Partner Perspectives

When Every Minute Counts: Fighting Advanced Threats With Real-Time SIEM

Survey shows that reducing time-to-detection is possible with the right approach.

In a recent study by Evalueserve for Intel Security, only 24% of companies surveyed said they are confident of their ability to detect an attack within minutes of its starting, and just under half said it would take days, weeks, or even months before they noticed. That is plenty of time for your data to be carried out the door.

According to the survey, as well as our experience investigating attacks, reducing time-to-detection is very possible. Many of the more than 450 companies surveyed have tools and technologies to deliver faster incident response. But too often, the significant signals could not be isolated from the mass of alerts being generated. When we looked for differences among the agile companies – those that could respond to an attack within minutes, and the rest – we found that real-time security information and event management (SIEM) was a fundamental distinction. Real-time SIEM can analyze security event and flow and log data fast enough for proactive internal and external threat management.

Real-time SIEM contributes to faster detection by doing more than the minimum of collecting and storing data. A proactive SIEM can rapidly correlate an enormous range and volume of alerts against external threat intelligence, abnormal versus normal activity, and threat priorities. Threats are prioritized through risk scores based on data such as asset value, patch level, location, and available defenses and countermeasures. Armed with this information, the security operations center gets a much clearer picture of the current state of assets and overall security posture, along with a heat map of the areas that require immediate attention. The organization pivots from being a gatherer of historical data to an active hunter with real-time data.

Some of this data is available via sensors and tools that are deployed today but are not communicating with the SIEM for evaluation. If organizations can begin to collect this data and process it in real time, they can shift the detection time from days and weeks to minutes. Reducing time to detection may have a longer-term impact on event volume as well. Most of the agile companies investigated fewer attacks per year than the study average, possibly indicating that the attackers have moved on to softer targets. (Caveat: Some agile companies investigated 50+ attacks last year, showing that some bad guys remain tenacious, or those companies have a special appeal to attackers.)

Our overall takeaway from the report is that security teams could make better use of the tools and options available today and should definitely chart a course that intersects with a real-time SIEM. Download your free copy of this special report at:

Recommended Reading: