International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 122 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015


A Study on Critical Capabilities for Security Information and Event Management

Kavita Agrawal, Hemant Makwana


Abstract: Security Management is the crucial issue in the IT Industry. IT industries require a tool which can help in managing the information and events and enhance the level of security. Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of an organizations information technology (IT) security. SIEM tools can analysis on the basis critical capabilities for any product. In this paper, discussed about some of the important critical capabilities for any product and vendors for SIEM tool. Each of the products/services for different tools has been evaluated on the critical capabilities.


Keywords: Compliance, Threat Intelligence, Event Management, log analysis, log management


Edition: Volume 4 Issue 7, July 2015,


Pages: 1893 - 1896


How to Cite this Article?

Kavita Agrawal, Hemant Makwana, "A Study on Critical Capabilities for Security Information and Event Management", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=15071503, Volume 4 Issue 7, July 2015, 1893 - 1896

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Compliance'

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1695 - 1698

Trusted Framework for Secured Information Storage over Cloud Environment

P. Pothuraju, Dasari Rajesh

Share this Article

Downloads: 114

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1344 - 1349

Big Data Quality: Early Detection of Errors in Process Flow using Alignments and Compliance Rules

Melody Wadzanayi Murakwani, Manoj Sethi

Share this Article

Similar Articles with Keyword 'Event Management'

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 965 - 966

University Event Management System

V. Balu, P. Vagish Krishnan, Varadarajan .M

Share this Article

Downloads: 116

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 985 - 990

Enhancing Security and Event Management Using Association Rule Mining

M. Nithya, A. Komathi

Share this Article

Similar Articles with Keyword 'log analysis'

Downloads: 110

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 892 - 894

Evolution of Web Usage Mining in Page Rank Algorithms

Priyanka Bauddha, Thirunavukkarasu

Share this Article

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1947 - 1949

Study on Search Behaviours Using Task Trail

P. Sreelekha, J. Ravikumar

Share this Article

Similar Articles with Keyword 'log management'

Downloads: 113

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1360 - 1365

Implementation of Highly Secured Log Management System over Cloud

Rajebhosale Sagar S., Pawar Anil B.

Share this Article

Downloads: 121

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 44 - 48

Design of Secure Log Management Over Cloud

Harshal N. Kolhe, Imran R. Shaikh

Share this Article
Top