Downloads: 122 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015
A Study on Critical Capabilities for Security Information and Event Management
Kavita Agrawal, Hemant Makwana
Abstract: Security Management is the crucial issue in the IT Industry. IT industries require a tool which can help in managing the information and events and enhance the level of security. Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of an organizations information technology (IT) security. SIEM tools can analysis on the basis critical capabilities for any product. In this paper, discussed about some of the important critical capabilities for any product and vendors for SIEM tool. Each of the products/services for different tools has been evaluated on the critical capabilities.
Keywords: Compliance, Threat Intelligence, Event Management, log analysis, log management
Edition: Volume 4 Issue 7, July 2015,
Pages: 1893 - 1896
How to Cite this Article?
Kavita Agrawal, Hemant Makwana, "A Study on Critical Capabilities for Security Information and Event Management", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=15071503, Volume 4 Issue 7, July 2015, 1893 - 1896
How to Share this Article?
Similar Articles with Keyword 'Compliance'
Trusted Framework for Secured Information Storage over Cloud Environment
P. Pothuraju, Dasari Rajesh
Big Data Quality: Early Detection of Errors in Process Flow using Alignments and Compliance Rules
Melody Wadzanayi Murakwani, Manoj Sethi
Similar Articles with Keyword 'Event Management'
University Event Management System
V. Balu, P. Vagish Krishnan, Varadarajan .M
Enhancing Security and Event Management Using Association Rule Mining
M. Nithya, A. Komathi
Similar Articles with Keyword 'log analysis'
Evolution of Web Usage Mining in Page Rank Algorithms
Priyanka Bauddha, Thirunavukkarasu
Study on Search Behaviours Using Task Trail
P. Sreelekha, J. Ravikumar
Similar Articles with Keyword 'log management'
Implementation of Highly Secured Log Management System over Cloud
Rajebhosale Sagar S., Pawar Anil B.
Design of Secure Log Management Over Cloud
Harshal N. Kolhe, Imran R. Shaikh