Choose Index below for a list of all words and phrases defined in this glossary.
security information management (SIM) - Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs. A security information management system (SIMS) automates that practice. Security information management is sometimes called security event management (SEM) or security information and event management (SIEM).
Security information includes log data generated from numerous sources, including antivirus software, intrusion-detection systems (IDS), intrusion-prevention systems (IPS), file systems, firewalls, routers, servers and switches.
Security information management systems may:
* Monitor events in real time. * Display a real-time view of activity. * Translate event data from various sources into a common format, typically XML. * Aggregate data. * Correlate data from multiple sources. * Cross-correlate to help administrators discern between real threats and false positives. * Provide automated incidence response. * Send alerts and generate reports.
Commercial SIM products include ArcSight ESM, nFX's SIM One, Network Intelligence's enVision, Prism Microsystems' EventTracker, Trigeo, Symantec's Security Information Manager, Cisco Security MARS and Snare. Open source SIM products include OSSIM, a product of the Open Source Security Information Management initiative, and Prelude, from PreludeIDS.
Although SIM products can automate many tasks around security information gathering and processing, they can't operate effectively without significant effort and investment on the part of the organization in question. According to Neil Roiter, Senior Technology Editor of Information Security magazine, "Security information and event management (SIEM) products are only as good as the policies and processes they support, and the analyst resources that a company can pour into them."
Related glossary terms: RSA algorithm, data key, greynet (or graynet), spam cocktail (or anti-spam cocktail), fingerscanning (fingerprint scanning), munging, insider threat, authentication server, defense in depth, nonrepudiation / non-repudiation
[Category=Data Management ]
Source: WhatIs.com, 07 September 2013 08:42:53, http://whatis.techtarget.com/glossary/Data-and-Data-Management
Data Quality Glossary. A free resource from GRC Data Intelligence. For comments, questions or feedback: dqglossary@grcdi.nl