Talk With an Expert

Keys to Implementing a Successful Security Information Management Solution (or Centralized Security Monitoring)

Keys to Implementing a Successful Security Information Management Solution (or Centralized Security Monitoring) (PDF, 2.24MB)Published: 11 Jan, 2004
Created by:
Michael Martin

Security professionals are inundated with an overwhelming flow of security events from an ever-growing list of assorted security products. Recent trends including government regulations are driving IT to implement appropriate safeguards - one of which is security information management (SIM). SIM provides a way to gather, analyze, and report vast amounts of security information in a humanly understandable way, greatly enhancing the effectiveness of security analysts. While SIM solutions are expensive, they're sorely needed to meet today's security challenges. This paper provides nine keys to implementing a successful SIM solution.