A Study on Critical Capabilities for Security Information and Event Management
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015

A Study on Critical Capabilities for Security Information and Event Management

Kavita Agrawal, Hemant Makwana

Security Management is the crucial issue in the IT Industry. IT industries require a tool which can help in managing the information and events and enhance the level of security. Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of an organizations information technology (IT) security. SIEM tools can analysis on the basis critical capabilities for any product. In this paper, discussed about some of the important critical capabilities for any product and vendors for SIEM tool. Each of the products/services for different tools has been evaluated on the critical capabilities.

Keywords: Compliance, Threat Intelligence, Event Management, log analysis, log management

Edition: Volume 4 Issue 7, July 2015

Pages: 1893 - 1896

Share this Article

How to Cite this Article?

Kavita Agrawal, Hemant Makwana, "A Study on Critical Capabilities for Security Information and Event Management", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=15071503, Volume 4 Issue 7, July 2015, 1893 - 1896

89 PDF Views | 70 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Compliance'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1695 - 1698

Trusted Framework for Secured Information Storage over Cloud Environment

P. Pothuraju, Dasari Rajesh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1344 - 1349

Big Data Quality: Early Detection of Errors in Process Flow using Alignments and Compliance Rules

Melody Wadzanayi Murakwani, Manoj Sethi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 801 - 806

Providing Security and Privacy in Cloud Computing Using Distributed Firewall and VPN

Dr. Chinthagunta Mukundha, Dr. I. Surya Prabha

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1803 - 1804

Information Technology Storage Plan

Jyoti Madabhushi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1300 - 1307

Cloud Computing: The Next phase in the Evolution of Computing

R. S. Kamble, S. G. Sanmukh

Share this Article

Similar Articles with Keyword 'Event Management'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 985 - 990

Enhancing Security and Event Management Using Association Rule Mining

M. Nithya, A. Komathi

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1893 - 1896

A Study on Critical Capabilities for Security Information and Event Management

Kavita Agrawal, Hemant Makwana

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 812 - 818

Predictive Algorithm for Critical Event Management in Wireless Sensor Network

Sulochana M. Gore, Dr. Sulochana B. Sonkamble

Share this Article

Similar Articles with Keyword 'log analysis'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1947 - 1949

Study on Search Behaviours Using Task Trail

P. Sreelekha, J. Ravikumar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1893 - 1896

A Study on Critical Capabilities for Security Information and Event Management

Kavita Agrawal, Hemant Makwana

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 892 - 894

Evolution of Web Usage Mining in Page Rank Algorithms

Priyanka Bauddha, Thirunavukkarasu

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 3, March 2018

Pages: 605 - 612

Design and Implementation of Router Intrusion Detection and Protection Systems

Nareshkumar D. Harale, Dr. B. B. Meshram

Share this Article

Similar Articles with Keyword 'log management'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1360 - 1365

Implementation of Highly Secured Log Management System over Cloud

Rajebhosale Sagar S., Pawar Anil B.

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1893 - 1896

A Study on Critical Capabilities for Security Information and Event Management

Kavita Agrawal, Hemant Makwana

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 44 - 48

Design of Secure Log Management Over Cloud

Harshal N. Kolhe, Imran R. Shaikh

Share this Article
Top