other technology platforms that can feed information about events and incidents. In comparison, on-premises SIEM platforms have a long list of pre-defined application programming interface (API) connectors that makes it easier to pull data such as log information from other systems.

That said, both Microsoft and Google are working hard to get as many pre-defined API connectors as possible and with the cloud, such efforts tend to move rapidly. In the meantime, organizations can build their own connectors with software development kits (SDKs) available for each of these new services. These could be used to overcome the limitation.

Companies can leverage the cloud-native SIEM services as they move into hybrid cloud environments. With the flexibility offered by these solutions, they can use one of the cloud-based services as their master SIEM platform and feed data into it from on-premises SIEM and other systems.

On the other hand, if they’re more comfortable making an onpremises offering the primary SIEM, they can then leverage the cloud-enabled services to support the on-premises platform, as long as these different environments are connected.

Moving Forward

How organizations handle SIEM comes down to what they are looking to achieve, how long they want to keep records, their level of risk tolerance, and other factors.

Some companies remain resistant to putting sensitive data in the cloud—even though the cloud in many cases has been shown to be more secure than data center environments—and therefore will prefer to maintain an on-premises SIEM as their main platform for security information and event monitoring. Others may be more concerned about keeping a long history of data or require a lot of processing power, so a cloud-native service makes more sense as the primary SIEM.

Either way, these offerings provide organizations with new options for their SIEM needs. These services represent an important step in the right direction.

This article originally appeared in the July/August 2019 issue of Security Today.

Featured

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.