The adoption of mobile and cloud computing is expanding the security perimeter of the modern enterprise, and organizations are looking deeper into their IT infrastructure to monitor for malicious activity or software. These trends are producing a growing volume of threat data to be evaluated. To turn this data into meaningful intelligence, tools are needed that go beyond traditional security information and event management (SIEM) to integrate and analyze disparate types of data, structured and unstructured.
Analyzing threat data can be a non-trivial expense, especially for small and midsized organizations. Beyond software licensing, there is the cost of hardware, personnel, and training. But there are some free tools out there that can help.