Addressing Security Issues of Small and Medium Enterprises through Enhanced SIEM Technology
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 117

Research Paper | Information Technology | India | Volume 4 Issue 4, April 2015

Addressing Security Issues of Small and Medium Enterprises through Enhanced SIEM Technology

Prateek Shivhare, Savaridassan.P

Today-s information security threats are increasing in numbers and severity but diversity of network and information technology is increasing exponentially. So it is a challenge for small and medium enterprises, those who cannot give more importance to security because of their capital investment. This Paper actually focuses on an efficient approach to address security issue with small and medium enterprises. All business faces the same challenges like keeping costs down to maintain your competitive edge presses. So these enterprises cannot spend much resource and capital on security. As a solution open source SIEM will provide an enhance and complete security solution.

Keywords: SIEM, OSSIM, Security, Open Source, Enterprise

Edition: Volume 4 Issue 4, April 2015

Pages: 1241 - 1243

Share this Article

How to Cite this Article?

Prateek Shivhare, Savaridassan.P, "Addressing Security Issues of Small and Medium Enterprises through Enhanced SIEM Technology", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB153331, Volume 4 Issue 4, April 2015, 1241 - 1243

Enter Your Email Address




Similar Articles with Keyword 'SIEM'

Downloads: 115 | Weekly Hits: ⮙2 | Monthly Hits: ⮙12

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1990 - 1993

Advanced Persistent Threat Detection System

Hanu Prasannan, Dharani.J

Share this Article

Downloads: 117

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1241 - 1243

Addressing Security Issues of Small and Medium Enterprises through Enhanced SIEM Technology

Prateek Shivhare, Savaridassan.P

Share this Article

Similar Articles with Keyword 'OSSIM'

Downloads: 105

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2849 - 2851

A Survey on Secure Mechanism for Wireless Sensor Networks

Tabbasum Sajjan Magdum, Y.B.Gurav

Share this Article

Downloads: 112

Research Paper, Information Technology, Ethiopia, Volume 5 Issue 12, December 2016

Pages: 1198 - 1205

Improving Transport Protocol for Reliable Data Transfer in Wireless Sensor Network

Andualem W/giorgis, Dr. Ing. Tofik Jemal, Salahdin Seid

Share this Article

Downloads: 117

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1241 - 1243

Addressing Security Issues of Small and Medium Enterprises through Enhanced SIEM Technology

Prateek Shivhare, Savaridassan.P

Share this Article

Similar Articles with Keyword 'Security'

Downloads: 1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙4

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 307 - 310

CCTV Cameras Hacking and Prevention Techniques

Preeti Rana

Share this Article

Downloads: 5 | Monthly Hits: ⮙5

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 369 - 371

Performing Attacks on Radio Frequency and Embedded based Systems

Preeti Rana

Share this Article

Downloads: 83

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Downloads: 99

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1635 - 1639

Developing Firefox add-on for DOM vulnerability Assessment

Saranraj Ilangovan, Geogen George

Share this Article

Similar Articles with Keyword 'Open Source'

Downloads: 106

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 2917 - 2919

E Voting Using Android System

Namrata Thakur, Vrushalee Ambavale

Share this Article

Downloads: 111 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1127 - 1130

Analysis and Data Retrieval by Filtering Packets in High Speed Routers

Indumathi, K. Kumar

Share this Article

Downloads: 111

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2291 - 2295

Enhanced and Automated Virtual Machine Provisioning to Online E-assessment using Openstack Cloud

Vigneshwaran P

Share this Article

Downloads: 112

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1470 - 1473

The Heartbleed Bug: An Open Secure Sockets Layer Vulnerability

Thabiso Peter Mpofu, Noe Elisa, Nicholaus Gati

Share this Article

Downloads: 112 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, Saudi Arabia, Volume 5 Issue 7, July 2016

Pages: 1199 - 1201

Comparing EM Clustering Algorithm with Density Based Clustering Algorithm Using WEKA Tool

Dr. Abdelrahman Elsharif Karrar, Moez Mutasim

Share this Article

Similar Articles with Keyword 'Enterprise'

Downloads: 108

Review Papers, Information Technology, India, Volume 4 Issue 10, October 2015

Pages: 1735 - 1738

Overview of Big Data on Cloud Computing

Aishwarya Karnik, Neha Humbal

Share this Article

Downloads: 109

Research Paper, Information Technology, United States of America, Volume 9 Issue 7, July 2020

Pages: 1713 - 1715

Fusion AI Powered Search

Dhanesh Thatikonda

Share this Article

Downloads: 110

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 3141 - 3144

Interrelated Document Warehouse Report Visualization

V. Vivek, N. J. Subashini

Share this Article

Downloads: 113 | Weekly Hits: ⮙2

Research Paper, Information Technology, Saudi Arabia, Volume 4 Issue 5, May 2015

Pages: 2115 - 2120

A Novel and Integrated Assessment of Security Challenges in Cloud Computing

Mohd Muntjir, Mohd Rahul

Share this Article

Downloads: 115 | Weekly Hits: ⮙4 | Monthly Hits: ⮙8

Review Papers, Information Technology, India, Volume 4 Issue 8, August 2015

Pages: 1255 - 1257

Evolution of Modern Enterprise Resource Planning (ERP) Systems on Technological Background

Nileema B.Patil, Madhuri Samel, Priya Tilak, Dolly Boban

Share this Article



Top