Beyond the Page: Security information and event management implementation

Feature

Beyond the Page: Security information and event management implementation

Beyond the Page is a monthly online Information Security magazine supplement, offering an in-depth, multimedia-centric look at a topic featured in a given month's issue. It's an opportunity to provide you with even more expertise from a selection of our best Information Security magazine contributors.

In addition to the contributor's magazine feature, Beyond the Page also offers an exclusive webcast presentation to help security practitioners and decision makers alike understand an issue from all angles, as well as an exclusive technical article that offers practical advice on implementation, management or troubleshooting.

Our October 2013 Information Security magazine Beyond the Page supplement covers SIEM technology. See the content below.

Information Security magazine cover story: SIEM analytics
The success or failure of your SIEM deployment rests on your security monitoring capabilities.

Video: SIEM architecture and operational processes
In this webcast, Anton Chuvakin describes why the success of your SIEM deployment is determined more by operational processes than by its architecture or by a specific tool. 

Technical tip: Use SIEM to identify unauthorized access attempts
Learn how to use SIEM technology to identify unauthorized access attempts to prevent data theft.

About the contributor:
Anton Chuvakin, Ph.D., is a research director at Gartner in the Gartner for Technical Professionals’ Security and Risk Management Strategies group. He is an author of books Security Warrior, Log Management and PCI Compliance. Follow him on Twitter @anton_chuvakin.


This was first published in October 2013