International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 124 | Views: 328 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015 | Popularity: 6.4 / 10


     

A Study on Critical Capabilities for Security Information and Event Management

Kavita Agrawal, Hemant Makwana


Abstract: Security Management is the crucial issue in the IT Industry. IT industries require a tool which can help in managing the information and events and enhance the level of security. Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of an organizations information technology (IT) security. SIEM tools can analysis on the basis critical capabilities for any product. In this paper, discussed about some of the important critical capabilities for any product and vendors for SIEM tool. Each of the products/services for different tools has been evaluated on the critical capabilities.


Keywords: Compliance, Threat Intelligence, Event Management, log analysis, log management


Edition: Volume 4 Issue 7, July 2015


Pages: 1893 - 1896



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Kavita Agrawal, Hemant Makwana, "A Study on Critical Capabilities for Security Information and Event Management", International Journal of Science and Research (IJSR), Volume 4 Issue 7, July 2015, pp. 1893-1896, https://www.ijsr.net/getabstract.php?paperid=15071503, DOI: https://www.doi.org/10.21275/15071503



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 12 Issue 6, June 2023

Pages: 899 - 902

Pharmaceutical Supply Chain Using Blockchain Technology

Shivangi Sharma, Meenu

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1607 - 1610

Comprehensive Review on Automated Suspicious Activity Report Generation (SAR)

Ankur Mahida

Share this Article

Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Informative Article, Computer Science & Engineering, India, Volume 12 Issue 2, February 2023

Pages: 1106 - 1106

Cyber Warfare by Chinese hackers: The AIIMS Story

Dr. Yatu Rani, Sarthak Jain

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 12 Issue 8, August 2023

Pages: 277 - 281

Exploring the Architecture, Deployment, and Security Aspects of Active Directory Federation Services ADFS: An In-Depth Analysis

Daizy Dsouza, Dr. Usha J

Share this Article

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 1816 - 1822

Introduction: Cloud Storage Security and Homomorphic Encryption in Cloud Computing

Pushpjeet Cholkar, Dr. Margi Patel

Share this Article
Top