Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Audits

Log Management Focus in Mid-Sized Companies Shifting from Compliance to Security

Log management priorities – and tools – are evolving in small-to-medium sized businesses (SMBs), with the focus shifting away from compliance towards security and threat management, according to two recently released surveys.

Log management priorities – and tools – are evolving in small-to-medium sized businesses (SMBs), with the focus shifting away from compliance towards security and threat management, according to two recently released surveys.

When queried about the usefulness of log management system data, over 90 percent of the participants in the SANS Institute’s Sixth Annual Log Management Survey ranked “Forensic Analysis and Correlation” as most useful. “Detect/Prevent Unauthorized Access and Insider Abuse,” “Track Suspicious Behavior” and “IT Troubleshooting and Network Operations” were only a couple of percentage points behind.

Log Management Solutions - Security

This represents a dramatic shift in attitudes towards log management systems, which were originally designed as enterprise tools to streamline aspects of the regulatory compliance process through automated report generation. According to The SANS Institute, this shift from a compliance focus to a security focus will soon blur the distinction between log management products and emerging Security Information and Event Management (SIEM) solutions

The results of a separate survey conducted by RSA confirm that security capabilities are becoming a top priority for SMBs when they evaluate log management products and SIEMs. Eighty-nine percent of respondents to the RSA study cited security operations functions as the primary usage for their SIEM solution, compared with 54 percent who cited compliance. Sixty-six percent ranked real-time monitoring as most important when evaluating a SIEM vendor, and more than 75 percent deemed that capability essential.

According to RSA Marketing CTO Sam Curry, “Regulations have been a catalyst for this industry: in the pursuit of a check mark [to appease regulators], small and medium sized businesses are finding new, deeper and more business-relevant ways to use the tools now in their hands. The RSA and SANS Institute surveys show these companies going beyond mere compliance and reporting and into the more interesting and valuable areas of forensics, operations optimization, risk management and advanced correlation.”

Comments from IT managers at SMBs confirm Curry’s opinion. “Security isn’t just about packets and compliance for our team,” said Charles Beierle, Director of Information Security at RBFCU, a Texas-based credit union, “It’s about combining information and context to create intelligence useful for making business decisions. Efficiently capturing those two components from all kinds of disparate sources have made the case for continued SIEM investment.”

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...