Four Ways to Stretch Your SIEM For Complete Protection

By on May 11, 2015

This blog post was written by Karl Klaessig.

Organizations and enterprises today are more aware than ever of the dangers posed by cybercriminals and advanced persistent threats (APTs). So, how can they fight back against these online threats in a situation where one size never fits all?

One solution that we tout in our ‘When Minutes Count’ report: stretch your Security Information and Event Management (SIEM) solution! Getting the best protection out of your SIEM solution hinges on you taking the time to learn how to leverage your tools to their fullest extent. That is something we can provide right here, in this blog.

We’ve discussed how you can take into account the eight most common Indicators of Attack (IoAs) and the importance of going on the offensive with your SIEM solution to detect and disrupt threats in real-time. But there’s one last thing we need to cover: automating your SIEM solution for quicker detection and optimized threat prioritization.

To do this, CISOs and security admins must take advantage of all that a SIEM has to offer through its automation capabilities. Here’s how:

Use Threat Intelligence

Threat intelligence is a simple concept: protect your business with the shared security experiences from thousands of organizations and security vendors from around the globe. With access to up-to-date reputations for bad destinations and other dynamic attributes, using threat intelligence is critical for the success of your team. According to a customer base survey, McAfee Global Threat Intelligence users saw at least a 20 percent bump in prevention and a 29 percent reduced time to detection. Every percentage point counts when talking about protecting corporate information!

Data Collection and Aggregation.

Knowing what your attackers are looking for is key to securing your organization, and that means identifying and hardening your organization’s valuable data. Documenting and baselining the characteristics of an asset — how it’s used, who is using it and how it could be attacked — can help to alert IT teams to unusual behavior, allowing them to act quickly. By getting IT and security teams to work together with business partners, you can better secure your organization.

Correlation and Rich Rules

With a proactive approach to security, organizations can significantly raise the barrier to entry for many cybercriminals. Correlation by a real-time SIEM solution can help IT teams achieve this goal by detecting suspicious activity automatically, immediately bringing a potential threat to their attention. But, barring the limitations of legacy tools, this can only be done when IT teams take the time to establish multiple-step rules and multiple-attribute logic with their SIEM solution.

Appropriate Automation

All of these efforts help to build an automated SIEM solution that helps security teams to receive and react to event and threat data faster than before. And, with both manual and automated approval steps for workflows, companies can achieve a consistent and more effective response to threats while still keeping critical decision makers in the loop.

When minutes count, you have to shave off every second between an IoA and appropriate action. Otherwise, you risk compromise.

To learn more about what steps your organization can take to protect and detect in real-time, download our report, “When Minutes Count,” here and check out its accompanying infographic here.

Read more about how McAfee has helped organizations create comprehensive, scalable security here and visit the McAfee Service Portal for SIEM support.

To learn about what McAfee SIEM has to offer, follow @McAfee_Business on Twitter, or explore our SIEM community site to get the latest techniques to protect your organization.

About the Author

McAfee Enterprise

McAfee offers industry-leading cybersecurity solutions for all business and enterprise needs. See our blog to stay up-to-date with the latest security trends

Read more posts from McAfee Enterprise

Subscribe to McAfee Securing Tomorrow Blogs