Talk With an Expert

Generating Anomalies Improves Return on Investment: A Case Study for Implementing Honeytokens

Generating Anomalies Improves Return on Investment: A Case Study for Implementing Honeytokens (PDF, 2.38MB)Published: 11 Oct, 2018
Created by:
Wes Earnest

Putting the right information security architecture into practice within an organization can be a daunting challenge. Many organizations have implemented a Security Information and Event Management (SIEM) to comply with the logging requirements of various security standards, only to find that it does not meet their information security expectations. According to a recent survey, more than half of respondents say they are not satisfied with their organization's SIEM. The following case study deconstructs these logging requirements and the assumptions that lead to a typical SIEM implementation, and discusses an alternative approach focused on improving the organization's return on investment, decreasing security risk, and decreasing mean time to detection of a potential security breach.